🛡️Rail Cybersecurity
Log in
Home
Courses
Dashboard
Instructors
Term Conditions
Contact
Search
Home
Courses
Rail Operational Technology (OT) Cyber Security
Rail Operational Technology (OT) Cyber Security
Curriculum
13 Sections
52 Lessons
7 Weeks
Expand all sections
Collapse all sections
Module 1 – Introduction to Cybersecurity in Rail
Introduction to the course
5
1.1
Meet the presenters and discover the course objectives
1.2
Explore TS50701, IEC63452, and their importance to rail cybersecurity
1.3
Gain insights into cybersecurity principles and the IT/OT divide
1.4
Understand the unique challenges and threats facing the rail industry
1.5
Module 1 Quiz – Identifying personal expectations of the course and foundational knowledge
0 Questions
Module 2: Threat Landscape and Incident Examples
5
2.1
Discover key cybersecurity statistics and attack trends in rail
2.2
Learn from real-world incidents like WannaCry and the Lodz Tram hack
2.3
Explore vulnerabilities in rail systems and potential future threats
2.4
See how proactive measures can mitigate risks
2.5
Module 2 Quiz – Assess a simulated attack scenario and identify how it happened
0 Questions
Module 3 – Standards, Guidance, and Compliance
5
3.1
Get an introduction to key standards like IEC62443 and ISO27000
3.2
Understand how legislation such as NIS2 impacts rail cybersecurity
3.3
Explore practical guidance tools like Cyber Essentials and NIST frameworks
3.4
Learn how to apply standards to real-world scenarios
3.5
Module 3 Quiz – Match rail cybersecurity scenarios to relevant standards
0 Questions
Module 4 – Railway System Cybersecurity Modelling
5
4.1
Explore the taxonomy and classification of railway systems
4.2
Learn how to create railway zone models and assess criticality levels
4.3
Understand the importance of IT/OT separation and IoT considerations
4.4
Develop communication matrices for effective cybersecurity planning
4.5
Module 4 Quiz – Identify and build the features of high-level zone models for a railway system
0 Questions
Module 5 – Overall Security Management
5
5.1
Discover how to develop a robust OT cybersecurity programme
5.2
Learn best practices for supply chain and inventory management
5 Minutes
5.3
Explore strategies for security awareness and training
5.4
Understand architecture constraints in managing cybersecurity
5.5
Module 5 Quiz – An exercise to understand the key high-level features cybersecurity management plan
0 Questions
Module 6 – Cybersecurity Across the Lifecycle
5
6.1
Understand cybersecurity integration at every lifecycle stage
6.2
Explore interfaces between design, safety, and security processes
6.3
See how concepts from previous modules apply to lifecycle management
6.4
Gain insight into validation, maintenance, and decommissioning
6.5
Module 6 Quiz – Map cybersecurity actions to lifecycle stages
0 Questions
Module 7a – Identifying SuC and Initial Risk Assessment
4
7.1
Define the System under Consideration (SuC)
7.2
Map out the threat environment and security perimeters
7.3
Conduct an initial cybersecurity risk assessment
7.4
Use Annexes A and E for zoning and threat environment insights
Module 7b – Detailed Risk Assessment
4
8.1
Perform a full threat and vulnerability assessment
8.2
Learn risk acceptance principles and apply codes of practice
8.3
Determine security levels (SL-T) and evaluate countermeasures
8.4
Compare residual risk with tolerable risk levels
Module 8 – Cybersecurity Requirements Specification
5
9.1
Discover how to specify and allocate cybersecurity requirements
9.2
Learn strategies for conflict resolution and compensating countermeasures
9.3
Explore the role of SecRACs in system and subsystem requirements
9.4
Address shared cybersecurity needs across interconnected systems
9.5
Module 8 Quiz – Draft cybersecurity requirements for a railway subsystem
0 Questions
Module 9: Assurance and Handover
5
10.1
Gain insight into verification, validation, and cybersecurity case creation
10.2
Learn best practices for integration and handover processes
10.3
Understand the role of independent cybersecurity assessors
10.4
See how assurance activities ensure system compliance
10.5
Module 9 Quiz – Work through an example process of verification of a cybersecurity system
0 Questions
Module 10: Operations, Maintenance, and Disposal
5
11.1
Learn how to manage incidents and vulnerabilities effectively
11.2
Explore strategies for security monitoring and patch management
11.3
Understand best practices for remote access and maintenance
11.4
Discover how to address cybersecurity during decommissioning
11.5
Module 10 Quiz – Respond to a simulated cybersecurity incident in an interactive scenario
0 Questions
Module 11: Legacy Systems and Role Competence
5
12.1
Identify risks and implement countermeasures for legacy systems
12.2
Learn the basics of zoning, defence-in-depth, and risk analysis
12.3
Explore the European Cyber Skills Framework and role definitions
12.4
Discover best practices for training and asset inventory management
12.5
Module 11 – Develop a risk mitigation plan for a legacy railway system, identifying what is and is not possible to achieve
0 Questions
Module 12: Good Practices and Conclusion
5
13.1
Review key lessons from the course and future applications
13.2
Learn about secure coding practices and memory-safe languages
13.3
Explore tools like CyRail for enhancing rail cybersecurity
13.4
Discover best practices for managing cyber risks in rail
13.5
Module 12 Quiz – Test your knowledge and share your insights
0 Questions
This content is protected, please
login
and
enroll
in the course to view this content!
Modal title
Main Content