org.1 Security Policy |
Compliance, Cybersecurity assessment, Risk and Vulnerability Management, Communications plan |
Cybersuspicion |
Partial coverage |
CyberDuel |
Partial coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Partial coverage |
Cyber suspicion |
Partial coverage |
CyberDuel |
Partial coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Partial coverage |
T06. Industrial cybersecurity incident management workshop |
Partial coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Partial coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Partial coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Partial coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Partial coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Partial coverage |
org.2 Security standard |
Compliance |
Publications specialized in Industrial Cybersecurity |
Full coverage |
T01. Practical workshop to assess maturity in the industrial cybersecurity process |
Full coverage |
T01. Practical workshop on maturity assessment in the industrial cybersecurity process |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
T06. Industrial cybersecurity incident management workshop |
Full coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Full coverage |
Publications specialized in Industrial Cybersecurity |
Full coverage |
org.3 Security procedures |
Compliance, Use control policy, Activity log policy, Backup Policy |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Partial coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
T06. Industrial cybersecurity incident management workshop |
Partial coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Partial coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Partial coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Partial coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Partial coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
org.4 Authorization process |
Account management, PKI infrastructure |
|
|
op.pl.1 Risk analysis |
Cybersecurity assessment, Risk and Vulnerability Management |
Cybersuspicion |
Partial coverage |
Cyber suspicion |
Partial coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Partial coverage |
CyberDuel |
Partial coverage |
CyberDuel |
Partial coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Partial coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
op.pl.2 Security architecture |
Network communications control, Secure network design |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Partial coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Partial coverage |
Cybersuspicion |
Partial coverage |
Cyber suspicion |
Partial coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Partial coverage |
CyberDuel |
Partial coverage |
CyberDuel |
Partial coverage |
op.pl.3 Acquisition of new components |
Configuration control, Equipment use control, Device control |
|
|
op.pl.4 Sizing / Capacity Management |
Hardware and software inventory, Redundancy system |
M01. Online Professional Master of Industrial Cybersecurity |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Partial coverage |
op.pl.5 Certified components |
Certification of the main ICS providers |
|
|
op.acc.1 Identification |
Hardware and software inventory, Access control policy |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Partial coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Partial coverage |
Cybersuspicion |
Partial coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Partial coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Partial coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Full coverage |
op.acc.2 Access requirements |
Basic user access control, Multi-factor user access control, Access control policy |
Cybersuspicion |
Partial coverage |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Partial coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Partial coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Partial coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Partial coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Partial coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Partial coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Partial coverage |
op.acc.3 Segregation of functions and tasks |
Account management |
|
|
op.acc.4 Access rights management process |
Device control, Account management |
|
|
op.acc.5 op.acc.5 Authentication methods (external users) |
Hardware Security Keys, Basic user access control, Multi-factor user access control |
|
|
op.acc.6 op.acc.6 Authentication methods (organization\'s users) |
Hardware Security Keys, Basic user access control, Multi-factor user access control |
|
|
op.exp.1 Asset inventory |
Hardware and software inventory |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Full coverage |
op.exp.2 Security configuration |
Configuration control |
|
|
op.exp.3 Security Configuration Management |
Configuration control |
|
|
op.exp.4 Maintenance and security updates |
Reliable updates, Upgrade testing support |
|
|
op.exp.5 Change Management |
Configuration control |
|
|
op.exp.6 Protection against malicious code |
Advanced antimalware |
|
|
op.exp.7 Incident Management |
Incident response support |
T06. Industrial cybersecurity incident management workshop |
