An Interactive 5-Day Training Course
Protecting Critical National Infrastructure
How to Protect National Treasure in Cyberspace
Course Overview
This Protecting Critical National Infrastructure training course focuses on increasing the resilience of critical services and highlights the requirement to secure not only information systems, but the technologies that are relied upon to operate essential services. The critical infrastructure also known as cyber physical systems, industrial control systems (ICS) or operational technology (OT) as their disruption or failure can impact the nation as a whole, cost millions even billions, with potentially severe consequences.
The training course focuses on sector specific agencies, other national agencies, as well as private sector and presents the framework to share information on and analysis of cyber threats and vulnerabilities and to understand more fully the interdependency of infrastructure systems nationwide. This collective approach to prevent, protect against, mitigate, respond to, investigate, and recover from cyber incidents prioritizes understanding and meeting the needs of everyone within the nation.
This GLOMACS training course will highlight:
- The concept and characteristics of Critical National Infrastructure in different countries
- The nature of risks and threats to Critical National Infrastructure
- Framework for protection of Critical National Infrastructure and key resources
- Case studies in Critical National Infrastructure targeting and responses
- Comparative analysis of Critical National Infrastructure protection
- Risk mitigation and resilience of Critical National Infrastructure
- Understanding emerging threats and risks
Training Objectives
At the end of this Protecting Critical National Infrastructure training course, you will learn to:
- To develop knowledge and understanding of the nature and vulnerabilities
- Learn how to defend from attacks and plots targeting Critical National Infrastructure
- Acquire analytical skills to critically research, evaluate and assess policies and measures
- Analyze implemented measures and their effectiveness to protect Critical National Infrastructure
- Use legal, ethical and sector issues for Critical National Infrastructure protection
- Risk management, risk mitigation and supporting resilience of Critical National Infrastructure
Who should Attend?
This Protecting Critical National Infrastructure training course is suitable to a wide range of professionals but will greatly benefit:
- Government employees in charge of Critical National Infrastructure
- CEOs, CIOs and Data Protection Officers
- IT Managers
- Network engineers
- Network administrators
About Saudi Glomacs
At Saudi GLOMACS, we specialize in delivering world-class training courses in Saudi Arabia and across various international locations. Our training courses are tailored to meet the unique demands of Saudi Vision 2030 and the Human Capability Development Program, focusing on empowering Saudi citizens and enhancing workforce skills. We offer diverse courses spanning leadership, management, engineering, and technical disciplines to cultivate expertise and drive professional growth. Our flexible learning options—whether in-person, online, or in-house—ensure accessibility and convenience for individuals and organizations alike.
With over 30+ years of experience through the GLOMACS global network, we are committed to delivering innovative, results-driven training solutions. Our expert instructors combine industry knowledge with dynamic teaching methods, fostering practical skill development and long-term career success. By choosing Saudi GLOMACS, you're investing in personal excellence and contributing to the Kingdom’s sustainable economic growth and vision-driven transformation.
Training Outline
DAY 1: Cybersecurity Policies
- Cybersecurity Introduction
- Policies of cybersecurity protection
- Computer Security Incidents Response Teams
- Existing and emerging threats
- Preparedness for battling cybersecurity attacks
DAY 2: Network and Information Systems
- Network and Information Systems Regulations
- National Cyber Security Centre
- Key digital infrastructure
- Cyber Security Framework
- Examples of attacks on Critical National Infrastructure
DAY 3: Critical National Infrastructure
- Defining Critical National Infrastructure
- Protecting operational technology
- Protecting communications and navigation infrastructures
- Critical Infrastructure Protection cycle
- Identification and response to the attack
DAY 4: Network Security
- The CIA triad
- Device Access Control
- Virtual Private Networks (VPN)
- Access Control Lists
- Layer 2 and Wireless Security
- Network Automation
DAY 5: Simulated Protection of Critical National Infrastructure
- Attack Vector
- Affected systems
- Choosing the right response framework
- Restoring critical systems
- Forensic investigation of cybersecurity attack
Certificates
- On successful completion of this training course, GLOMACS Certificate will be awarded to the delegates
- Continuing Professional Education credits (CPE) : In accordance with the standards of the National Registry of CPE Sponsor, one CPE credit is granted per 50 minutes of attendance
Accreditation


GLOMACS is registered with NASBA as a sponsor of Continuing Professional Education (CPE) on the National Registry of CPE Sponsors. NASBA have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org.
All Training Seminars delivered by GLOMACS by default are eligible for CPE Credit.
Providers and Associations
What do you need to learn next?
Check our list of courses or let us customize a course for you.
View courses