Frequently Asked Questions
Course Certificate & Continuing Education Credits
Graduates receive an industry-recognized certificate of completion that demonstrates their foundational knowledge of OT/ICS systems. Completing our courses will, in most cases, qualify you for Continuing Education credits. Your certificate will be available upon completion and ready to submit.
Requirements & Eligibility
Students should possess foundational knowledge of IT and/or cybersecurity. No prior OT experience is needed to get started. The courses are specifically designed to help bridge the IT/OT knowledge gap, and further educate on OT systems.
Who Benefits From Our Training Courses
Our course are designed for any technical professionals who want to learn apply their existing skills to OT environments. This includes consultants, SOC analysts, auditors, risk managers, and career changers moving into OT roles stand to benefit the most from taking this course.
Step-by-Step Enrollment Process
To enroll: select your course and create an account, or if you already have an account sign-in and selct the course you wish to enroll in.
Paying for Your Course
CambiOS Academy accepts all major credit cards. For corporate purchases please reach out to us directly.
Custom Training Modules
We offer custom enterprise packages designed to help organizations cross-train their IT workforce for OT environments, expediting training for new hires working with industrial systems, and cementing knowledge for existing team members.
Are There Group Rates?
Yes, we do offer group discounts to make it easy and cost-effective for entire teams to complete their OT/ICS security training together. By enrolling multiple employees at once, your organization not only saves on training costs but also ensures consistent knowledge and skills across the workforce. This approach allows teams to be trained quickly and uniformly, helping you strengthen security readiness at scale while supporting compliance and operational safety goals.
How Are Courses Delivered
Flexible online modules with live, instructor-led labs and modular online format that lets you focus on content most relevant to your specific role.
Why is OT Training Critical
Why isn’t traditional cybersecurity awareness training enough?
Traditional awareness programs tend to stop at phishing prevention and general IT security practices, which do little to prepare employees working around industrial systems. What makes CambiOS training different is its direct focus on operational technology environments, where a mistake can have physical outcomes rather than just digital consequences. Instead of generic advice, it teaches employees how to recognize, respond to, and prevent the types of cyber risks that can disrupt entire production lines or create hazards that threaten safety—something no standard IT-focused program addresses.
Why is specialized workforce development critical for OT security?
In operational technology, there is no cushion for error, and the stakes are dramatically different from an office IT system. Untrained staff can unintentionally trigger safety incidents, production shutdowns, or even large-scale damage. This training is uniquely designed to prepare a workforce for those realities by embedding cybersecurity awareness into the operational context. It recognizes that employees at every level—from engineers to front-line operators—contribute to an organization’s defense posture. Instead of treating security as an add-on, the program integrates it into the daily responsibilities of industrial work, ensuring the entire workforce can operate confidently in complex environments where both safety and uptime are non-negotiable.
How does the skills gap put OT environments at risk?
The shortage of professionals equipped with both IT knowledge and OT awareness means organizations often rely on employees who have blind spots when it comes to securing industrial systems. This training stands apart by bridging that gap. It does not assume that IT principles are automatically transferable to operational technology. Instead, it introduces the unique characteristics of OT networks, explains why conventional IT fixes can cause harm, and prepares staff to think critically about the interplay of safety, reliability, and security in ways that other programs simply don’t cover.
What are common mistakes that lead to OT cybersecurity incidents?
Many incidents are not the result of malicious intent, but of employees applying the wrong type of knowledge to the wrong environment. IT staff may try to implement patches that destabilize systems designed to run continuously, while operators may unknowingly make changes without grasping their security implications. Contractors often use personal devices that aren’t hardened against industrial threats, and maintenance staff can make seemingly minor errors that have significant consequences. What sets this training apart is that it doesn’t just tell employees what not to do; it shows them how their exact roles intersect with cybersecurity and equips them with clear, situation-specific practices designed for industrial settings.
Subscribe

