Introduction to Control Systems Cybersecurity

Training Code
On Demand
Location type
Related topics:


The 401V course provides training on analyzing and doing a self-evaluation on an Industrial Control Systems (ICS) network to determine its defense status and what changes need to be made.

The purpose of the course is to provide hands-on training analyzing, evaluating, and documenting the cybersecurity posture of an ICS system for internal and/or external recommended changes. Specifically, this course will utilize a repeatable process within a simulated ICS environment to analyze cybersecurity weaknesses and threats, evaluate and map findings, and document potential mitigations. Trainees will leave with a template that can be used for evaluations at their workplace.

The online course consists of pre-recorded videos and hands-on activities compiled into sessions by our instructional staff:

  • Analysis and Evaluation Overview
  • Step 1 - Analyze Business Purpose
  • Step 2 - Identify Assets
  • Step 3 - Determine ICS Connectivity
  • Step 4 - Determine ICS Dependencies
  • Step 5 - Assess Risk to Business
  • Step 6 - Determine Critical Risk
  • Step 7 - Recommend Actions
  • Step 8 - Monitor and Reassess
  • Optional: Final Evaluation
  • Optional: CSET

Plan on dedicating around 15-20 hours over the two-week period to complete the online course. Hands-on activities may be additional time. Participants can go through the sessions at their own pace during the week, but the sessions must be completed in order. In other words, each session must be completed before the next session will be available for viewing. Hands-on activities using NetLab can be completed at any time. All videos and hands-on activities must be completed by the closing date. If you do not or cannot complete the course in the allotted time frame, you may register for the next available 401 course to finish the videos and hands-on labs.

A certificate of completion and CEUs will be offered to those who complete all sessions of the course.

If at any time you have questions or input for the course, please email

Additional Details

Training Audience
Individuals who are responsible for evaluating or influencing the cybersecurity posture of critical infrastructure. Geared towards small to medium sized companies with no OT risk management personnel but personnel from large business are welcome also.


Completion of 301/301V is NOT a prerequisite for this course.