Professional Development

Courses

Note: Students registered for these PDC courses will also receive limited access to sessions at the TechNet Land Forces East conference at no additional cost. Follow links to specific course registration pages for details.

All courses will be held at the Baltimore Convention Center during TechNet Land Forces East.  To register, please click on the hyperlinked course name. Questions? Please contact the PDC Registrars by email or at (703) 631-6137.

 

How Vulnerable Is Your Infrastructure? Supervisory Control and Data Acquisition (SCADA)

provided by Cypherpath LLC (an AFCEA Educational Preffered Provider)
Offered twice on August 15:

Course 396-12-BCMD-1, August 15, 8:30 a.m. - 11:30 a.m.

Course 396-12-BCMD-2, August 15, 1:30 p.m. - 4:30 p.m.

This course is pre-qualified for three (3) CompTIA CEUs (A+, Network+, Security+)

Over the last several years researchers have expressed growing concern over the possibility that the US and other major industrial nations are at risk due to vulnerabilities in a class of devices known in the engineering and manufacturing world as SCADA. SCADA devices control the invisible but necessary infrastructure of commercial enterprises from air conditioning systems to electrical grids and factory automation equipment. The problem lies largely with the fact that many of these devices were designed to be embedded in equipment that was largely standalone and controlled using out-of-band management with laptops or directly connected terminal to configure device specific capabilities. The move to network all aspects of the corporate enterprise gradually began to include these devices which are often custom controllers programmed to provide specific functions that support a business need. Critical Infrastructure including power plants, manufacturing facilities, hospitals and energy sectors provide a rich target for bad actors. This course will help prepare security professionals and organizations to better understand the network and security issues facing them and to be better prepared and informed.

This 3-hour Instructor-led session covers:

  • How does adding a SCADA device to the network make it vulnerable?
  • What’s the threat?
  • How should business respond to this threat?
  • Network Security Concerns
  • Where to go for guidance...NIST

 

Learning Objectives:

  • Students will be able to talk to the most common SCADA device controls.
  • Students will become familiar with Network Security, Compliance and Operational Security issues
  • Students will become familiar with best practices in relation to SCADA and enterprise networks via access control, assessments and cryptography concepts.

 

Who Should Attend: Anyone involved with SCADA systems, SCADA supervisors, analysts, system administrators as well as SCADA vendors.

Instructor:

Gale Pomper has over 25 years of experience installing and designing computer networks. She holds numerous certifications from Microsoft, Novell, and CompTIA, including Server+, MCT, MCSE, MCTS for SharePoint , and MCTS and EMA for Exchange 2007. She is the principal author for an exam guide for Windows 2000 Active Directory published in December 2001, and a contributing author for Windows XP Power Pack published in March 2003. For the past 15 years, Gale has been an independent consultant providing network design services, customized training, and SharePoint implementation services. In 2007, Ms. Pomper took a position working for the Department of Defense as a Global Exploitation and Vulnerability Analyst and is currently a Program Director for her office. She is a CISSP.