Critical Infrastructure Cyber Security
- Duration
- 5 days
- Delivery mode
- In-person
- Location
- UNSW Canberra City
- Price (AUD inc. GST)
- $5,650
- Spots remaining
- AVAILABLE
- Course summary
- About
- Outcomes
- Schedule
- Next steps
Course summary
Hands-on protection for complex industrial systems
This onsite professional development course equips engineering, IT and technical management professionals with practical approaches to protecting industrial infrastructure. Designed for varying experience levels, it offers concurrent hands-on lab streams focused on either control systems or IT hardware and software.
The course combines presentations and group discussions with extensive guided labs using VM-based environments, real hardware and digital twin technologies. Participants take part in Red/Blue team exercises and a final insider-threat scenario, applying their skills to defend a live training environment.
Participants can choose lab streams based on their experience, with foundational options available for those new to industrial or IT systems. Please note that places are limited due to hardware and licensing constraints, and lab selections are allocated on a first-come, first-served basis.
Who will benefit
- IT and engineering professionals with varying degrees of background knowledge.
Course is suitable for
- The course is designed for beginners and assumes no prior knowledge.
Delivered by experts
About the course
Mastering cyber infrastructure
Australia’s critical infrastructure is highly interconnected and increasingly exposed to security risks that threaten essential services and economic stability. As industrial operations rely more heavily on automated control systems such as SCADA, PLCs and distributed control systems, connectivity has introduced new vulnerabilities alongside operational benefits.
This course provides practical experience with modern IT and industrial control systems, exploring threat environments, attacker capabilities and effective techniques for securing critical and legacy systems.
Why enrol in this course
Develop specialised expertise in critical infrastructure cyber security
Gain a comprehensive understanding of the unique cyber security risks affecting critical infrastructure systems and the strategies required to protect nationally significant assets.
Build practical capability
The course emphasises hands-on experience using real-world industrial control systems and simulated environments, enabling participants to apply concepts directly to operational contexts.
Strengthen risk management and incident response capability
Participants develop the ability to assess vulnerabilities, manage cyber risk, and respond effectively to incidents affecting cyber-physical systems.
Enhance professional credibility and career progression
Completing this course demonstrates advanced technical and strategic capability in a specialised domain, supporting career advancement and leadership opportunities.
Key features
Covers the vulnerabilities and security challenges facing national critical infrastructure.
Use simulation tools and real control system hardware (SCADA, PLCs, HMIs) to replicate real-world threats and attack scenarios.
Includes technical instruction on industrial control systems, SCADA, network security, wireless/mobile security, IoT/IIoT issues and multi-factor authentication.
Offer concurrent streams for participants to focus on either control system hardware or IT security tools.
Learning outcomes
Cyber security in action
This intensive multi-day program provides a fully immersive, practical exploration of cybersecurity across industrial control systems (ICS), networks, wireless environments, IoT/IIoT, authentication systems and modern attack tools. Participants progress from foundational concepts, such as ICS architecture, PLC programming, secure wireless design and network policy implementation, to advanced skills including VPN configuration, IoT security testing, SCADA integration, MFA deployment and red–blue team defence exercises.
The course culminates in practical attack simulations using tools like Metasploit, exploring real-world threats such as reverse shells, ransomware, privilege escalation and social engineering exploits. Designed for hands‑on learning, this course equips learners with applied skills to assess, secure and defend critical systems across diverse cyber environments.
What you'll learn
This course equips participants with a practical understanding of critical infrastructure environments, the threats they face, and the techniques used to secure them. You will learn:
- The structure and interdependencies of critical infrastructure and why its protection matters
- How industrial control systems (SCADA, PLCs, HMIs and DCS) operate within modern infrastructure
- The security risks introduced by increased connectivity and automation
- Common threat environments and attacker capabilities
- Practical approaches to securing modern and legacy control systems
Topics covered
At the successful conclusion of this course, attendees will, at minimum, be able to:
- CLO 1. Investigate and evaluate the vulnerabilities of Industrial Control Systems and Critical Infrastructure.
- CLO 2. Link the principles behind the industrial hardware and software of control systems that are used in the operation of Industrial Control Systems and Critical Infrastructure.
- CLO 3. Examine technical specifics about the vulnerabilities of Industrial Control Systems and Critical Infrastructure service delivery with an emphasis of those services’ dependant on control systems reliability and recoverability.
- CLO 4. Develop and implement mitigation strategies as well as administrative and technical risk management plans to protect and secure process control systems.
Resources for Attendees
- There is no textbook that attendees need to obtain. A variety of resource material will be made available to the attendees as needed throughout the course.
Course delivery
| Format | Commitment | Delivery |
|---|---|---|
5 days | 9am - 4pm | In-person |
Schedule
| Day 1 | Day 2 | Day 3 | Day 4 | Day 5 |
|---|---|---|---|---|
Morning (Combined): | Morning (Streams):
| Morning (Streams):
| Morning (Combined): | Morning (Combined): |
Afternoon (Streams):
| Afternoon (Streams):
| Afternoon (Streams):
| Afternoon (Combined): Continuation of Red/Blue exercise and advanced attack scenarios. | Afternoon (Combined): Course review and wrap-up. |
Skills and career
Skills
Career roles
Course is suitable for