Full coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Full coverage |
op.exp.8 Activity log |
Inspect endpoint logs, Activity log policy |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Partial coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Partial coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Partial coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Partial coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Partial coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Partial coverage |
op.exp.9 Incident management log |
Inspect endpoint logs, Activity log policy |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Partial coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Partial coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Partial coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Partial coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Partial coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Partial coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Partial coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Partial coverage |
op.exp.10 Protection of cryptographic keys |
PKI infrastructure |
|
|
op.ext.1 Contracting and service level agreements |
Certification of the main ICS providers |
|
|
op.ext.2 Day-to-day management |
Account management |
|
|
op.ext.3 Supply Chain Protection |
Awareness and Training |
OT Risk Awareness |
Full coverage |
OT risk awareness |
Full coverage |
Cybersuspicion |
Full coverage |
Cyber suspicion |
Full coverage |
T01. Practical workshop to assess maturity in the industrial cybersecurity process |
Full coverage |
T01. Practical workshop on maturity assessment in the industrial cybersecurity process |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
T06. Industrial cybersecurity incident management workshop |
Full coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
T07 - Cybersecurity Workshop in the Life Cycle of an industrial digitalization project |
Full coverage |
C03. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
C05. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
CyberDuel |
Full coverage |
CyberDuel |
Full coverage |
op.ext.4 Systems interconnection |
Network communication visualization |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
op.nub.1 Cloud services protection |
Data Protection |
|
|
op.cont.1 Impact analysis |
Risk and Vulnerability Management |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Full coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
op.cont.2 Continuity plan |
Redundancy system, Backup system |
|
|
op.cont.3 Periodic tests |
Upgrade testing support |
|
|
op.cont.4 Alternative means |
Redundancy system |
|
|
op.mon.1 Intrusion detection |
Industrial DPI for anomaly detection, Advanced detection of anomalies in the IP layer |
|
|
op.mon.2 Metrics system |
SIEM integration |
|
|
op.mon.3 Monitoring |
Network communication visualization |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
mp.if.1 Separate and access controlled areas |
Physical security in the installation of devices, Separation of environments |
|
|
mp.if.2 Identification of persons |
Hardware Security Keys |
|
|
mp.if.3 Fitting out of the premises |
Physical security in the installation of devices |
|
|
mp.if.4 Electrical energy |
Redundancy system |
|
|
mp.if.5 Fire protection |
Physical security in the installation of devices |
|
|
mp.if.6 Flood protection |
Physical security in the installation of devices |
|
|
mp.if.7 Entry and exit registration of equipment log |
Equipment protection diagnostics |
|
|
mp.per.1 Job description |
Awareness and Training |
OT Risk Awareness |
Full coverage |
OT risk awareness |
Full coverage |
Cybersuspicion |
Full coverage |
Cyber suspicion |
Full coverage |
T01. Practical workshop to assess maturity in the industrial cybersecurity process |
Full coverage |
T01. Practical workshop on maturity assessment in the industrial cybersecurity process |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
T06. Industrial cybersecurity incident management workshop |
Full coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
T07 - Cybersecurity Workshop in the Life Cycle of an industrial digitalization project |
Full coverage |
C03. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
C05. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
CyberDuel |
Full coverage |
CyberDuel |
Full coverage |
mp.per.2 Duties and obligations |
Awareness and Training |
OT Risk Awareness |
Full coverage |
OT risk awareness |
Full coverage |
Cybersuspicion |
Full coverage |
Cyber suspicion |
Full coverage |
T01. Practical workshop to assess maturity in the industrial cybersecurity process |
Full coverage |
T01. Practical workshop on maturity assessment in the industrial cybersecurity process |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
T06. Industrial cybersecurity incident management workshop |
Full coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
T07 - Cybersecurity Workshop in the Life Cycle of an industrial digitalization project |
Full coverage |
C03. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
C05. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
CyberDuel |
Full coverage |
CyberDuel |
Full coverage |
mp.per.3 Awareness |
Awareness and Training |
OT Risk Awareness |
Full coverage |
OT risk awareness |
