OT Cybersecurity Professional Training

This advanced training prepares you for the GICSP exam and builds the skills needed to assess and secure industrial control systems with confidence.

... > Training Courses > OT Cybersecurity Professional Training

OT Cybersecurity Professional Training

Industrial Control Systems (ICS) form the backbone of everyday life, underpinning everything from critical infrastructure to building automation. This course is a continuation of the OT Cybersecurity Fundamentals Training and will help you to be fully prepared for the GICSP exam. 
 
Location: Bureau Veritas Cybersecurity Office, Amsterdam
Price: €1.500 excl. VAT
 

* Note: We also offer this training as an in-company option. Contact us for more information.

OT Cybersecurity Professional Training

If you are interested in this training, please fill out the form and we will contact you within one business day.

Why join?

  • Prepare for the GICSP exam with focused content and practice.
  • Build on key topics from the OT Fundamentals course.
  • Analyze ICS attacks across the Purdue model.
  • Explore IEC62443 and NIST CSF frameworks.
  • Perform OT risk assessments with practical insights.

You’ll also cover topics such as OT network architectures, encryption, system hardening, firewall deployment, physical security, endpoint protection, logging and monitoring, asset inventories, and backup strategies—equipping you to secure industrial environments effectively.

Image in image block

Who should join?

This course is designed for professionals with basic OT cybersecurity knowledge—control system engineers, IT and OT security staff, and managers who want to strengthen their skills. It provides the insight needed to navigate the OT security landscape and prepares participants for the GICSP exam.

Required Skills and Expertise

It is preferred to have followed the OT Fundamentals Training. Otherwise, having a general knowledge of OT Cybersecurity, including network technologies, the Purdue model, risk methodology, threat actors, threat modelling and fundamental security principles (CIA triad, access control, firewalls, logging, antivirus) is recommended.

Program

The program is divided into four modules, which are given in a two-day course. After completing the course, each participant is rewarded with a certificate.

Day 1

Module 1: Introduction & Recap OT Fundamentals

The program starts with a walkthrough of ICS fundamentals: Basic terminology, Industrial processes, control theory, and plant organization basics and quick recap of the OT Fundamentals Training.

  • A basic understanding of networking principles, including the OSI model.
  • A basic understanding of wireless networking, wireless ICS protocols, and the vulnerabilities associated with wireless systems.
  • A basic introduction to cryptography, including symmetric and asymmetric cryptography, hash algorithms and MACs.

Module 2: ICS Protocols, Components and secure ICS network architecture

This module covers widely used industrial protocols in ICS networks.

  • Learn how to design secure ICS network architectures through segmentation and network boundaries, using firewalls, data diodes, and industrial IDS.
  • Explore the ICS attack surface, techniques for categorizing attacks, and methods for creating attack trees and threat models.
  • Review ICS attacks mapped to each relevant Purdue level and examine them in detail.

Day 2

Module 3: Cybersecurity Programs

We will walk through how to set up a cybersecurity program for ICS networks using standards such as IEC62443 and NIST CSF. This includes creating documents like policies and procedures, with guidance on how to develop and apply them in practice.

Next, we’ll cover how to carry out a risk assessment to identify threats and weaknesses. Participants will learn how to evaluate risks using different techniques and how to present their findings clearly.

Module 4: Security Standards, Threat Modeling & Real-World Case Studies

  • Learn how to build and maintain a complete ICS asset inventory.
  • Explore physical security measures to protect ICS environments.
  • Understand OS hardening techniques across different systems.
  • Review endpoint protection and antivirus solutions used in ICS networks, including implementation challenges.
  • Examine patch management practices and backup strategies for OT systems.
  • Understand the role of logging and monitoring in ICS environments.
  • Learn how to develop a structured incident response process.

Meet The Trainer

Dominika Rusek Jonkers

Dominika Rusek Jonkers is a Senior Security Specialist at Bureau Veritas Cybersecurity with over 10 years of experience in industrial cybersecurity.

She has worked on technical assessments of Industrial Control Systems (ICS), penetration testing, Tactical Network Exploitation, and Red Teaming, including Active Directory attacks. Her project work includes deploying ICS monitoring tools like Claroty, Nozomi, and CyberVision, and designing network segmentation strategies.

Dominika also works with hardware hacking on IoT/IIoT devices and conducts threat hunting in ICS environments.

As a trainer, she leads practical sessions on OT security fundamentals, ICS assessment methods, and monitoring techniques.

More Information & Registration

If you are interested in this training, please fill out the form and we will contact you within one business day.

USP

Why choose Bureau Veritas Cybersecurity

Bureau Veritas Cybersecurity is your expert partner in cybersecurity. We help organizations identify risks, strengthen defenses and comply with cybersecurity standards and regulations. Our services cover people, processes and technology, ranging from awareness training and social engineering to security advice, compliance and penetration testing.

We operate across IT, OT and IoT environments, supporting both digital systems and connected products. With over 300 cybersecurity professionals worldwide, we combine deep technical expertise with a global presence. Bureau Veritas Cybersecurity is part of the Bureau Veritas Group, a global leader in testing, inspection and certification.