ICS/SCADA

ICS/SCADA Cybersecurity

Due to the potential impact of an attack on the physical safety of communities, employees or customers, ICS /SCADA security is an even higher priority than for traditional IT systems. Cyber criminals have already developed malware threats such as Triton/TRISIS and Stuxnet that can disrupt industrial Operation Technology (OT).

The ICS/SCADA Cyber Security Training Course is a hands-on training which will enable you to learn the foundation of security and defending architectures from attacks. You will look at the concept of “thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly conducted against the oil and gas IT corporate and control network.

“The much-awaited ICS/SCADA cyber security training course IT professionals have been looking for.”

Course Description

You will learn powerful methods to analyze the risk of both the IT and corporate network. Once your foundation has been set, you will look at the best practices and recommendations when it comes to bridging the air gap. You will learn a systematic process of intrusion and malware analysis. Once you have the process for analysis mastered, you will be introduced to the digital forensic process and how to respond to incidents when a breach is detected.

Course Outline

  • IT Security Model
    ICS/SCADA Security Model

LAB: Security Model

  • Security Posture
  • Risk Management in ICS/SCADA
  • Risk Assessment
  • Defining Types of Risk
  • Security Policy

LAB: Allowing a Service

  • Introduction and Overview
  • Introducing TCP/IP Networks
  • Internet RFCs and STDs
  • TCP/IP Protocol Architecture
  • Protocol layering Concepts
  • TCP/IP layering
  • Components of TCP/IP Networks
  • ICS/SCADA Protocols

LAB: TCP/IP and ICS/SCADA Protocols

  • Review of the Hacking Process
  • Hacking Methodology
  • Intelligence Gathering
  • Footprinting
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • Covering Tracks

LAB: Hacking ICS/SCADA Networks Protocols

  • How ICS/SCADA are targeted
  • Study of ICS/SCADA attacks
  • ICS/SCADA as a high value target
  • Attack methodologies in ICS

  • Challenges of Vulnerability Assessment
  • System Vulnerabilities
  • Desktop Vulnerabilities
  • ICS/SCADA Vulnerabilities
  • Interpreting Advisory Notices
  • CVE
  • ICS/SCADA Vulnerability Sites
  • Lifecycle of A vulnerability and Exploit
  • Challenges of Zero-day Vulnerability
  • Exploitation of a vulnerability
  • Vulnerability Scanners
  • ICS/SCADA Vulnerability Uniqueness
  • Challenges of Vulnerability Management within ICS/SCADA

LAB: Vulnerability Assessment

  • Prioritizing vulnerabilities
  • CVSS
  • OVAL

LAB: Vulnerability Severity

  • ISO 27001
  • ICS/SCADA
  • NERC CIP
  • CFATS
  • ISA99
  • IEC 62443
  • NIST SP 800-82

  • Physical Security
  • Establishing policy – ISO roadmap
  • Securing the protocols unique to the ICS
  • Performing a vulnerability assessment
  • Selecting and applying controls to mitigate risk
  • Monitoring
  • Mitigating the risk of legacy machines

  • Do you really want to do this?
  • Advantages and disadvantages
  • Guard
  • Data Diode
  • Next Generation firewalls

Deploying event monitoring to mitigate the risk to the ICS
Implementing strong authentication

  • What IDS can and cannot do
  • Types IDS
  • Network
  • Host
  • Network Node
  • Advantages of IDS
  • Limitations of IDS
  • Stealthing the IDS
  • Detecting intrusions

LAB: Intrusion Detection

  • Log analysis
  • ICS Malware analysis

LAB: ICS Malware Analysis

  • Essential malware mitigation techniques
  • ICS/SCADA Network Monitoring
  • ICS/SCADA IDS

Case Study: Configuring essential rules within ICS/SCADA

Who is it for?

This course is specially designed for IT professionals who are involved in managing or directing their organization’s IT infrastructure and who are responsible for establishing and maintaining information security policies, practices and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.

Job Roles

  • SCADA Systems Personnel
  • Business System Analysts Who Support SCADA Interfaces
  • System administrators, engineers and other IT professionals when administering, patching, securing SCADA and/or ICS
  • Security consultants when performing security assessments of SCADA and/or ICS

Recent ICS/SCADA Security Attacks

“Federal law enforcement is now looking into a cyberattack at a water treatment plant in Oldsmar, FL where someone was able to remotely access systems and add a dangerous amount of chemicals to the town’s water supply.”

“Public utilities, including power and water systems, have been prime cyberattack targets for years. There’s a whole Russian cyber team, ‘Energetic Bear,’ focused on hacking American energy infrastructure,”

Read the Article

“Hacker Remotely Increased Sodium Hydroxide Levels in City’s Water from 100 Parts Per Million to 11,100 Parts Per Million.”

Read the Article

“Lye-poisoning attack in Florida shows cybersecurity gaps in water systems. It’s the kind of breach that has been warned about for years, but rarely seen.”

Read the Article

Build Your On-Demand Training Package

*US Residents Only, not available in West Virginia and Iowa.

Or choose a training option:

Still have questions?

1-888-330-HACK

Mon – Fri / 8:00 AM – 5:00 PM

Email Us

According to a 2019 Fortinet report ICS/SCADA Cyber-attacks are growing and no ICS vendor’s products are immune from attacks, and exploits.

Upcoming Live ICS/SCADA Training:

For Self-Paced, On-Demand training, click here

Train now, pay later with Affirm.