STH.CIP v5 CBT Cyber Security Training

STH.CIP v5 CBT Cyber Security Training

Electric utility providers have employees and contractors who have authorized cyber or unescorted physical access to BES Cyber Systems. Given the critical role they play in our society, electric utilities are subject to federally mandated North American Electric Reliability Corporation (NERC) reliability standards and are required to comply with its training requirements or face potentially significant financial penalties. The SANS CIP Version 5 computer-based cyber security training program was developed to address the requirements of NERC CIP-004-5.1 R1 and NERC CIP-004-.5.1 R2. Training includes 13 modules averaging 5 minutes in length. Click here to learn more.

NERC CIP Version 5 Webinar- OnDemand

Want to learn more about NERC CIP Version 5: Challenges and Strategies for Addressing the Training Requirements? Watch the webcast on demand hosted by Mike Assante, Tim Conway, and Ted Gutierrez. You will need to login to register/access this webcast. Click for more info.

CIP v5 CBT: Introduction Video

You may watch the CIP v5 CBT introduction video below and request a free demo here.

Training Modules

CIP v5 CBT Modules Addressing CIP-004-5.1 R2
  • Introduction
  • Terms and Definitions
  • Operating Interconnected and Interdependent BES Cyber Systems
  • Asset Identification and Requirement Applicability
  • NERC CIP Policy Requirements
  • Electronic Access Controls
  • Physical Access Controls
  • Protecting BES Cyber System Information
  • Incident Response
  • BES Cyber System Recovery
  • CIP V3 - V5 Delta
  • CIP014-1 Overview
  • Conclusion

Module Description and Requirements Mapping: To view module descriptions/times and a mapping to the CIP-004 R2 and CIP-003 R1 Requirements, please Download

In addition to the STH.CIP v5 modules listed above, we recommend you utilize the STH.EndUser program to satisfy NERC CIP-004-5.1 R1. Below is a sample of the modules available with that program.

STH.EndUser Modules Addressing CIP-004-5.1 R1
  • You Are the Target
  • Social Engineering
  • Email & Messaging
  • Browsing
  • Social Networks
  • Mobile Device Security
  • Passwords
  • Encryption
  • Data Security
  • Data Destruction
  • Wi-Fi Security
  • Working Remotely
  • Insider Threats
  • Help Desk
  • IT Staff
  • Physical Security
  • Protecting Your Personal Computer
  • Protecting Your Home Network
  • Protecting Your Kids Online
  • Hacked
  • Senior Leadership
  • Advanced Persistent Threat
  • Cloud
  • International Travel