• Course
  • Vendor

A perfect security storm is brewing with the shortage of security professionals and the additional vulnerabilities with IoT enabled infrastructures.

  • Course Start Date: 2019-06-03
  • Time: 08:30:00 - 16:30:00
  • Duration: 5 days 08:30 AM - 04:30 PM
  • Location: Virtual
  • Delivery Methods(s): Virtual Instructor Led

Course Outline


IP Networking Basics: INICS, ICND1 equivalent
OT Networking Basics: ICINS, IMINS or IMINS2
Network Security Basics: IINS or CCNA Security equivalent

ICND1 v3.0 - Interconnecting Cisco Networking Devices, Part 1
Managing Industrial Networks with Cisco Networking Technologies (IMINS) 1.3
Managing Industrial Networks for Manufacturing with Cisco Technologies (IMINS2) 1.3
IINS - Implementing Cisco IOS Network Security 3.0


This course provides an overview of the IoT enabled industrial verticals (manufacturing, energy, O&G, utilities, process control), architectures, and IIoT security requirements, frameworks, and regulations. Security protocols, vulnerabilities, and the process of securing against the vulnerabilities are examined in depth and practiced in the hands-on lab environment.

Upon completion of this course, you will be able to:
  • Understand the convergent enterprise and industrial IoT architecture, components and applications
  • Contrast enterprise IT vs. industrial OT security
  • Define layered security requirements from the network edge to the core, and from access to applications layer
  • Protect endpoints, communications as well as data at rest and in motion
  • Compliance to standards and regulations and auditing
  • Understand protocols, applications and IPv6 for IIoT
  • Identify vulnerabilities and threat
  • Familiarize with common implementation issues
  • Assess, monitor and detect vulnerabilities
  • Walk through IIoT attacks
  • Adopt best practices in design principles and process for securing and segmenting IIoT networks
  • Application of the converged security model for the broader industry: manufacturing, utilities, transportation, O&G
  • Secure and monitor/detect the IIoT framework with next generation security products and tools

Lesson 1: Describing Converged Enterprise and Industrial IoT Networks, Architectures, and Frameworks
Lesson 2: Describing Industrial IoT Network Security Requirements
Lesson 3: Describing Protocols Used in Converged Enterprise and Industrial IoT Networks
Lesson 4: Analyzing IoT Vulnerabilities
Lesson 5: Exploiting Vulnerabilities in Industrial IoT Networks
Lesson 6: Describing the Process of Securing Industrial IoT Networks
Lesson 7: Hardening Devices in Industrial IoT Networks
Lesson 8: Implementing Network Infrastructure Security in Industrial IoT Networks
Lesson 9: Describing the Characteristics of Cisco NGFWs in Industrial IoT Networks
Lesson 10: Securing Communications in in Industrial IoT Networks Using Basic Cisco NGFW and Cisco NGIPS Features
Lesson 11: Implementing Advanced Security Features on NGFW and NGIPS in Industrial IoT Networks
Lesson 12: Using the Cisco TrustSec Solution in Industrial IoT Networks
Lesson 13: Implementing VPN Solutions in Industrial IoT Networks
Lesson 14: Describing the Industrial IoT Network Framework and Regulations
Lesson 15: Bonus Content: Describing Physical Security in Industrial IoT Networks
Lesson 16: Bonus Content: Monitoring Industrial IoT Networks

Discovery 1: Explore an Industrial IoT Network
FASTLab 1: Explore Industrial IoT Network Components and Identify Their Security Requirements
Discovery 2: Analyze Layer 2 and Layer 3 Network Protocol Traffic in an Industrial IoT Network
Discovery 3: Analyze Operations Technology Protocol Traffic
Discovery 4: Explore Assets and Detect Vulnerabilities in an Industrial IoT Network
Discovery 5: Insert a Rogue Device
Discovery 6: Implement an Attack Against OT Assets
FASTLab 2: Analyze Attacks Against IoT Networks
FASTLab 3: Classify Assets and Identify Relationships Between Assets in Industrial IoT Network
Discovery 7: Implement Device Hardening on Industrial Network Devices
Discovery 8: Explore Network Infrastructure Security Features on Cisco Industrial Ethernet Switches
Discovery 9: Explore Network Infrastructure Security Features on Cisco Industrial Ethernet Switches 2
Discovery 10: Implement Cisco NGFWs in Routed Mode and in Transparent Mode in an Industrial IoT Network
Discovery 11: Implement Access Control for Network Segments
Discovery 12: Implement a Cisco FirePOWER Module with Basic Settings
Discovery 13: Implement Advanced Access Control and OT Application Inspection for Network Segments
Discovery 14: Implement IEEE 802.1X on Industrial Switches
Discovery 15: Implement SGTs on Industrial Switches
Discovery 16: Implement a Remote-Access VPN to Manage Industrial IoT Networks
Discovery 17: Explore Industrial IoT Network Components and Identify the Applicable Security Standards and Regulations

  • Security Engineer
  • Security Operations
  • Security Analysts
  • Systems, Solutions Architects
  • System Integrators
  • Senior OT Engineers

Cancellation Policy

We require 16 calendar days notice to reschedule or cancel any registration. Failure to provide the required notification will result in 100% charge of the course. If a student does not attend a scheduled course without prior notification it will result in full forfeiture of the funds and no reschedule will be allowed. Within the required notification period, only student substitutions will be permitted. Reschedules are permitted at anytime with 16 or more calendar days notice. Enrollments must be rescheduled within six months of the cancel date or funds on account will be forfeited.

Training Location

Online Classroom
your office

your city, your province
your country   

About Global Knowledge


Global Knowledge is the world's leading learning services and professional development solutions provider. We deliver learning solutions to support customers as they adapt to key business transformations and technological advancements that drive the way that organizations around the world differentiate themselves and thrive. Our learning programs, whether designed for a global organization or an individual professional, help businesses close skills gaps and foster an environment of continuous talent development.

Training Provider Rating

This vendor has an overall average rating of 4.39 out of 5 based on 424 reviews.

No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
No comment
Wasn’t as advanced as I thought it would be. There was an issue when the day my course was the first time they used a new platfo ... Read more

Wasn’t as advanced as I thought it would be. There was an issue when the day my course was the first time they used a new platform.. from adobe to something called zoom; I had to call support line cause it stated our instructor wasn’t present. Thankfully I called cause everyone online was in the adobe virtual classroom waiting for what looked like a teacher who didn’t show up for class (IT didn’t get anything resolved until 10mins after start time). I felt like he was really getting hung up on very basic knowledge for the first half of the course (talking about how to create tabs and drag formulas as an example). I completed files a few times before he was done explaining. There was a scheduled fire drill for them (roughly 30mins)that also cut into our time, which wasn’t deducted from the hour lunch break or the two, fifteen min breaks. I also really wish he touched base more on the automating workbook functions portion which we barely did. I'm happy there were/are those study guides (learning videos) and exams to take on my own time that I hope after I've had the class are still available for me to learn from.

No comment
No comment
No comment
No comment
It was difficult to practice on my PC while trying to watch the presentation online.
No comment
David was excellent!! I am very for having this course!!

Course Reviews

No Reviews Yet