We may earn an affiliate commission when you visit our partners.
Course image
Richard White

This course will examine the drinking water and electricity infrastructures, and various policies that have been developed to help guide and strengthen their cybersecurity programs. The drinking water and electricity infrastructures are two of fourteen subsectors comprising what are known as "lifeline infrastructure". The 2013 National Infrastructure Protection Plan identifies four lifeline infrastructure sectors: 1) water, 2) energy, 3) transportation, and 4) communications. These sectors are designated "lifeline" because many other infrastructures depend upon them. The drinking water subsector is part of the water sector, and the electricity subsector is part of the energy sector. Both subsectors are overseen by the Department of Homeland Security National Protection and Programs Directorate which manages the DHS National Infrastructure Protection Program. The NIPP employs a five-step continuous improvement program called the Risk Management Framework. NIPP implementation is overseen by DHS-designated Sector-Specific Agencies staffed by various Federal departments. The Sector-Specific Agencies work in voluntary cooperation with industry representatives to apply the Risk Management Framework and document results in corresponding Sector-Specific Plans. The program began in 2007 and the most recent Sector-Specific Plans were published in 2016. In February 2013, President Obama issued Executive 13636 directing the National Institute of Standards and Technology to develop a voluntary set of recommendations for strengthening infrastructure cybersecurity measures. EO13636 also asked Federal agencies with regulating authority to make a recommendation whether the NIST Cybersecurity Framework should be made mandatory. The Environmental Protection Agency who is both the SSA and regulatory authority for the drinking water subsector recommended voluntary application of the NIST Cybersecurity Framework. The Department of Energy who is both the SSA and regulatory authority for the electricity subsector replied that it was already implementing the Electricity Subsector Cybersecurity Capability Maturity Model, which indeed was what the NIST Cybersecurity Framework was based on. The Department of Energy, though, recommended voluntary application of the ES-C2M2. This module will examine both the drinking water and electricity lifeline infrastructure subsectors, and elements and application of the NIST Cybersecurity Framework and ES-C2M2.

Enroll now

What's inside

Syllabus

Module 5: Water Infrastructure & NIST Cybersecurity Framework
In this module we will examine the drinking water subsector and the NIST Cybersecurity Framework for strengthening this infrastructure's cybersecurity practices.
Read more
Module 6: Applied NIST Cybersecurity Framework
In this module we will take a closer look at the NIST Cybersecurity Framework and apply its tenets to different hypothetical situations. Also included in this module is course exam #3. Good luck!
Module 7: Electricity Infrastructure & ES-C2M2
In this module we will examine the North American electric grid and the Electricity Subsector Cyber Capability Maturity Model for strengthening this infrastructure's cybersecurity practices.
Module 8: Applied ES-C2M2
In this module we will take a closer look at the Electricity Subsector Cyber Capability Maturity Model and apply its tenets to different hypothetical situations. Also included in this module is course exam #4 and related project assignment. Good luck!

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Shows how both NIST Cybersecurity Framework and ES-C2M2 are applicable in various situations
Examines cybersecurity practices specific to drinking water and electric grid infrastructure
Taught by Richard White, who has expertise in cybersecurity for critical infrastructure
Introduces the Risk Management Framework used by the Department of Homeland Security
Appropriate for individuals interested in cybersecurity for critical infrastructure, particularly in the water and energy sectors

Save this course

Save Cybersecurity Policy for Water and Electricity Infrastructures to your list so you can find it easily later:
Save

Reviews summary

Highly rated cybersecurity course for utilities

Learners say this highly rated cybersecurity course for water and electricity infrastructures is difficult, engaging, and informative. Students highlight the in-depth overview of cybersecurity challenges and best practices, as well as the instructor's knowledgeability. While some mention the difficulty of the exams and quizzes, many credit the course with expanding their understanding of cybersecurity for critical infrastructures.
Knowledgeable and makes complex topics easy to understand
"Great instruction on the models, wouldn't get it at all looking at it by myself!"
"I loved taking this class. It was challenging but the instructor made it easy to understand."
"Exelente curso de política de ciberseguridad para las infraestructuras del agua y Electricidad...muy bien redactado y todo indicado en orden cronológico para el mejor aprendizaje, excelente servicio"
Challenging but rewarding
"Very Hard course, but learned a lot"
"Very difficult and amazing course. Good job"
"The instructor is very knowledgeable on subject matter. Only issue is the course is somewhat abbreviated, because of the large content of information regarding cybersecurity."
In-depth overview of cybersecurity for utilities
"Great and in depth overview of the cyber security challenges and best practices to minimize any attack by threat actors."
"This course opened my eyes and helped be aware of things I did not know before"
"Most of the time, when you think about cybersecurity, you think about hackers, cyberattacks, malware, but you don't stop to think about security specialists protecting critical assets and infrastructures. This course helps you understand about being as safe as possible understanding security domains and processes."
Estimated time to complete each section is not always accurate
"Excellent course.The only "but" is that the estimated time required to complete each section is not correct in a number of cases. E.g. when there is a 90 pages optional reference document which in theory should take 10 minutes to review."
"Material could have been easier with move specific reading assgnments. Questions 1 and 2 within the project provided general information which made it hard to determine the answers."

