Description
3 days
€ 3.350,- plus VAT
(incl. certification exam)
8 persons
ICS.205 Certified OT Security Practitioner (COSP) or an equivalent course or at least 6 months of relevant professional experience averaging at least 20 hours per week.
Completion: Certificate of completion; upon successful completion of the certification exam COSM persons certification from TÜV Austria Akademie
What you can expect from
ICS.212 Certified OT Security Manager (COSM)
Persons certification available
After completing the 2.5-day OT security training course focusing on the key areas, participants can take a persons certification exam administered by TÜV AUSTRIA Academy – ideal for industry professionals who want to gain proof of their security expertise.
Practical learning
All training courses that offer persons certification include a significant practical component, featuring hands-on labs, realistic simulations, and a personalized exercise handbook to promote effective, practical learning.
Always at the cutting edge
Our training courses are revised at least once a year – current findings, new threat scenarios, and real incidents are continuously incorporated into the content.
Is the Management Expert Training suitable for you?
Find out in just a few minutes – with our short COSM self-assessment questionnaire.
What you will learn during this training course
Day 1
Introduction
- Overview, standards and frameworks
- Tabletop exercise
Govern
- Security governance and program management
- Roles and responsibilities
- System under consideration
- Supply chain risk management
Identifiy
- Improvement
- Asset Inventory
- Risk management
Day 2
Protect
- Defense in depth
- Network segmentation and zoning
- Remote Access
- Systems Security
- Patch Management
- Identity and access management
- Security awareness
Detect
- Logging and monitoring
- Anomaly detection
- Vulnerability assessment
Day 3
Respond
- Incident handling lifecycle
- Post incident activities
Recover
- System availability
- Recovery planning
- Backup
After the training, the participants have
- been able to securely manage their areas of responsibilities and assess risks.
- have refreshed and deepened their existing
knowledge of OT security and related
standards. - have gained a basic understanding of a possible
risk assessment procedure. - understand asset discovery and component
classification capabilities. - have developed a holistic view of security processes.
- be able to define response plans and establish
defined communication strategies for incident
management.
Training highlight: Experience strategic OT security management
In the training ICS.212 OT Security Management A special highlight awaits you: a practice-oriented Exercise Handbook that guides you through realistic scenarios and decision-making processes in OT security management.
In interactive tabletop exercises, you will analyze real threat scenarios, make strategic decisions and experience how important clear processes, roles and communication channels are in an emergency.
You can look forward to varied task formats – ideal for managers, security officers and anyone who wants to understand and shape OT security at an organizational level:
- Incident response from a management perspective – crisis communication, escalation and decision-making
- Patch and asset management – identify, prioritize and eliminate vulnerabilities in a targeted manner
- Recovery planning after APT attacks – prioritize systems, identify dependencies, plan recovery
- Evaluate governance & processes – identify and improve weaknesses in security management
This training not only promotes technical understanding, but above all strategic thinking, process reliability and leadership skills – essential for a holistic OT security concept.
Get your TÜV® persons certificate now!
Our OT security training courses not only provide knowledge, but also official proof of your competence.
What others say
You are on the search for an individual In-house training for your team?
Take your OT security know-how to the next level.
Get to know our
trainers

Bettina Wächter
always has a clear overview and an eye for important details. With her knowledge of ISO 27000, IEC 62443 and NIS-2 as well as her experience in working with processes, she creates the organizational framework for the introduction of management systems. She values sustainable knowledge transfer.

Peter Eder-Neuhauser
shows the importance of integrated risk management, incident handling, coordinated IT governance, threat and gap analyses, privacy impact assessments and awareness through his research focus on malware propagation in IT/OT networks, specific mitigation measures and secure architecture.






