•    Employment
  •    Academia
  •    Research
    • NICE Framework
    • CAE Program

Industrial Control Systems

The intent of the Industrial Control Systems Knowledge Unit is to provide students with an understanding of the basics of industrial control systems, where they are likely to be found, and vulnerabilities they are likely to have.

Topics

  1. Networking (RS232/485, ZIGBEE, 900MHz, BlueTooth, X.25)
  2. Hardware Components
  3. Common Vulnerabilities in Critical Infrastructure Systems
  4. Protocols (MODBUS, PROFINET, DNP3, OPC, ICCP, SERIAL)

Outcomes

  1. Describe the use and application of PLCs in automation.
  2. Describe the components and applications of industrial control systems.
  3. Explain various control schemes and their differences.
  4. Demonstrate the ability to understand, evaluate and implement security functionality across an industrial network.
  5. Understand and compare the basics of the most used protocols.

KSA-T

Below are the Knowledge, Skills, Abilities and Tasks (KSA-T) identified as being required to perform this work role.
Learn More about the KAS-T's.

  • Knowledge
  • Skills
  • Abilities
  • Tasks
ID DESCRIPTION
K0274 Knowledge of transmission records (e.g., Bluetooth, Radio Frequency Identification (RFID), Infrared Networking (IR), Wireless Fidelity (Wi-Fi). paging, cellular, satellite dishes, Voice over Internet Protocol (VoIP)), and jamming techniques that enable transmission of undesirable information, or prevent installed systems from operating correctly.
K0170 Knowledge of critical infrastructure systems with information communication technology that were designed without system security considerations.
K0346 Knowledge of principles and methods for integrating system components.
K0267 Knowledge of laws, policies, procedures, or governance relevant to cybersecurity for critical infrastructures.
K0009 Knowledge of application vulnerabilities.
ID DESCRIPTION
ID DESCRIPTION
A0170 Ability to identify critical infrastructure systems with information communication technology that were designed without system security considerations.
ID DESCRIPTION