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Cybersecurity Policy for Water and Electricity Infrastructures with these activities:
Review Cybersecurity Framework
Refresh your foundational understanding of cybersecurity frameworks to ease into the course materials.
Show steps
  • Read NIST SP 800-53: Security and Privacy Controls for Federal Information Systems and Organizations
  • Review the 5 Functions of the Cybersecurity Framework
Review cybersecurity concepts
Refreshing your knowledge of basic cybersecurity concepts, such as information security, risk management, and the NIST Cybersecurity Framework, will help you better understand the specific cybersecurity challenges and solutions covered in the course.
Browse courses on Cybersecurity
Show steps
  • Revisit the NIST Cybersecurity Framework
  • Review the Cybersecurity Risk Management Process
  • Identify common cybersecurity threats and vulnerabilities
  • Practice implementing security controls
NIST Cybersecurity Framework Tutorial
Begin the course with a review of the NIST cybersecurity framework to enhance understanding of key terminology and foundational concepts.
Browse courses on NIST
Show steps
  • Access the official NIST website for the Cybersecurity Framework.
  • Review the framework's key components and principles.
  • Explore the available resources and guidance documents provided by NIST.
Ten other activities
Expand to see all activities and additional details
Show all 13 activities
Read 'Introduction to Cybersecurity' by Michael Howard
This book provides a comprehensive overview of cybersecurity concepts and will help you build a solid foundation for this course.
Show steps
  • Read Chapter 1: Overview of Cybersecurity
  • Read Chapter 2: Cyber Threats and Vulnerabilities
  • Read Chapter 3: Cybersecurity Controls and Measures
Read 'Cybersecurity for Dummies' by Joseph Steinberg
This book is a great resource for beginners who are new to cybersecurity. It will help you understand the basics of cybersecurity and how to protect yourself from cyber threats.
Show steps
  • Read Chapter 1: What is Cybersecurity?
  • Read Chapter 2: Types of Cyber Threats
  • Read Chapter 3: How to Protect Yourself from Cyber Threats
Peer Discussion on Electricity Infrastructure
Engage in discussions with peers to share insights, ask questions, and collectively delve deeper into the complexities of electricity infrastructure security.
Browse courses on Electricity
Show steps
  • Connect with classmates or industry professionals.
  • Initiate discussions on topics related to electricity infrastructure security.
  • Share knowledge, experiences, and perspectives with the group.
Complete the NIST Cybersecurity Framework practice quiz
This practice quiz will help you test your understanding of the NIST Cybersecurity Framework and identify areas where you need additional study.
Show steps
  • Go to the NIST Cybersecurity Framework website
  • Click on the 'Resources' tab
  • Click on the 'Practice Quiz' link
  • Answer the questions to the best of your ability
Walk through the NIST Cybersecurity Framework Implementation Guide
This tutorial will provide you with a step-by-step guide to implementing the NIST Cybersecurity Framework in your organization.
Show steps
  • Go to the NIST Cybersecurity Framework website
  • Click on the 'Resources' tab
  • Click on the 'Implementation Guide' link
  • Follow the steps in the guide
Attend a cybersecurity workshop
Attending a cybersecurity workshop can help you learn about new cybersecurity technologies and trends.
Show steps
  • Find a cybersecurity workshop in your area
  • Register for the workshop
  • Attend the workshop
Security Assessment Exercises
Conduct practice security assessments to simulate real-world scenarios, enhancing analytical skills and decision-making abilities in cybersecurity.
Browse courses on Security
Show steps
  • Identify a target system or network for assessment.
  • Plan and execute vulnerability scanning and penetration testing activities.
  • Analyze and interpret the assessment results.
  • Develop and implement remediation plans based on the findings.
Join a cybersecurity study group
Joining a study group can provide you with a support network of peers who can help you learn about cybersecurity.
Browse courses on Cybersecurity
Show steps
  • Find a cybersecurity study group in your area
  • Attend the study group meetings
  • Participate in the study group discussions
Develop a cybersecurity incident response plan
Developing an incident response plan will help you prepare your organization for a cybersecurity incident.
Show steps
  • Identify the potential cybersecurity threats to your organization
  • Develop a plan for responding to each type of threat
  • Test your plan regularly
Contribute to an open-source cybersecurity project
Contributing to an open-source project can help you learn about cybersecurity and make a real contribution to the community.
Browse courses on Open Source Software
Show steps
  • Find an open-source cybersecurity project to contribute to
  • Read the project documentation
  • Make a contribution to the project

