IC37M Cybersecurity Operations & Maintenance
Full Course Bundle (IC37M)


Course: IC37-M
Price: € 1.875,- / € 1.575,- for ISA member
Length: Six modules|
Exam: ISA/IEC 62443 Cybersecurity Maintenance Specialist IC-37M (€ 200,- value)
CEU: 0.7

This course starts every 1-st and 15-th of every month


ISA Course IC32/IC32E or equivalent knowledge/experience

Certificate Program: ISA/IEC 62443 Cybersecurity Design Specialist – Part of the ISA/IEC 62443 Cybersecurity Certificate Program. After successfully completing the course, students should call ISA Customer Service at 919-549-8411 to request their Eligibility code for Cybersecurity Certificate 3 Exam. Once this code is issued, students may schedule to take the exam with Prometrics

Certification of Completion: A Certificate of Completion indicating the total number of CEUs earned will be provided upon successful completion of the course.

Part of the ISA’s Cybersecurity Certificate Program The third phase in the IACS Cybersecurity Lifecycle (defined in ISA/IEC 62443-1-1) focuses on the activities associated with the ongoing operations and maintenance of IACS cybersecurity. This involves network diagnostics and troubleshooting, security monitoring and incident response, and maintenance of cybersecurity countermeasures implemented in the Design & Implementation phase. This phase also includes security management of change, backup and recovery procedures and periodic cybersecurity audits. This course will provide students with the information and skills to detect and troubleshoot potential cybersecurity events as well as the skills to maintain the security level of an operating system throughout its lifecycle despite the challenges of an ever-changing threat environment.


  • Perform basic network diagnostics and troubleshooting
  • Interpret the results of IACS device diagnostic alarms and event logs
  • Develop and follow IACS backup and restoration procedure
  • Understand the IACS patch management lifecycle
  • Develop and follow an IACS patch management procedure
  • Develop and follow an antivirus management procedure
  • Define the basics of application control and whitelisting tools
  • Define the basics of network and host intrusion detection
  • Define the basics of security incident and event monitoring tools
  • Develop and follow an incident response plan
  • Develop and follow an IACS management of change procedure
  • Conduct a basic IACS cybersecurity audit


  • ICS Cybersecurity Lifecycle
  • Security Management & Maintenance
  • Security Monitoring & Detection
  • IACS Incident Response & Recovery

LAB DEMONSTRATIONS: (Included in modules)

  • Network diagnostics and troubleshooting
  • Intrusion detection alarm
  • Event monitoring
  • Configuration management
  • Patch management
  • Anti-virus management
  • Whitelisting
  • Vulnerability scanning tools
  • Incident response
  • Backup and recovery


  • Operations and maintenance personnel
  • Control systems engineers and managers
  • System Integrators
  • IT engineers and managers industrial facilities
  • Plant Safety and Risk Management