EC-Council
Enjoy the best in ICS/SCADA Cybersecurity Training
Having won the EC-Council Circle of Excellence Award as an Accredited Training Partner, we lead our cyber-security course offerings with the EC-Council training family of certifications.
ICS/SCADA Cybersecurity
The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network architectures from attacks. Students will learn to think like a malicious hacker to defend their organizations. ICS/SCADA teaches powerful methods to analyze risks possessed by network infrastructure in IT and corporate spaces. Once your foundation or basic concepts are clear, you will learn a systematic process of intrusion and malware analysis. After this, you will learn about digital forensic process and incident response techniques upon detecting a breach.
Target Audience
This course is designed for IT professionals who manage or direct their organization’s IT infrastructure and are responsible for establishing and maintaining information security policies, practices, and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.
Course Outline
Module 1: Introduction to ICS/SCADA Network Defense
- IT Security Model
- ICS/SCADA Security Model
LAB: Security Model
- Security Posture
- Risk Management in ICS/SCADA
- Risk Assessment
- Defining Types of Risk
- Security Policy
LAB: Allowing a Service
Module 2: TCP/IP 101
- Introduction and Overview
- Introducing TCP/IP Networks
- Internet RFCs and STDs
- TCP/IP Protocol Architecture
- Protocol Layering Concepts
- TCP/IP Layering
- Components of TCP/IP Networks
- ICS/SCADA Protocols
Module 3: Introduction to Hacking
- Review of the Hacking Process
- Hacking Methodology
- Intelligence Gathering
- Footprinting
- Scanning
- Enumeration
- Identify Vulnerabilities
- Exploitation
- Covering Tracks
LAB: Hacking ICS/SCADA Networks Protocols
- How ICS/SCADA Are Targeted
- Study of ICS/SCADA Attacks
- ICS/SCADA as a High–Value Target
- Attack Methodologies In ICS
Module 4: Vulnerability Management
- Challenges of Vulnerability Assessment
- System Vulnerabilities
- Desktop Vulnerabilities
- ICS/SCADA Vulnerabilities
- Interpreting Advisory Notices
- CVE
- ICS/SCADA Vulnerability Sites
- Life Cycle of a Vulnerability and Exploit
- Challenges of Zero-Day Vulnerability
- Exploitation of a Vulnerability
- Vulnerability Scanners
- ICS/SCADA Vulnerability Uniqueness
- Challenges of Vulnerability Management Within ICS/SCADA
LAB: Vulnerability Assessment
- Prioritizing Vulnerabilities
- CVSS
- OVAL
Module 5: Standards and Regulations for Cybersecurity
- ISO 27001
- ICS/SCADA
- NERC CIP
- CFATS
- ISA99
- IEC 62443
- NIST SP 800-82
Module 6: Securing the ICS network
- Physical Security
- Establishing Policy – ISO Roadmap
- Securing the Protocols Unique to the ICS
- Performing a Vulnerability Assessment
- Selecting and Applying Controls to Mitigate Risk
- Monitoring
- Mitigating the Risk of Legacy Machines
Module 7: Bridging the Air Gap
- Do You Really Want to Do This?
- Advantages and Disadvantages
- Guard
- Data Diode
- Next Generation Firewalls
Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)
- What IDS Can and Cannot Do
- Types IDS
- Network
- Host
- Network Node
- Advantages of IDS
- Limitations of IDS
- Stealthing the IDS
- Detecting Intrusions
LAB: Intrusion Detection
- Log Analysis
- ICS Malware Analysis
LAB: ICS Malware Analysis
- Essential Malware Mitigation Techniques
- ICS/SCADA Network Monitoring
- ICS/SCADA IDS
Prerequisites
-
-
-
- Linux operating system fundamentals, including basic command line usage.
- Conceptual knowledge of programming/scripting.
- Solid grasp of essential networking concepts (OSI model, TCP/IP, networking, devices, and transmission media).
- Understanding of basic security concepts (e.g., malware, intrusion detection, systems, firewalls, and vulnerabilities).
- Familiarity with network traffic inspection tools (Wireshark, TShark, or TCPdump) is highly recommended.
-
-
Achieve your ICS/SCADA Cybersecurity Certifications Today!
Whether you are simply seeking a knowledge based IT course, or are working towards passing the exam for your next IT certification, we offer the courses you are looking for as daytime classes, evening classes, boot camps and on-demand.
![cybersecurity-Military Certified Ethical Hacker v11 (CEH v11)](https://unf.appliedtechnologyacademy.com/wp-content/uploads/2020/10/cybersecurity-Military.jpg)
Client Testimonials
Be wary of companies that pay external vendors to farm and post reviews, many of them are not authentic. Ours come straight from Google, you can’t alter reviews on Google Maps in any way. Don’t take our word for who we are – hear from our clients:
Our EC-Council Awards and Accreditations.
Not only are we an EC-Council Accredited Training Center on a global level, but we have also received the EC-Council Academia Circle of Excellence Award for three years running. We also employ EC-Council award-winning Circle of Excellence instructors! As a result, your EC-Council training experience will be both superior and successful.
![Certified Ethical Hacker v11 (CEH v11)](https://unf.appliedtechnologyacademy.com/wp-content/uploads/2020/10/cropped-ec-council-partner-logo-2.png)
ACCREDITED TRAINING CENTER
Due to our expertise in security-based training, we deliver Authorized EC-Council Official Curriculum classes due to being an Accredited Training Center
![Certified Ethical Hacker v11 (CEH v11)](https://unf.appliedtechnologyacademy.com/wp-content/uploads/2020/10/cropped-EC-Council-Circle-of-Excellence-5.png)
CIRCLE OF EXCELLENCE
We are honored to have received the EC-Council Academic Circle of Excellence Award in 2017! This award is also coupled with a multi-year EC-Council Circle of Excellence instructor. A winning combination!
![Certified Ethical Hacker v11 (CEH v11)](https://unf.appliedtechnologyacademy.com/wp-content/uploads/2020/10/cropped-EC-Council-Training-Partner-Logo-Small-3-e1604534667978.jpg)
ACADEMIC TRAINING PARTNER
Through our university partnerships we are an EC-Council Accredited Academic Training partner. We strive to achieve academic excellence!
We offer more than just ICS/SCADA Cybersecurity Training
We offer more than just ICS/SCADA Cybersecurity Training
Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.
STRATEGIC PLANNING AND PROJECT MANAGEMENT
From Lean Six Sigma to PMI Project Management Professional, Agile and SCRUM , we offer the best-in-class strategic planning and project management training available. We are here to train your team!
IT AND CYBERSECURITY
As the leading Offensive Security US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best cybersecurity and vendor driven IT training and certification courses to keep your team ahead of the technology skills curve.
LEADERSHIP AND MANAGEMENT
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others, and build a culture that values communication, authenticity, and community.
Looking for ICS/SCADA Cybersecurity Training and Certifications?
And no, we will not relentlessly hound you with sales calls, we promise! Please reach out to us with any questions you might have. We welcome the opportunity to talk through your individual training needs, or that of your team. We are a no pressure, service oriented company. Reach out – you’ll be glad you did!