Skip to main content

NERC CIP Training Bootcamp, Crash Course

NERC CIP Training Boot camp is a  4 Day Hands-on Cybersecurity Certificate

NERC CIP Training Bootcamp,   North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) training bootcamp is a crash course style training program designed and created to meet the needs of the electric in regards to CIP compliance: Cyber Security for NERC CIP Versions 5 & 6 Compliance.

Security specialists, CIP Senior Manager, analysts, designer engineers, system operators, directors of CIP compliance, VPs of operations.

NERC Critical Infrastructure Protection (CIP) training bootcamp is a 4-day crash course empowers attendees with knowledge and skills covering version 5, 6 standards. NERC Critical Infrastructure Protection training bootcamp addresses the role of FERC, NERC and the Regional Entities.


Learn how NERC Critical Infrastructure Protection (CIP) requirements address physical security and cybersecurity of the critical electricity infrastructure of North America including:

References to NERC CIP associated documents
References to Implementation Plan for Cyber Security Standards
References to Mandatory Reliability Standards for CIP
Guidance for Enforcement of CIP Standards
References to NERC CIP Rules
Best practices for managing NERC Compliance
Protecting: physical security, cybersecurity, emergency preparedness and response
Business continuity planning, and recovery from a catastrophic event with emphasis on deterring, preventing, limiting, and recovering from terrorist attacks
Sabotage Reporting
Critical Cyber Asset Identification
Security Management Controls
Personnel & Training
Electronic Security Perimeter(s)
Physical Security of Critical Cyber Assets
Systems Security Management
More…

Learn about:

Concepts behind The Energy Policy Act of 2005 (Energy Policy Act)
Concepts behind Federal Energy Regulatory Commission (Commission or FERC) authority
Concepts behind Reliability of the bulk power system, commonly referred to as the bulk electric system or the power grid
Concepts behind Mandatory cybersecurity reliability standards
Energy Independence and Security Act of 2007 (EISA)
Role of National Institute of Standards and Technology (NIST) for smart grid guidelines and standards

Who Should Attend:

CIP Compliance
IT  cybersecurity
ICS and SCADA cybersecurity
EMS cybersecurity
Field and security operations
Incident response
Project managers
CIP Auditors
Any other staff from electrical utilities who are  maintaining cyber security standards across their enterprise and substations
Generation, transmission and distribution staff working to meet NERC CIP standards

Program Learning Objectives:

Discuss requirements for reliable operation of the Bulk Electric System
List CIP categories of assets to which CIP requirements apply
Describe asset classification criteria and tiers: High, Medium, Low
List similarities and differences between CIP standards in version 5 and 6
Describe NERC filings and FERC rulings on these standards
Deep Dive into the CIP 5,6 requirements and obligations/expectations
Discuss sabotage reporting process
Describe identification and documentation requirements of the Critical Cyber Assets associated with the Critical Assets
Describe roles and responsibilities for minimum security management controls to protect Critical Cyber Assets
Discuss requirements for identification and protection of the Electronic Security Perimeters inside which all Critical Cyber Assets
Describe implementation of physical security programs for the protection of Critical Cyber Assets
Define methods, processes, and procedures for securing those systems determined to be Critical Cyber Assets
Ensure the identification, classification, response, and reporting of cybersecurity incidents related to Critical Cyber Assets
Ensure that recovery plans are put in place for Critical Cyber Assets and that these plans with established business continuity and disaster recovery techniques and practices

Program Coverage and Highlights of Enforcement:

NERC CIP requirements
HIghlights of NERC CIP 5 & 6
Overview of Cyber Security for NERC CIP Versions 5 & 6 Compliance
Asset Identification and Governance
Access Control and Monitoring
System Management
Information Protection and Response
CIP Process highlights
BES Cyber System Categorization
High and medium impact BES vs. low impact BES
Operational Technology (OT) security
Highlights of known ICS vulnerabilities
Configuration Change Management & Vulnerability Assessments
Cyber Security for NERC CIP Compliance
Electronic Security Perimeter(s)
Information Protection
Incident Reporting and Response Planning
Personnel & Training
Physical Security
More…

Learn approaches for identifying and categorizing BES Cyber Systems and requirements to implement and comply the standards including strategies for the version 5, 6 requirements. TONEX is the industry leader in Cyber Security and NERC CIP. Our courses are planned, designed and developed by NERC CIP experts in CIP implementation and audits.

Learn more about NERC CIP training bootcamp from Tonex. Visit Tonex.com for more information.

NERC CIP Training Bootcamp, Crash Course

Comments

Popular posts from this blog

Renewable energy

Renewable energy is making its move. Eighteen percent of all electricity in the United States was produced by renewable sources in 2017, including solar, wind and hydroelectric dams. That’s up from 15 percent in 2016. According to data released by the International Renewable Energy Agency (IRENA), by the end of 2017, global renewable generation capacity increased by 167 GW (gigawatts) and reached 2,179 GW worldwide. This represents a yearly growth of around 8.3 percent, the average for seven straight years in a row. According to the National Renewable Energy Laboratory and the Department of Energy, renewable energy is important because of:

Most Popular Cloud Security, Cloud Computing Training Crash Course

Cloud Security in this COVID-19 Time: Right now, COVID-19 has rendered millions of people at home and the corporate firms cybersecurity is at risk. Because the officials are not capable enough to work via their secure office network and the security breachers and hackers are availing this opportunity. They are defiling the network and trying to steal your confidential information. It’s time to secure your network today. Cloud security is the assurance of data put away online from burglary, spillage and erasure. Why Cloud Security Is Important ? Cloud security is important for both business and individual clients. Everybody needs to realize that their information is sheltered and secure and organizations have lawful commitments to keep customer data secure, with specific areas having increasingly severe guidelines about data storage. Cloud Security Training Crash Course by Tonex : Cloud Security Training Boot Camp by Tonex gives specialized subtleties on information, data, and storage ...

Root Cause Analysis For Supervisors, Learn RCA Best Tools and Methods

What is Root Cause Analysis? Root Cause Analysis is acronymic as RCA. Unlike other methodologies, root cause analysis (RCA) is in general more successful when there’s a small, focused team involved in looking for answers. A root cause analysis is an approach, process used to discover the primary source of a problem. RCA has become a popular methodology for companies stern about resolving issues that negatively impact their bottom line. Why Root Cause Analysis For Supervisors ? It’s not bizarre to have a supervisor lead an RCA team comprises of communication staff, research staff and personnel from the department or departments being affected by a serious problem. How to Conduct Root Cause Analysis ? The main goal of RCA is to identify the root cause of the problem. The first and possibly most important step is to identify possible causal factors.  The RCA team should set the vision, identify the problem and collect as much data as need to better understand the situation. That data...