This is a representation of INL’s 2019 participants in the DHS Industrial Control Systems Cybersecurity (301) course.
N&HS training and exercises emphasize multi-agency collaboration, partnering and sharing of experts and research facilities. This approach accelerates the maturation of technologies and methodologies from the conceptual to deployment stages; optimizes the benefits of leveraging investments in expertise, research programs and technical infrastructure; and creates effective environments for immediate information sharing of discoveries and emerging threats.
N&HS develops and deploys training and exercises to enhance critical infrastructure security for industrial control systems. The following trainings are developed and conducted with support from the U.S. Department of Homeland Security and aligned with Cybersecurity and Infrastructure Security Agency certifications. INL offers training development virtually, in the classroom, and on location for a broad range of control systems cybersecurity topics, including:
INL’s extensive critical infrastructure site and integrated laboratories also offer hands-on classroom training on the basics of industrial control systems security. We offer foundational courses open to everyone and intermediate to advanced customizable courses for industry and government.
We develop and deploy required, advanced and customized individual and team training and exercises for National Guard Bureau’s Civil Support Team (CST) program. The exercise template developed by INL will build off of the ARDT and CST Team Training efforts and annual requirements. Templates can be used at RRTR or at the CST’s home state.
INL can provide sources, SMEs and RadCon support. Capabilities also include:
For more information on Radiological Response Training, contact: Bryon.Marsh@inl.gov
PINS Operator – training in the basic physics, radiation safety, and operation and maintenance of the various PINS systems. The training is geared to the particular variant that the students possess.
Pyroprocessing for the Analyst – Discuss pyroprocessing purpose, methods, and proliferation concerns with nuclear materials security analysts.
IAEA PDDT Training – detection of plutonium diversion using IAEA techniques and approaches.
Instrumentation and Data Collection Methods – Instrumentation and Data Collections Methods for International Atomic Energy Agency (IAEA).
Nuclear Infrastructure, Assessment and Disablement Course (NIAD) – Provide US Army 20th CBRNE Command training on nuclear infrastructure, assessment and disablement (NIAD).
|Training Title or Topic||Short Description||Host or Sponsor||Who is this training for?||Location||Register or Contact Info||Phone|
|CISA Virtual Learning Portal||We offer several online training courses via the CISA Training Virtual Learning Portal (VLP).||DHS||Public||Virtual||Learn More|
|Cyber Strike||This workshop enhances the ability of energy sector owners and operators in the U.S to prepare for a cyber incident impacting industrial control systems.||DOE||Public, Industry||On Customer Site, INL Campus||Learn More||Daniel Noyes: 208 526-0516|
|Cyber Fire||Cyber Fire Foundry guides you through creating custom solutions for investigating cybersecurity incidents.||DOE||Industry||On Customer Site, INL Campus||Learn More|
|ARMY Cybersecurity for Industrial Control Systems OT Assessment Training||This course is intended for U.S. military and/or Department of Defense personnel assigned to conduct cyber vulnerability evaluations of DOD critical infrastructure.||DOD||DOD and Industry||On Customer Site||Learn More|
|Army or Navy Cyber||This is a short description providing detail about this training||DOD||DOD||Virtual, INL Campus||Learn More|
|aCCElerate||Course will provide participants with a fundamental knowledge of the CCE methodology focused on securing the nation’s critical infrastructure systems. Participants should be critical infrastructure owners, operators, vendors, and manufacturers.||INL||Public, Industry||Virtual, INL Campus||Learn More|
|Intermediate Cybersecurity for Industrial Control Systems (201) Part 1||This course builds on the concepts learned in the Introduction to ICS Cybersecurity (101) course. This course provides technical instruction on the protection of Industrial Control Systems using offensive and defensive methods||DHS||Industry||Various locations per DHS||Learn More||Mark Permann: 208-526-8133|
|Intermediate Cybersecurity for Industrial Control Systems (202) Part 2||This hands-on course is structured to help students recognize how attacks against Process Control Systems can be launched, why they work, and provides mitigation strategies to increase the cyber security posture of their Control Systems networks.||DHS||Industry||Various locations per DHS||Learn More||Mark Permann: 208-526-8133|
|Industrial Control Systems Cybersecurity (301)||This course provides extensive hands-on training on understanding, protecting, and securing Industrial Control Systems (ICS) from cyber attacks and includes a Red Team/Blue Team exercise conducted within an actual Control Systems environment||DHS||Industry||Virtual, INL Campus||Learn More|
|Industrial Control Systems Evaluation (401)||This instructor-led 5-day course provides hands-on training on how to analyze, evaluate, and document the cybersecurity posture of an organization’s Industrial Control Systems (ICS) for the purpose of identifying recommended changes.||DHS||Industry||Virtual, INL Campus||Learn More|