• Classroom
  • Online, Instructor-Led
Course Description

This comprehensive training program by Tonex equips participants with the essential skills and knowledge needed to become a Certified Critical Infrastructure Protection Engineer. The course covers critical aspects of securing and safeguarding vital infrastructure against cyber threats and physical vulnerabilities. Participants will gain hands-on experience and practical insights to address the evolving challenges in the field of critical infrastructure protection.

Learning Objectives

  • Understand the fundamentals of Critical Infrastructure Protection (CIP).
  • Identify key components and sectors of critical infrastructure.
  • Examine the vulnerabilities and threats to critical infrastructure systems.
  • Learn risk assessment methodologies specific to critical infrastructure.
  • Explore the principles of security governance in critical infrastructure protection.
  • Gain knowledge of regulatory frameworks and compliance requirements for CIP.
  • Develop skills in designing and implementing effective security controls for critical infrastructure.
  • Understand incident response and recovery strategies in the context of critical infrastructure incidents.
  • Explore emerging technologies and trends impacting critical infrastructure protection.
  • Acquire expertise in conducting security assessments and audits for critical infrastructure systems.
  • Enhance knowledge of international collaboration and information sharing in CIP.
  • Master the principles of business continuity and disaster recovery planning for critical infrastructure.
  • Demonstrate proficiency in ethical and legal considerations in CIP.
  • Prepare for industry-recognized certifications related to Critical Infrastructure Protection.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Cyber Defense Infrastructure Support
  • Cyber Defense Analysis
  • All-Source Analysis
  • Data Administration
  • Exploitation Analysis