Our classroom based Operational Technology (OT) Cybersecurity training package helps your organisation develop the skills and knowledge to protect your OT systems against evolving cybersecurity threats and how to successfully defeat attacks when they occur.
The service has been developed specifically for critical infrastructure operators and industrial control system cybersecurity professionals.
Operational Technology users face a variety of constantly evolving cyber threats. These threats pose a significant risk to the safety, reliability and availability of critical systems, potentially causing severe disruption to essential services. The majority of these threats can be prevented by your employees have better knowledge and skills so that they can ask the right cyber security questions when managing their OT systems and then respond the correct way.
The typical organisational challenges lacks skills and knowledge in the following areas:
- Practicing good cyber hygiene – what are best practices your employees should follow to keep OT systems safe from update management to passwords.
- Understanding the threat – what are the techniques that hackers use to gain access to your OT systems.
- Minimizing OT vulnerabilities – understanding where vulnerabilities can occur and how to protect against them.
- Alert to intrusions – understanding the solutions that are available to detect intrusions, which take on average 6 months to detect, when systems are not in place and how to respond.
- Reduce attack impact - improve knowledge of best practice in security controls as well as cyber hygiene.
- Understanding how to keep up to date – where to find threat intelligence data and how interpret it.

Thales’ approach to OT cyber security training is to offer a modular framework of training content options which can be configured to meet the individual needs of our customers. Our framework approach can be tailored to accommodate beginner, advanced, and specialist learning paths and packages. Courses can be constructed from a variety of suggested modules to suit a range of business stakeholders from operators, to C-Suite Executives.
Modules can be delivered either via a class room setup or via remote mechanisms. This agile and flexible approach means that customers can choose where and how they want training to be delivered.
Thales adopt this approach to OT security training provision as we appreciate that it is challenging for key OT security resources to be away from their roles for extended periods and so offer an approach which is flexible enough to suit operational needs.
Impartial and dedicated focus on the cyber security
Thales are vendor agnostic. We have no restrictions or bias towards particular industrial control system OEM’s, hardware or software vendors and as such training provided will have no hidden agenda to sell services or products. We focus uniquely on challenges to the OT sector, and our only goal is to achieve the best possible outcome for our customers.
Specialist OT knowledge and services
Thales is an OT specialist. We have access to labs, demos, and equipment that enable us to provide up to date and relevant training services, delivered by OT experts with experience on the ground to bring OT cyber security issues to life. The following modules are available with extra available on demand.
Ransomware Deployment and Defences | Open Source Intelligence for ICS | Penetration Testing | Cyber Hygiene |
Threat Hunting | Assessing and Managing OT Security Risk | Network monitoring and SOC integration | Cyber War Gaming |
Deception for ICS | Cyber Defensible positions | OT Security Architecture Fundamentals | Threat Intelligence |
Establishing and OT Security Strategy | Building Demilitarised Zones | System Maintenance, TVM, Patching and Twins |
Exploit and Attack Field Devices |
Industrial Protocol Security | Security Requirements for çÛÁ¦ÊÓÆµs | Introduction to OT Resiliency | Control Systems Engineering 101 |
Secure PLC Coding Practices | Protocol Control using Industrial Firewalls | Cloud Based OT Technologies | Fusing Industrial Protocols |
Firmware Analysis and Reverse Engineering | In-Depth OT Resiliency | Risk Mitigation in Legacy Systems | Network Recon, Lateral Movement and Situational Awareness |
Past Exploitation for ICS | Incident Response and Forensics | Maximizing Security Value | Fostering Effective OT Security Teams and Cultures |
A modular framework of training content options which can be configured to meet the individual needs of our customers
Customized to your requirements
We tailor every course to your specific requirements customizing it based on the target audience, what business objective you want to achieve, what content is relevant to you and how you would like the training to be delivered.