ICS Security Foundation

40 hrs of ICS Security Learnings

Supported by OT Security Huddle

Introduction

Our 5-day ICS Cybersecurity Course is tailored for professionals aiming to master the intricacies of industrial control systems (ICS) cybersecurity. This comprehensive program offers in-depth knowledge of ICS architecture, threat landscapes, and advanced security practices, reinforced through hands-on virtual labs. Ideal for those responsible for securing critical infrastructure, this course also prepares participants for relevant certifications in the ICS cybersecurity domain.

Bonus:
  • Get all the learning for appearing for GICSP Certification Exam

  • 2 GICSP level Practice Exams

Duration: 5 Days (40 Hours)
Delivery Method: Virtual
Next Batch: August 16-17, 24, 30-31, 2025
Price: USD 999 799 or INR 74,999 54,999

Day 1: Foundations of Industrial Control Systems (ICS) and Cyber-Physical Operations
  • Hours: 8

  • Topics Covered:

    • Introduction to Industrial Control Systems (ICS):

      • Overview of ICS environments and key industries (DCS, SCADA, PLCs).

      • Key components and processes within ICS.

    • ICS Architecture:

      • Deep dive into ICS architecture (Purdue Model Levels 0-3).

      • Controllers, field devices, HMIs, historians, and specialized applications.

    • Cyber-Physical Considerations:

      • Understanding the interplay between cyber and physical systems.

      • Importance of safety protections and communication needs in ICS.

    • Virtual Exercises:

      • Simulated PLC Programming: Use online PLC simulators to practice programming and mapping to HMI.

      • ICS Component Mapping: Virtual exercise to identify and categorize ICS components within a sample network.

      • ICS Terminology Quiz: Online quiz to reinforce understanding of key ICS terms.

Day 2: ICS Threat Landscape and Defensive Architecture Design
  • Hours: 8

  • Topics Covered:

    • Threats and Vulnerabilities in ICS:

      • Overview of the threat landscape specific to ICS.

      • Common vulnerabilities in ICS environments.

      • Real-world case studies of ICS security incidents.

    • Designing Secure ICS Architectures:

      • Best practices for designing secure ICS networks.

      • Securing remote access and ensuring defensible architectures.

    • Virtual Exercises:

      • Identifying Attack Surfaces: Use case studies to virtually map potential attack surfaces in an ICS setup.

      • Architecting Secure Sites: Collaborative online design of a secure ICS site using real-world scenarios.

      • Modbus Protocol Analysis: Capture and analyze Modbus protocol traffic in a virtual lab environment.

Day 3: Secure Communication Protocols and Network Defense in ICS
  • Hours: 8

  • Topics Covered:

    • ICS Communication Protocols:

      • Overview of key ICS communication protocols (Modbus, DNP3).

      • Understanding Ethernet and TCP/IP in ICS environments.

    • Securing Network Traffic:

      • Techniques for analyzing and securing ICS network traffic.

      • Role of firewalls, NIDS/NIPS, and data diodes in ICS.

    • Virtual Exercises:

      • Network Capture Analysis: Use cloud-hosted Wireshark instances to analyze pre-captured ICS network traffic.

      • Enumerating ICS Protocols: Identify and analyze specific ICS protocols using online tools.

      • Firewall Configuration: Virtual configuration of firewall rules using simulation tools.

      • Encryption Exercise: Online exercise to implement basic encryption on ICS communications and verify integrity.

Day 4: Supervisory Control and Data Acquisition (SCADA) Systems and Attack Mitigation
  • Hours: 8

  • Topics Covered:

    • Supervisory Systems in ICS:

      • Deep dive into SCADA, HMIs, and historian systems.

      • Understanding the vulnerabilities and attack vectors.

    • Workstation and Server Security:

      • Securing ICS workstations and servers.

      • Implementing security policies and patch management.

    • Incident Response in ICS:

      • Incident detection and response strategies specific to ICS.

      • Practical approaches to incident containment and recovery.

    • Virtual Exercises:

      • Simulated Attacks on HMIs: Conduct simulated attacks on HMI interfaces using online labs.

      • Securing Windows Systems: Apply best practices in a virtual environment for securing Windows-based ICS systems.

      • SCADA System Hardening: Implement security measures on a virtual SCADA system.

Day 5: Governance, Compliance, and Linux Security in ICS
  • Hours: 8

  • Topics Covered:

    • Governance and Compliance in ICS:

      • Understanding key regulatory frameworks and standards.

      • Developing and enforcing cybersecurity policies in ICS.

    • Linux Systems in ICS:

      • Overview of Linux-based systems in ICS environments.

      • Techniques for hardening and securing Linux systems.

    • Building a Robust ICS Security Program:

      • Steps to establish a comprehensive ICS cybersecurity program.

      • Integration of risk management and disaster recovery planning.

    • Virtual Exercises:

      • Hardening Linux Systems: Apply security best practices in a cloud-based Linux environment.

      • Log Management: Use virtual machines to manage and analyze logs from both Windows and Linux environments.

      • Policy Development Workshop: Collaboratively create and review ICS security policies in an online workshop.

      • Disaster Recovery Plan Exercise: Develop a disaster recovery plan for a simulated ICS environment and test its effectiveness through online collaboration tools.

Additional Resources:
  • Study Materials:

    • Access to digital reading lists and study guides.

    • Case studies and industry reports accessible online for deeper insights.

  • Practice Scenarios:

    • Real-world scenarios and challenges delivered through virtual labs.

  • Post-Course Support:

    • Online community access for peer support and continuous learning.

    • Follow-up virtual sessions and resources to support ongoing professional development.

  • Prerequisites

    • Equipment: Participants must have a laptop with at least 8 GB of RAM.

    • Software: VirtualBox must be installed before the course begins.

    • Internet: Stable Internet connection