Trainer

            Abdelkader Shaaban, Austrian Institute of Technology

Session Details

  1. Session Title:
    Cybersecurity in the Energy Domain: Theories and Strategies for Network Protection 
  2. Session Description:
    The session will include an overview and discussion of common network protocols, such as TCP/IP, along with topics on internet and web security. Additionally, the session will provide an introduction to the energy domain and highlight the most common cybersecurity vulnerabilities within this sector.
  3. Key Learning Objectives:
    Understanding the fundamental concepts of network security.
    Acquire knowledge about common vulnerabilities and threats in specific network systems and their associated protocols, including not only TCP/IP but also those used in industrial communication networks.
    Gain knowledge in the most relevant security protocols, such as SSL/TLS and IPSec, and understand their critical role in protecting systems and communication networks.
    Gain a basic understanding of security in the energy domain and identify the most common security vulnerabilities in this sector.

Lab Details

  1. Lab Title:
    Practical Activities on Network Cyberattacks and Protection Strategies
  2. Lab Description:
    The practical activities lab will cover a variety of exercises designed to demonstrate how cyberattacks can compromise network data and highlight the importance of implementing robust cybersecurity measures to minimize cyber risks. These activities will include code injection, packet injection, DoS attacks, ARP spoofing, packet sniffing, and more, alongside prevention and detection methods to mitigate network-related cyber risks. The lab will be conducted within the GNS3 network simulation environment to simulate all planned practical activities in a secure, closed virtual environment.
  3. Key Learning Objectives:
    An understanding of how various cyberattacks can compromise network security and emphasize the importance of implementing effective protection mechanisms to secure networks.
    Provide insights into designing and implementing detection and prevention mechanisms to protect network assets and associated data.
  4. Tools/Software Required:
    The practical lab will be conducted within a virtual environment using the GNS3 network simulator. Participants will be required to set up separate virtual machines to simulate a network, highlighting the roles of attacker and victim machines within the GNS3 network.

This course aims to provide a clear vision and understanding of current needs, especially those related to the secure deployment of energy control networks and access to their data. The idea is then to show and provide the minimum tools to not only protect communication channels and hosts, but also to give guarantees of “defence in depth” (only at communication level).

Trainers:

Duration: 20h. 

ECTS (microcredentials): 4

This course aims to provide a clear vision and understanding of current needs, especially those related to the secure deployment of energy control networks and access to their data. The idea is then to show and provide the minimum tools to not only protect communication channels and hosts, but also to give guarantees of “defence in depth” (only at communication level).

Trainers:

Duration: 20h. 

ECTS (microcredentials): 4