Training Available Through CSSP

Scheduled training is on the CSSP Calendar.

Web-Based Training
Web-based training courses are currently being revised.

Instructor Led Format—Introductory Level
Introduction to Control Systems Cybersecurity (101)—1 day or 8 hrs

Instructor Led Format—Intermediate Level
Intermediate Cybersecurity for Industrial Control Systems (201), lecture only—1 day or 8 hrs

Hands-On Format—Intermediate Level
Intermediate Cybersecurity for Industrial Control Systems (202), with lab/exercises—1 day or 8 hrs

Hands-On Format—Technical Level
ICS Cybersecurity (301)—5 days

The Control Systems Security Program provides training courses and workshops at various industry association events. These courses are packed with up-to-date information on cyber threats and mitigations for vulnerabilities. If your organization would like to learn more about training opportunities, please contact cssp_training@hq.dhs.gov.



Instructor Led Format—Introductory Level

Introduction to Control Systems Cybersecurity (101)

The purpose of this course is to introduce students to the basics of industrial control systems security. This includes a comparative analysis of IT and control system architecture, security vulnerabilities, and mitigation strategies unique to the control system domain.

This course is split into four sessions: (1) Cybersecurity Landscape: Understanding the Risks, (2) Industrial Control Systems Applications, (3) Current State of Cybersecurity in Industrial Control Systems, and (4) Practical Applications of Cybersecurity.  

Back to top


Instructor Led Format—Intermediate Level

Intermediate Cybersecurity for Industrial Control Systems (201), lecture only

This course provides technical instruction on the protection of industrial control systems using offensive and defensive methods. Students will understand how cyber attacks could be launched, why they work, and mitigation strategies to increase the cybersecurity posture of their control system. In addition, this course acts as a prerequisite for the next course, Intermediate Control System Security-Part 2, which offers hands-on application of the concepts presented.

This course is split into four sessions: (1) Current Security in ICS, (2) Strategies Used Against ICS, (3) Defending the ICS, and (4) Preparation and Further Reading for Part 2.

Back to top


Hands-On Format—Intermediate Level

Intermediate Cybersecurity for Industrial Control Systems (202), with lab/exercises

This hands-on course is structured to help students understand exactly how attacks against process control systems could be launched and why they work and to provide mitigation strategies to increase the cyber security posture of their control systems networks.

This course provides a brief review of industrial control systems security. This includes a comparative analysis of IT and control system architecture, security vulnerabilities, and mitigation strategies unique to the control system domain. Because this course is hands-on, students will get a deeper understanding of how the various tools work. Accompanying this course is a sample process control network that demonstrates exploits used for unauthorized control of the equipment and mitigation solutions. This network is also used during the course for the many hands-on exercises that will help the students develop control systems cybersecurity skills they can apply when they return to their jobs.

This course is split into six sessions: (1) Supervisory Control and Data Acquisition (SCADA) and control system overview, (2) Risk to Industrial Control Systems, (3) Exploit demonstration, (4) Basic Control Security Considerations, (5) Network: Security, Identification, and Remediation, and (6) Network: Defense, Detection, and Analysis. The goal of our training today is to give you an understanding of some key issues in cybersecurity related to industrial control systems. Additionally, it will provide you with hands-on training applying the information learned.  

Back to top


Hands-On Format—Technical Level

ICS Cybersecurity (301)—5 days

This event will provide hands-on training in discovering who and what is on the network, identifying vulnerabilities, learning how those vulnerabilities may be exploited, and learning defensive and mitigation strategies for ICS. The week includes a Red Team / Blue Team exercise that takes place within an actual control systems environment. The training provides the opportunity to network and collaborate with other colleagues involved in operating and protecting control system networks.

This event consists of industrial control systems cybersecurity training and a Red Team / Blue Team exercise:

Prerequisites: Each attendee should have an understanding of ICS networks and IT network details. Every student attending this course should bring a laptop computer (with a DVD drive). The user must be able to boot the laptop to an operating system from the DVD.

Back to top