INDUSTRY 4.0: BIG DATA
INTRODUCTION TO INDUSTRY 4.0
Introduction to Industry 4.0 is a program designed to introduce to the participants about the key design principles and components of the new revolution, its key challenges, and the new potential opportunities for the entire value chain of the implementation. In the current industry environment, providing high-end quality service or product with the least cost is the key to success and industrial factories are trying to achieve as much performance as possible to increase their profit as well as their reputation. In this way, various data sources are available to provide worthwhile information about different aspects of the factory. In this stage, the utilization of data for understanding current operating conditions and detecting faults and failures is an important topic to research. In contrast, in an Industry 4.0 factory, in addition to condition monitoring and fault diagnosis, components and systems are able to gain self-awareness and self-predictive, which will provide management with more insight on the status of the factory.
By the end of the course, participants will be able to understand how the system integration works between various aspects of the Industry 4.0 which include Supply Chain, Cloud Computing, Cyber Security, Additive Manufacturing, Autonomous Robot, Augmented Reality, Industrial Internet of Things, Big Data Analytics, and Horizontal & Vertical Integration. Participants will also be introduced to the basic understanding of each pillar which include its working principles, benefits, pro and cons, and key challenges.
- National Strategic Road Map on IoT
- Defining Industry 4.0
- The Enablers of the New Revolution
- Industry 4.0 Framework and Blueprint
- Introduction to 9 Pillars of Industry 4.0
- Pillar 1 – 4 (Supply Chain, IIoT, Cloud, Big Data Analytics)
- Pillar 5 – 9 (Cyber Security, Augmented Reality, Additive Manufacturing, Horizontal & Vertical Integration, Autonomous Robots)
- Key Benefits to the Industry
- Sharing of Best Practices from Industry 4.0 Pioneers
- Convergence and Operational Technology and Information Technology
CYBER SAFE OVERVIEW
Regardless of your computer experience, this class will help you become more aware of technology-related risks and what you can do to protect yourself and your organization from them. In this course, you will explore the hazards and pitfalls and learn how to use technology safely and securely.
By the end of the course, participants will be able to:
- Understand security compliance considerations, social engineering, malware, and various other data security-related concepts
- Identify many of the common risks involved in using conventional end-user technology, as well as ways to use it safely, to protect yourself from those risks
Module 1: Identifying the Need for Security
- Identify Security Compliance Requirements
- Recognize Social Engineering
Module 2: Securing Devices
- Maintain Physical Security of Devices
- Use Passwords for Security
- Protect Your Data
- Identify and Mitigate Malware
- Use Wireless Devices Securely
Module 3: Using the Internet Securely
- Browse the Web Safely
- Use Email Securely
- Use Social Networking Securely
- Use Cloud Services Securely
CYBER FIRST RESPONDER (CFR) 2.0
This course covers the duties of those who are responsible for monitoring and detecting security incidents in information systems and networks, and for executing a proper response to such incidents. Depending on the size of the organization, this individual may act alone or may be a member of a cybersecurity incident response team (CSIRT).
The course introduces tools and tactics to manage cybersecurity risks, identify various types of common threats, evaluate the organization's security, collect and analyse cybersecurity intelligence, and handle incidents as they occur. Ultimately, the course promotes a comprehensive approach to security aimed toward those on the front lines of defence.
This course is designed to assist students in preparing for the CyberSec First Responder (Exam CFR-210) certification examination. What you learn and practice in this course can be a significant part of your preparation.
