Syllabus
The course syllabus consists of 10 modules. Each module is of 1 day duration.
- Introduction to Information Security
- SCADA and Industrial Control System concepts
- Threats, Attacks, and Consequences
- Attack types and sample vectors
- Information security concepts
- Security properties
- Key security protocols
- Introduction to Smart Grid and CPS Security
- Smart grid - a cyber physical system perspective
- SCADA and Energy Management System
- Distribution Management System
- Microgrid & Distributed Energy Resources (DER)
- IT Security vs. Control System Security
- Defense in Depth concept
- Model of control system security
- CPS security life-cycle
- End-to-end system security concepts
- Risk Assessment and Mitigation
- Risk assessment methodology and process
- Qualitative risk assessment
- Quantitative risk assessment
- Attack trees, Defense trees, and Petri-Net based models
- Risk mitigation techniques/algorithms
- Risk mitigation best practices
- Network Security
- Protocol Security - DNP3, ICCP, IEC 61850
- Network security - firewalls
- Intrusion Detection Systems
- Intrusion Prevention Systems
- Defense in Depth
- Vulnerability assessment
- Wireless network security concepts
- AMI Security & Privacy
- Attack-resilient Wide-Area Monitoring, Protection, Control
- Wide-area control algorithms - Attack Generation Control
- Attack vectors
- Defense algorithms
- Attack-resilient control algorithms
- Wide-area monitoring - State Estimation
- Attack vectors
- Defense algorithms
- Security of Wide-Area Measurement System (WAMS)
- Wide-area protection - Remedial Action Schemes
- Attack vectors
- Defense algorithms
- Resilient protection algorithms
- Attack Surface Analysis and Reduction
- Attack surface
- Attack surface analysis
- Attack surface reduction techniques
- Domain-specific Anomaly Detection
- Moving Target Defense
- Supply Chain Security
- Cyber Security Testbeds
- Motivation and needs for testbeds
- Testbed design tradeoffs
- Testbed architectures & federation
- System models, security algorithms, attack vectors, defense modules
- Experimental case studies – e.g., Ukrainian case study
- Use-cases of research/educational collaboration
- Security Standards & Best Practices
- NIST Cyber Security Framework IR7620
- DOE Cybersecurity Roadmap for Energy Delivery Systems
- NERC CIP compliance
- NERC GridEx & E-ISAC
- ICS-CERT & DHS Best Practices
- Vulnerability Disclosure policies
- Cybersecurity Capability Maturity Model (C2M2)
- Cybersecurity Tools & Testbed-based demos/practices
- Demo of cybersecurity tools and practices
- Demo of cybersecurity training modules
- Practice sessions for cybersecurity training (Optional)
- Testbed-based demos/practices and Discussions
- Discussion on research agenda
- Discussion on industry-university collaborative research
- Discussion on educational programs (e.g., graduate course/program)
- Discussion on outreach activities (e.g., cyber defense competition)
- Discussion on workforce development (e.g., industry training)