{"id":884,"date":"2023-05-23T06:22:21","date_gmt":"2023-05-23T06:22:21","guid":{"rendered":"https:\/\/certblog.eccouncil.org\/ics-scada-cybersecurity\/"},"modified":"2023-05-23T06:22:21","modified_gmt":"2023-05-23T06:22:21","slug":"ics-scada-cybersecurity","status":"publish","type":"page","link":"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/","title":{"rendered":"ICS\/SCADA Cybersecurity"},"content":{"rendered":"\n<section id=\\\"content\\\" style=\\\"margin-bottom: 0px;\\\">\n\n            <div class=\\\"content-wrap\\\">\n\n                <div class=\\\"container clearfix\\\">\n\n\n                    <div class=\\\"row\\\">\n                        <div class=\\\"col-md-12\\\">\n                            <h4>What is an ICS\/SCADA Cybersecurity?<\/h4>\n                            <p>Industrial automation processes use industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems to control industrial processes locally or remotely and to monitor, gather, and process real-time data.  <\/p>\n                            <p>As the rapid growth of interconnectivity among systems continue (i.e., Internet of Things, Industrial Internet), ICS and SCADA systems are now accessible and becoming high\u2013priority targets for hackers. Cyber criminals have already developed malware threats that can disrupt industrial Operation Technology (OT). Due to the potential impact of an attack on the physical safety of communities, employees, or customers, ICS\/SCADA security is an even higher priority than traditional IT systems.  \n                            <\/p>\n                            <h4>Certification Target Audience<\/h4>\n                            <p>The ICS\/SCADA Cybersecurity course is a hands-on training which will enable you to learn the foundations of security and defend architectures from attacks. You will look at the concept of \u201cthinking like a hacker\u201d to learn techniques to defend from the types of attacks that are commonly conducted against the oil and gas IT corporate and control network.<\/p>\n                            <p>For more information on ICS\/SCADA Cybersecurity exam application process, please <a href=\\\"application-process-eligibility.html?id=icsscada\\\">click here<\/a> <\/p>\n                            <h4>Exam Information<\/h4>\n                            <p>ICS\/SCADA Cybersecurity exam is available at the ECC Exam Center.<\/p>\n                            <p>EC-Council reserves the right to revoke the certification status of candidates that do not comply with all EC-Council examination policies found <a href=\\\"https:\/\/cert.eccouncil.org\/certification-exam-policy.html\\\"><strong>here<\/strong><\/a>.<\/p>\n                          \n                            <table class=\\\"table table-striped table-bordered\\\" style=\\\"width:30%\\\">\n                                <tbody>\n                                    <tr>\n                                        <th colspan=\\\"2\\\">\n                                            ICS\/SCADA Cybersecurity Exam Details\n                                        <\/th>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Duration<\/td>\n                                        <td>2 Hours<\/td>\n                                    <\/tr>\n                                    <tr>\n                                        <td>Questions<\/td>\n                                        <td>75<\/td>\n                                    <\/tr>\n                                <\/tbody>\n                            <\/table>\n                            <a href=\\\"images\/doc\/ICS-SCADA-Exam-Blueprint.pdf\\\" target=\\\"_blank\\\" class=\\\"button button-mini button-blue button-rounded\\\" rel=\\\"noopener\\\"><i class=\\\"icon-fingerprint\\\"><\/i>Blueprint<\/a>\n                            <br><br>\n                             <p class=\\\"mb-2\\\"><i><strong>Clause: Age Requirements and Policies Concerning Minors<\/strong><\/i><\/p>\n                            <p class=\\\"mb-2\\\">The age requirement for attending the training or the exam is restricted to any candidate that is permitted by his\/her country of origin\/residency.<\/p>\n                            <p class=\\\"mb-2\\\">If the candidate is under the legal age as permitted by his\/her country of origin\/residency, they are not eligible to attend the official training or eligible to attempt the certification exam unless they provide the accredited training center\/EC-Council a written consent\/indemnity of their parent\/legal guardian and a supporting letter from their institution of higher learning. Only candidates from a nationally accredited institution of higher learning shall be considered.<\/p>\n                            <p><strong>Disclaimer:<\/strong> EC-Council reserves the right to impose additional restriction to comply with the policy. Failure to act in accordance with this clause shall render the authorized training center in violation of their agreement with EC-Council. EC-Council reserves the right to revoke the certification of any person in breach of this requirement.