Have a question?
Name
Email
Preferred Mode of Training
Notes
Delete file
Are you sure you want to delete this file?
Message sent Close

EC-COUNCIL Industrial Control Systems / Supervisory Control and Data Acquisition (ICS|SCADA®)

EC-Council's ICS|SCADA® is a hands-on training course focused on securing and defending network architectures from attacks. Participants will learn systematic ... Show more
0
0 reviews
  • Description
  • Reviews
ICS _SCADA Cybersecurity

EC-COUNCIL INDUSTRIAL CONTROL SYSTEMS/SUPERVISORY CONTROL AND DATA ACQUISITION (ICS|SCADA®)

COURSE DESCRIPTION

Due to the potential impact of an attack on the physical safety of communities, employees or customers, ICS|SCADA Security is an even higher priority than for Traditional IT Systems. Cyber criminals have already developed malware threats such as Triton/TRISIS and STUXNET that can disrupt Industrial Operation Technology (OT). The ICS|SCADA Cybersecurity Training is a hands-on training which will enable you to learn the foundation of security and defending architectures from attacks. Learners will look into the concept of thinking like a hacker” to learn techniques to defend from the types of attacks that are commonly against the Industrial sector IT Corporate and Control Network.

TARGET AUDIENCE

This course is designed for IT Professionals who manage or direct their Organization’s IT Infrastructure and are responsible for establishing and maintaining information security policies, practices, and procedures. The profile of the candidates attending the program can include:

  • SCADA Systems Personnel
  • Business Systems Analyst who supports SCADA Interfaces
  • Systems Administrators, Engineers, and other IT Professionals who are administering, patching, securing SCADA and / or ICS.
  • Security Consultants who are performing security assessments of SCADA and/or ICS

PREREQUISITES

Attendees of this programs are expected to have:

  • Linux Operating Systems fundamentals, including basic command line usage
  • Conceptual Knowledge of programming/scripting
  • Solid grasp of essential networking concepts (OSI Model, TCP/IP, Networking, Devices, and Transmission Media)
  • Understanding of basic security concepts (e.g. malware, intrusion detection systems, firewalls, and vulnerabilities)
  • Familiarity with Network Traffic Inspection Tools (Wireshark, TShark, or TCPDump) is highly-recommended

COURSE OUTLINE

Module 1: INTRODUCTION TO ICS/SCADA NETWORK DEFENSE

LAB: Security Model

  • IT Security Model
  • ICS/SCADA Security Model

LAB: Allowing a Service

  • Security Posture
  • Risk Management in ICS/SCADA
  • Risk Assessment
  • Defining Types of Risk
  • Security Policy

Module 2: TCP/IP 101

  • Introduction and Overview
  • Introducing TCP/IP Networks
  • Internet RFCs and STDs
  • TCP/IP Protocol Architecture
  • Protocol Layering Concepts
  • TCP/IP Layering
  • Components of TCP/IP Networks
  • ICS/SCADA Protocols

Module 3: INTRODUCTION TO HACKING

  • Review of the Hacking Process
  • Hacking Methodology
  • Intelligence Gathering
  • Footprinting
  • Scanning
  • Enumeration
  • Identify Vulnerabilities
  • Exploitation
  • Covering Tracks

LAB: Hacking ICS/SCADA Networks Protocols

  • How ICS/SCADA are Targeted
  • Study of ICS/SCADA Attacks
  • ICS/SCADA as a High-Value Target
  • Attack Methodologies in ICS

Module 4: VULNERABILITY MANAGEMENT

  • Challenges of Vulnerability Assessment
  • System Vulnerabilities
  • Desktop Vulnerabilities
  • ICS/SCADA Vulnerabilities
  • Interpreting Advisory Notices
  • CVE
  • ICS/SCADA Vulnerability Sites
  • Life Cycle of a Vulnerability and Exploit
  • Challenges of Zero-Day Vulnerability
  • Exploitation of a Vulnerability
  • Vulnerability Scanners
  • ICS/SCADA Vulnerability Uniqueness
  • Challenges of Vulnerability Management within ICS/SCADA

LAB: Vulnerability Assessment

  • Prioritizing Vulnerabilities
  • CVSS
  • Oval

Module 5: STANDARDS & REGULATIONS FOR CYBERSECURITY

  • ISO 27001
  • ICS/SCADA
  • NERC CIP
  • CFATS
  • ISA99
  • IEC 62443
  • NIST SP 800-82

Module 6: SECURING THE ICS NETWORK

  • Physical Security
  • Establishing Policy – ISO Roadmap
  • Securing the Protocols Unique to the ICS
  • Performing a Vulnerability Assessment
  • Selecting and Applying Controls to Mitigate Risk
  • Monitoring
  • Mitigating the Risk of Legacy Machines

Module 7: BRIDGING THE AIR GAP

  • Do You Really Want To Do This?
  • Advantages and Disadvantages
  • Guard
  • Data Diode
  • Next Generation Firewalls

Module 8: INTRODUCTION TO INTRUSION DETECTION SYSTEM (IDS) & INTRUSION PREVENTION SYSTEM (IPS)

  • What IDS Can and Cannot Do
  • Types IDS
  • Network
  • Host
  • Network Node
  • Advantages of IDS
  • Limitations of IDS
  • Stealthing the IDS
  • Detecting Intrusions

LAB: Intrusion Detection

  • Log Analysis
  • ICS Malware Analysis
  • LAB: ICS Malware Analysis
  • Essential Malware Mitigation Techniques
  • ICS/SCADA Network Monitoring
  • ICS/SCADA IDS

Inquire Now

Share
Course details
Duration March 3 - 6, 2025

Archive

Working hours

Monday 9:00 am - 6.00 pm
Tuesday 9:00 am - 6.00 pm
Wednesday 9:00 am - 6.00 pm
Thursday 9:00 am - 6.00 pm
Friday 9:00 am - 6.00 pm
Saturday Closed
Sunday Closed

You cannot copy content of this page