b'INL OFFERS 13 ONLINEOT-RELATED TRAINING COURSES VIA THE CISA TRAINING VIRTUAL LEARNING PORTAL (VLP) CCE Workforce Development is team-based training for select individuals who will help Tier 1 partners execute a CCE engagement. This weeklong intensive training is a101 Introduction to ICS Cybersecurity is an introduction combination of classroom instruction, team exercises, quizzesto ICS cybersecurity basics. It includes a comparative and a full-day exercise to simulate a complete CCE effort. analysis of IT and ICS architecture, andbasic cyber-risk mitigation strategies.Mobile Trainings 201 Intermediate Cybersecurity for ICS: Part 1 builds on Instructor-led courses and workshops can be scheduled atconcepts learned in 101, providing technical instruction on venues across the United States and around the world. ICS protection using offensive and defensive methods.Introductory and intermediate instructor-led ICS201 Intermediate Cybersecurity for ICS: Part 2 hands-on cybersecurity training (101, 201, 202 courses) course split into five sessions:Wireless cybersecurity training course 301V/L ICS Cybersecurity Virtual and LabCyberStrike (Lights Out, Nemesisreview of top 10 cyber1.ICS overviewthreats and mitigation strategies, various sector workshops) 2.Network discovery and mapping3.Exploitation and using metasploit Cyber escape rooms 4.Network attacks and exploits5.Network defense, detection and analysisSend requests to schedule an event in your area to:[email protected] and in-person training that includes a red-blue exercise in a CS environment, hands-on experience with open-source OS and security tools, and ICS For more info, contact: [email protected] cyber escape rooms. For more info, visit: https://ics-training.inl.gov/learn0 1 1 0 0 1 1 0 0 1 0 0 1 1 0 0 0 0 1 1 0 0 0 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 1 0 0 1 1 0 00 1 0 0 1 1 0 0 0 1 0 1 1 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 1 0 1 0 01 0 1 0 1 0 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 1 1 0 0 INL Operational Technology Cybersecurity 160 0 0 1 0 0 1 1 0 1 1 0 1 0 0 0 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 01 0 1 1 0 0 0 1 0 1 1 0 1 1 0 0 0 0 1 0 1 I N T E L L I G E N C E 1 1 0 1 0 1 1 0 0 0 1 0 1 1 0 M A C H I N E 0 1 0 11 0 1 0 1 0 0 0 1 L 0 1 0 1 1 0 1 0 0 0 1 1 0 0 1 1 0 0 D E F E N S E 0 1 1 1 1 0 1 0 0 0 L E A R N I N G 1 1 0 1 00 1 1 0 0 1 1 0 0 0 0 1 1 0 0 1 R E S I L I E N C E 1 0 1 0 0 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 1 1 0 1 0 0 0 1 1 0 0 10 1 1 0 0 1 C Y B E R S E C U R I T Y 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 S A F E T Y 1 1 0 1 0 0 1 1 0 0 1 1 0 1 00 1 1 0 0 1 1 0 0 1 0 0 1 1 0 0 0 0 1 1 0 0 0 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 1 0 0 1 1 0 00 1 0 0 1 1 0 0 0 1 0 1 1 0 1 1 0 0 0 1 1 0 1 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0 1 1 0 1 0 01 0 1 0 1 0 0 0 1 0 1 1 0 1 0 1 1 0 1 0 0 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 0 0 1 0 1 1 0 0 1 0 0 1 1 0 1 1 0 00 0 0 1 0 0 1 1 0 1 1 0 1 0 0 0 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 1 0 0 0 1 1 0 0 1 1 0 1 0 0 1 1 0 1 0 0 0 0 1 1 0 0'