<\/p>\n                        <\/div>\n\n                    <\/div>\n                <\/div>\n\n            <\/div>\n\n        <\/section>\n","protected":false},"excerpt":{"rendered":"<p>What is an ICS\/SCADA Cybersecurity? Industrial automation processes use industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems to control industrial processes locally or remotely and to monitor, gather, and process real-time data. As the rapid growth of interconnectivity among systems continue (i.e., Internet of Things, Industrial Internet), ICS and SCADA systems [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/tpl-fullwidth-all.php","meta":{"footnotes":""},"class_list":["post-884","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>ICS\/SCADA Cybersecurity - certwebsiteblog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"ICS\/SCADA Cybersecurity - certwebsiteblog\" \/>\n<meta property=\"og:description\" content=\"What is an ICS\/SCADA Cybersecurity? Industrial automation processes use industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems to control industrial processes locally or remotely and to monitor, gather, and process real-time data. As the rapid growth of interconnectivity among systems continue (i.e., Internet of Things, Industrial Internet), ICS and SCADA systems [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"certwebsiteblog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/\",\"url\":\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/\",\"name\":\"ICS\/SCADA Cybersecurity - certwebsiteblog\",\"isPartOf\":{\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/#website\"},\"datePublished\":\"2023-05-23T06:22:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cert.eccouncil.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"ICS\/SCADA Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/#website\",\"url\":\"https:\/\/cert.eccouncil.org\/blog\/\",\"name\":\"certwebsiteblog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cert.eccouncil.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/#organization\",\"name\":\"certwebsiteblog\",\"url\":\"https:\/\/cert.eccouncil.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cert.eccouncil.org\/blog\/wp-content\/uploads\/2023\/04\/logo.webp\",\"contentUrl\":\"https:\/\/cert.eccouncil.org\/blog\/wp-content\/uploads\/2023\/04\/logo.webp\",\"width\":150,\"height\":100,\"caption\":\"certwebsiteblog\"},\"image\":{\"@id\":\"https:\/\/cert.eccouncil.org\/blog\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"ICS\/SCADA Cybersecurity - certwebsiteblog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"ICS\/SCADA Cybersecurity - certwebsiteblog","og_description":"What is an ICS\/SCADA Cybersecurity? Industrial automation processes use industrial control systems (ICS) and supervisory control and data acquisition (SCADA) systems to control industrial processes locally or remotely and to monitor, gather, and process real-time data. As the rapid growth of interconnectivity among systems continue (i.e., Internet of Things, Industrial Internet), ICS and SCADA systems [&hellip;]","og_url":"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/","og_site_name":"certwebsiteblog","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/","url":"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/","name":"ICS\/SCADA Cybersecurity - certwebsiteblog","isPartOf":{"@id":"https:\/\/cert.eccouncil.org\/blog\/#website"},"datePublished":"2023-05-23T06:22:21+00:00","breadcrumb":{"@id":"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cert.eccouncil.org\/blog\/ics-scada-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cert.eccouncil.org\/blog\/"},{"@type":"ListItem","position":2,"name":"ICS\/SCADA Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/cert.eccouncil.org\/blog\/#website","url":"https:\/\/cert.eccouncil.org\/blog\/","name":"certwebsiteblog","description":"","publisher":{"@id":"https:\/\/cert.eccouncil.org\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cert.eccouncil.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cert.eccouncil.org\/blog\/#organization","name":"certwebsiteblog","url":"https:\/\/cert.eccouncil.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cert.eccouncil.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cert.eccouncil.org\/blog\/wp-content\/uploads\/2023\/04\/logo.webp","contentUrl":"https:\/\/cert.eccouncil.org\/blog\/wp-content\/uploads\/2023\/04\/logo.webp","width":150,"height":100,"caption":"certwebsiteblog"},"image":{"@id":"https:\/\/cert.eccouncil.org\/blog\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/cert.eccouncil.org\/blog\/wp-json\/wp\/v2\/pages\/884","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.eccouncil.org\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cert.eccouncil.org\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cert.eccouncil.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.eccouncil.org\/blog\/wp-json\/wp\/v2\/comments?post=884"}],"version-history":[{"count":0,"href":"https:\/\/cert.eccouncil.org\/blog\/wp-json\/wp\/v2\/pages\/884\/revisions"}],"wp:attachment":[{"href":"https:\/\/cert.eccouncil.org\/blog\/wp-json\/wp\/v2\/media?parent=884"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}