Sign Up for our Free One-Day SOC Summit Event March 25, 2026 Register Here

Foundations of Operational Technology

Course Authored by .

Foundations of Operational Technology is a 16-hour introductory course that provides a practical, security-focused understanding of industrial and operational technology environments. Participants learn how OT systems are designed, how they communicate, and how they are targeted by modern cyber threats. Through guided instruction and hands-on lab exercises, the course establishes the foundational knowledge required to identify vulnerabilities, understand exploitation techniques, and build a strong baseline for OT cybersecurity defense.

On-Demand $575.00

Course Length: 16 Hours

Includes a Certificate of Completion



Description

Foundations of Operational Technology is a 16-hour introductory course designed to establish a practical, security-focused understanding of industrial and operational technology environments. The course bridges the gap between traditional IT cybersecurity concepts and the realities of OT systems used to monitor and control physical processes.

Participants will explore how OT systems are built, how they communicate, and how they are targeted by modern threat actors. Through a combination of foundational theory and guided, hands-on lab exercises, students will develop the ability to recognize common OT architectures, understand industrial networking and protocols, identify realistic threats and vulnerabilities, and analyze how exploitation occurs in OT environments.

Rather than focusing solely on tools, the course emphasizes how and why OT systems fail, how adversaries leverage design and operational weaknesses, and how defenders can think critically about exposure, risk, and defensive priorities in industrial environments. The course provides the conceptual groundwork required for more advanced OT defense, assessment, and response activities.

This course is ideal for professionals who are new to OT cybersecurity or transitioning from IT into industrial environments and need a structured, realistic foundation before advancing into deeper technical or assessment-focused training.

 

  • Hardware Requirements
    • CPU: 64-bit processor (Intel i5/i7 8th generation or newer, or AMD equivalent recommended)
    • BIOS: Intel-VTx or AMD-V enabled. You must be able to access your BIOS if changes are necessary
    • RAM: A minimum of 8GB of RAM is required. It is recommended to have 16GB or more of RAM
    • STORAGE: A minimum of 40GB of free storage space is required
    • NOTE: Apple systems using the M1/M2 processor line cannot perform the necessary virtualization functions and therefore cannot be used for this course.
  • Software Requirements
    • Disable antivirus or endpoint protection
    • Local Administrative access
    • Download and install: 7-zip for Windows Hosts and Keka for macOS hosts
  • Download and install, one of the following:
    • VMware Workstation Pro 16.2.X+ or VMware Player 16.2.X+
    • VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+
    • VMWare Fusion Pro 12.2+ or VMware Fusion Player 11.5+
    • If you do not own a licensed copy of VMware Workstation Pro or VMware Fusion Pro, you can download a free 30-day trial copy from VMware. VMware will send you a time-limited serial number if you register for the trial at their website. VMware player can be used, but it offers fewer features than Workstation Pro.

Syllabus

Core Modules:

· ICS Fundamentals – OT and ICS concepts, devices, control logic, and operational constraints

· ICS Architecture – Common OT architectures, zones, conduits, and system interdependencies

· ICS Networking – Industrial networking concepts, protocols, and communication patterns

· Understanding Threats – Threat actors, attack paths, and adversary objectives in OT

· ICS Vulnerabilities – Design, configuration, and operational weaknesses unique to OT

· Exploitation in ICS – How vulnerabilities are leveraged in real-world OT attack scenarios

FAQ

Who Should Take This Course

• Process Control Engineer / Instrument & Control Engineer
• ICS/SCADA Security Engineer
• ICS/SCADA Penetration Tester
• ICS/OT Systems Engineer
• OT SOC Operator

Audience Skill Level

This course is tailored to beginners. The course addresses the core security principles needed to support critical infrastructure while examining the greatest risks and needs in an industrial control system environment.

Learning Outcomes

By the end of this course, participants will be able to:

· Describe how OT systems differ from IT systems in design, operation, and risk

· Identify common OT architectures and industrial network layouts

· Understand how threats target OT environments and where exposure exists

· Recognize common vulnerabilities and how they are exploited in ICS

· Build a foundational mindset for OT defense, assessment, and future specialization

About the Instructor

Pixel splash background
Bio

Ashley Wolfe is an operational technology (OT) cybersecurity professional specializing in industrial control systems (ICS) security and critical infrastructure defense. She is the Owner and Chief Technology Officer of Wolfe Evolution, where she leads the development and delivery of OT cybersecurity assessments, consulting services, and hands-on training programs.

Ashley brings practical, real-world experience designing, assessing, and securing industrial environments. Her work focuses on helping students understand how OT systems are built, how they communicate, and how they are targeted by modern threat actors—bridging the gap between traditional IT security concepts and operational realities.

As an instructor, Ashley emphasizes foundational understanding, critical thinking, and realistic attack and defense scenarios. Her courses are designed to prepare students not just to recognize vulnerabilities, but to understand how exploitation occurs in ICS

environments and how effective defensive decisions are made without disrupting operations.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.