Module 1: Assessing Information Security Risk
- Identify the Importance of Risk Management
- Assess Risk
- Mitigate Risk
- Integrate Documentation into Risk Management
Module 2: Creating an Information Assurance Lifecycle Process
- Evaluate Information Assurance Lifecycle Models
- Align Information Security Operations to the Information Assurance Lifecycle
- Align Information Assurance and Compliance Regulations
Module 3: Analysing Threats to Computing and Network Environments
- Identify Threat Analysis Models
- Assess the Impact of Reconnaissance Incidents
- Assess the Impact of Systems Hacking Attacks
- Assess the Impact of Malware
- Assess the Impact of Hijacking and Impersonation Attacks
- Assess the Impact of Denial of Service Incidents
- Assess the Impact of Threats to Mobile Infrastructure
- Assess the Impact of Threats to Cloud Infrastructures
Module 4: Designing Secure Computing and Network Environments
- Information Security Architecture Design Principles
- Design Access Control Mechanisms
- Design Cryptographic Security Controls
- Design Application Security
- Design Computing Systems Security
- Design Network Security
Module 5: Operating Secure Computing and Network Environments
- Implement Change Management in Security Operations
- Implement Monitoring in Security Operations
- Test and Evaluate Information Assurance Architectures
Module 6: Assessing the Security Posture Within a Risk Management Framework
- Deploy a Vulnerability Assessment and Management Platform
- Conduct Vulnerability Assessments
- Conduct Penetration Tests on Network Assets
- Analyse and Report Penetration Test Results
Module 7: Collecting Cybersecurity Intelligence Information
- Deploy a Security Intelligence Collection and Analysis Platform
- Collect Data from Security Intelligence Sources
- Establish Baselines and Make Sense of Collected Data
Module 8: Analysing Cybersecurity Intelligence Information
- Analyse Security Intelligence to Address Incidents
- Incorporate Security Intelligence and Event Management
Module 9: Responding to Cybersecurity Incidents
- Deploy an Incident Handling and Response Architecture
- Perform Real-Time Incident Handling Tasks
- Prepare for Forensic Investigation
Module 10: Investigating Cybersecurity Incidents
- Create a Forensics Investigation Plan
- Securely Collect Electronic Evidence
- Identify the Who, Why, and How of an Incident
- Follow Up on the Results of an Investigation
Module 11: Auditing Secure Computing and Network Environments
- Deploy a Systems and Processes Auditing Architecture
- Maintain a Deployable Audit Toolkit
- Perform Audits Geared Toward the Information Assurance Lifecycle
WHO SHOULD ATTEND
This course is designed primarily for cybersecurity practitioners who perform job functions related to protecting information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation.
This course focuses on the knowledge, ability, and skills necessary to provide for the defence of those information systems in a cybersecurity context, including protection, detection, analysis, investigation, and response processes. In addition, the course ensures that all members of an IT team—from help desk staff to the Chief Information Officer—understand their roles in these security processes
- At least two years (recommended) of experience in computer network security technology or a related field.
- Recognize information security vulnerabilities and threats in the context of risk management.
- Operate at a foundational level some of the common operating systems for computing environments.
- Foundational knowledge of the concepts and operational framework of common assurance safeguards in computing environments. Safeguards include, but are not limited to, basic authentication and authorization, resource permissions, and anti-malware mechanisms.
- Operate at a foundational level some of the common concepts for network environments, such as routing and switching.
- Foundational knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
- Foundational knowledge of the concepts and operational framework of common assurance safeguards in network environments. Safeguards include, but are not limited to, firewalls, intrusion prevention systems, and virtual private networks (VPNs).
The 5 days training are instructor-led training with access to remote training labs. Labs within a course can be accessed via the Logical Operations. Located through a tile on the CHOICE learning platform, LogicalLABS allow students to learn in actual software applications through a remote lab environment.
Note: Broadband Internet connection (Recommended: Network bandwidth of over 4 Mbps)
8 days (mandatory to attend all training days)
Introduction to Industry 4.0: 2 Days
Cyber Safe Overview: 1 Day
Cyber First Responder: 5 Days
1, 1415 April
5, 6, 19, 20 May
Funded by HRDF under the National Empowerment In Certification And Training For Next Generation Workers (NECT-Gen – Industry 4.0) Program
TERMS & CONDITIONS
- Participants must be Malaysian
- Participants must be an employee of an HRDF levy-contributing company
- Applicants must fulfill the track prerequisites
- Participants must attend all training sessions and fill up all relevant attendance and evaluation forms
- Participants are not allowed to withdraw from the Program once their registration is approved
- Participants must sit for all relevant examinations after attending the training
- Any revision or re-examination attempt by participants will be at their own cost
- Participants must complete the Tracer Study forms (after 6 months) and submit a copy of their Certificate to PSDC