Full coverage |
Cybersuspicion |
Full coverage |
Cyber suspicion |
Full coverage |
T01. Practical workshop to assess maturity in the industrial cybersecurity process |
Full coverage |
T01. Practical workshop on maturity assessment in the industrial cybersecurity process |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
T06. Industrial cybersecurity incident management workshop |
Full coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
T07 - Cybersecurity Workshop in the Life Cycle of an industrial digitalization project |
Full coverage |
C03. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
C05. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
CyberDuel |
Full coverage |
CyberDuel |
Full coverage |
mp.per.4 Training |
Awareness and Training |
OT Risk Awareness |
Full coverage |
OT risk awareness |
Full coverage |
Cybersuspicion |
Full coverage |
Cyber suspicion |
Full coverage |
T01. Practical workshop to assess maturity in the industrial cybersecurity process |
Full coverage |
T01. Practical workshop on maturity assessment in the industrial cybersecurity process |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
T06. Industrial cybersecurity incident management workshop |
Full coverage |
T06. Workshop of Industrial Cybersecurity Incident Management |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
T07 - Cybersecurity Workshop in the Life Cycle of an industrial digitalization project |
Full coverage |
C03. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
C05. Cybersecurity course in the design, operation and industrial maintenance of the sector |
Full coverage |
CyberDuel |
Full coverage |
CyberDuel |
Full coverage |
mp.eq.1 Clear workstation |
Equipment use control |
|
|
mp.eq.2 Workstation locking |
Equipment use control |
|
|
mp.eq.3 Protection of portable equipment |
Equipment use control |
|
|
mp.eq.4 Other network-connected devices |
Device control |
|
|
mp.com.1 perimeter security |
Host-based firewall |
|
|
mp.com.2 Confidentiality protection |
Data Protection |
|
|
mp.com.3 Integrity and authenticity protection |
Verification of integrity of software and hardware code |
|
|
mp.com.4 Separation of information flows in the network |
Secure network design |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Full coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Full coverage |
Cybersuspicion |
Full coverage |
Cyber suspicion |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Full coverage |
CyberDuel |
Full coverage |
CyberDuel |
Full coverage |
mp.si.1 Support marking |
Industrial network event log (forensic analysis) |
|
|
mp.si.2 Cryptography |
PKI infrastructure |
|
|
mp.si.3 Custody |
Equipment protection diagnostics |
|
|
mp.si.4 Transport |
WI-FI control, Network communications control, Network integrity control, Data Protection |
|
|
mp.si.5 Erased and destruction |
Backup Policy |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Full coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Full coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
mp.sw.1 Application development |
Software usage control, Verify PLC integrity |
|
|
mp.sw.2 Acceptance and commissioning |
Cybersecurity assessment |
Cybersuspicion |
Full coverage |
CyberDuel |
Full coverage |
T02. Workshop on cybersecurity diagnosis in an industrial automation environment |
Full coverage |
Cyber suspicion |
Full coverage |
CyberDuel |
Full coverage |
T02. Workshop of Diagnosis of cybersecurity in an industrial automation environment |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects) |
Full coverage |
RECIN (IEC 62443 cybersecurity requirements identification platform in projects |
Full coverage |
mp.info.1 Personal information |
Data Protection |
|
|
mp.info.2 Information qualification |
Use control policy |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Full coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Full coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |
mp.info.3 Electronic signature |
PKI infrastructure |
|
|
mp.info.4 Timestamps |
Security log, File integrity monitoring |
|
|
mp.info.6 Backup |
Backup system |
|
|
mp.s.1 E-mail protection |
Network communications control, Host-based firewall |
|
|
mp.s.2 Protection of web services and applications |
Device control |
|
|
mp.s.3 Web browsing protection |
Network communications control, Host-based firewall |
|
|
mp.s.4 Denial of service protection |
Network communications control, Device control, Host-based firewall |
|
|
mp.info.5 Document cleaning |
Backup Policy |
T04. Practical workshop on the application of an industrial cybersecurity management system |
Full coverage |
T04. Workshop of Application of an Industrial Cybersecurity Management System |
Full coverage |
M01. Online Professional Master of Industrial Cybersecurity |
Full coverage |
M01. Online Professional Master in Industrial Cybersecurity |
Full coverage |
C01. Multidisciplinary course on Digital Security in Industry [4.0] and Protection of being |
Full coverage |
C01. Multidisciplinary Course on Digital Security in Industry [4.0] and Protection of Esse |
Full coverage |
C02. Course on Cybersecurity Manager in IACS (Industrial Automation and Control Systems) |
Full coverage |
C02. Course of Cybersecurity Responsible in IACS (Industrial and Automation Control System |
Full coverage |