Career center

Learners who complete Cybersecurity Policy for Water and Electricity Infrastructures will develop knowledge and skills that may be useful to these careers:
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for identifying, analyzing, and responding to cybersecurity threats. This course will help you understand the different types of cyberattacks that can target the nation's drinking water and electricity infrastructures. You will learn about the tools and techniques that can be used to detect and prevent these attacks.
Information Security Engineer
An Information Security Engineer is responsible for designing and implementing the hardware and software that protects the data and information of an organization. This course will help you understand the challenges of protecting the nation's drinking water and electricity infrastructures from cyberattacks. You will learn about the NIST Cybersecurity Framework and the Electricity Subsector Cyber Capability Maturity Model, two frameworks that can help you to develop and implement a cybersecurity program for your organization.
IT Security Manager
An IT Security Manager is responsible for overseeing the security of an organization's IT systems. This course will help you understand the principles of IT security. You will learn about the different types of IT security controls that can be used to protect the nation's drinking water and electricity infrastructures.
Chief Security Officer (CSO)
A Chief Security Officer (CSO) is responsible for overseeing the security of an organization's physical and virtual assets. This course will help you understand the principles of cybersecurity. You will learn about the different types of cybersecurity controls that can be used to protect the nation's drinking water and electricity infrastructures.
Cloud Security Engineer
A Cloud Security Engineer is responsible for designing and implementing the security architecture for an organization's cloud computing environment. This course will help you understand the principles of cloud security. You will learn about the different types of cloud security controls that can be used to protect the nation's drinking water and electricity infrastructures.
Security Architect
A Security Architect is responsible for designing and implementing the security architecture for an organization. This course will help you understand the principles of cybersecurity architecture. You will learn about the different types of security controls that can be used to protect the nation's drinking water and electricity infrastructures.
Chief Technology Officer (CTO)
A Chief Technology Officer (CTO) is responsible for overseeing the technology strategy and operations of an organization. This course will help you understand the principles of cybersecurity. You will learn about the different types of cybersecurity controls that can be used to protect the nation's drinking water and electricity infrastructures.
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing the security of an organization's information assets. This course will help you understand the principles of information security. You will learn about the different types of information security controls that can be used to protect the nation's drinking water and electricity infrastructures.
Network Security Engineer
A Network Security Engineer is responsible for designing and implementing the network security infrastructure for an organization. This course will help you understand the principles of network security. You will learn about the different types of network security devices and technologies that can be used to protect the nation's drinking water and electricity infrastructures.
Director of Information Technology (IT)
A Director of Information Technology (IT) is responsible for overseeing the IT operations of an organization. This course will help you understand the principles of cybersecurity. You will learn about the different types of cybersecurity controls that can be used to protect the nation's drinking water and electricity infrastructures.
Compliance Officer
A Compliance Officer is responsible for overseeing the compliance of an organization's activities with applicable laws and regulations. This course will help you understand the principles of compliance. You will learn about the different types of compliance controls that can be used to protect the nation's drinking water and electricity infrastructures.
Chief Information Officer (CIO)
A Chief Information Officer (CIO) is responsible for overseeing the information technology (IT) resources of an organization. This course will help you understand the principles of cybersecurity. You will learn about the different types of cybersecurity controls that can be used to protect the nation's drinking water and electricity infrastructures.
Privacy Officer
A Privacy Officer is responsible for overseeing the privacy of an organization's data. This course will help you understand the principles of privacy. You will learn about the different types of privacy controls that can be used to protect the nation's drinking water and electricity infrastructures.
Business Continuity Planner
A Business Continuity Planner is responsible for developing and implementing plans to ensure the continuity of an organization's operations in the event of a disruption. This course will help you understand the principles of business continuity planning. You will learn about the different types of business continuity controls that can be used to protect the nation's drinking water and electricity infrastructures.
Risk Manager
A Risk Manager is responsible for overseeing the risks of an organization. This course will help you understand the principles of risk management. You will learn about the different types of risk management controls that can be used to protect the nation's drinking water and electricity infrastructures.

Reading list

We've selected seven books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Cybersecurity Policy for Water and Electricity Infrastructures.
Comprehensive introduction to cybersecurity and would provide necessary background and prerequisite knowledge for this course. It covers a wide range of topics, including cryptography, network security, and security management.
Provides detailed guidance on network security monitoring, which critical aspect of cybersecurity for critical infrastructure.
Covers hacking techniques for industrial control systems, which are used in water and electricity infrastructure.
Covers risk management for water security and safety, which is relevant to the cybersecurity of water infrastructure.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Cybersecurity Policy for Water and Electricity Infrastructures.
Cybersecurity Policy for Aviation and Internet...
Most relevant
Powering Resilient Communities: A Holistic Approach to...
Most relevant
NIST Cybersecurity and Risk Management Frameworks
Most relevant
NIST CSF
Most relevant
NIST 800-171
Most relevant
Implementing the NIST Cybersecurity Framework (CSF)
Most relevant
Water: an essential resource
Most relevant
How To Develop An Information Security Program
Most relevant
Homeland Security & Cybersecurity Connection - It's Not...
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser