Join us for Wild West Hackin’ Fest Deadwood virtual conference! Register Here

Introduction to Industrial Control Systems with Ashley Van Hoesen

Course Authored by .

This course will equip you with everything you need to understand ICS. Learn theory and hands-on skills in ICS devices, networking, and defense strategies against common attacks, all in a practical virtual lab environment.

On-Demand $575.00

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This course will equip you with everything you need to understand ICS. Learn theory and hands-on skills in ICS devices, networking, and defense strategies against common attacks, all in a practical virtual lab environment.

This comprehensive course is designed to deeply understand cybersecurity’s key concepts, components, and role in modern industries. Whether you have minimal knowledge or experience in ICS, this course will equip you with the necessary skills to excel in this field. Through theoretical instruction and hands-on lab exercises, you will develop a solid foundation in ICS devices, components, architecture, and applications. You will also learn about ICS networking protocols and how to ensure secure communication within these systems. As you progress, you will explore common ICS attacks and acquire essential defense strategies to protect against them. The practical application of your knowledge will be facilitated through hands-on lab exercises conducted in a virtual environment.

System Requirements
  • Each student will need a laptop or desktop with the following hardware requirements:
    • CPU: 64-bit processor (Intel i5/i7 8th generation or newer, or AMD equivalent recommended)
    • BIOS: Intel-VTx or AMD-V enabled. You must be able to access your BIOS if changes are necessary
    • RAM: A minimum of 8GB of RAM is required. It is recommended to have 16GB or more of RAM
    • STORAGE: A minimum of 40GB of free storage space is required
    • NOTE: Apple systems using the M1/M2 processor line cannot perform the necessary virtualization functions and therefore cannot be used for this course.
  • Additionally, students will need the following host and software requirements:
    • Disable antivirus or endpoint protection
    • Local Administrative access
    • Download and install: 7-zip for Windows Hosts and Keka for macOS hosts
  • Download and install, one of the following:
    • VMware Workstation Pro 16.2.X+ or VMware Player 16.2.X+
    • VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+
    • VMWare Fusion Pro 12.2+ or VMware Fusion Player 11.5+
    • If you do not own a licensed copy of VMware Workstation Pro or VMware Fusion Pro, you can download a free 30-day trial copy from VMware. VMware will send you a time-limited serial number if you register for the trial at their website. VMware player can be used, but it offers fewer features than Workstation Pro.

FAQ

Who Should Take This Course
• Process Control Engineer / Instrument & Control Engineer
• ICS/SCADA Security Engineer
• ICS/SCADA Penetration Tester
• ICS/OT Systems Engineer
• OT SOC Operator
Audience Skill Level
This course is tailored to beginners. The course addresses the core security principles needed to support critical infrastructure while examining the greatest risks and needs in an industrial control system environment.

About the Instructor

Pixel splash background
Ashley Van Hoesen
Ashley Van Hoesen

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.