
This course, *Professionally Evil ICS & OT Fundamentals*, provides a comprehensive introduction to the foundational principles of ICS/OT environments.
Course Length: 16 Hours
Includes a Certificate of Completion
Next scheduled date:
Description
This course, *Professionally Evil ICS & OT Fundamentals*, provides a comprehensive introduction to the foundational principles of ICS/OT environments.
Industrial Control Systems (ICS) and Operational Technology (OT) are the backbone of critical infrastructure, enabling essential processes in energy, manufacturing, transportation, and other industries. However, the increasing integration of traditional IT technologies within ICS/OT environments brings unique security challenges distinct from, yet overlapping with, IT systems. The increase of cyber threats brings to focus the need for security program strategies to be implemented to protect these critical operations.
Participants will explore the architecture and operational dynamics of OT systems, the role of SCADA networks, and the unique considerations for incorporating cybersecurity into these environments. The course also covers the limitations and challenges of applying traditional IT security methodologies in OT settings, highlighting the importance of balancing operational reliability with effective threat mitigation.
Through engaging lectures, hands-on insights, and real-world examples, attendees will gain the knowledge necessary to understand, assess, and improve the cybersecurity posture of ICS/OT systems without compromising operational goals.
System Requirements
-
Student Requirements
- Able to join the Antisyphon web cast.
Syllabus
Day1
Introduction and Fundamentals of OT
-
- Role of OT
-
- OT vs IT
-
- Real-word Examples
OT Systems
-
- OT vs ICS vs SCADA
-
- Common OT Systems and Components
-
- Uses
Industrial Control Systems (ICS) Basics
-
- Introduction to ICS
-
- Differences Between OT and ICS
-
- Networking
Key Sectors
-
- Critical Infrastructure
-
- Sector Specific Challenges
-
- Role of OT in Critical Infrastructure
ICS Security
-
- The Purdue Enterprise Reference Architecture (PERA)
-
- Safety and Control Zones
-
- Data Zones
-
- Enterprise and Corporate Zones
Day 2
Control Engineering and Automation
-
- Benefits
-
- Process Flow and Control Logic
-
- Engineering Disciplines in OT System Design
Attack Life-Cycle
-
- Cyber and Physical Threats
-
- Attack Vectors
-
- Attack Methodology
Real-World Examples
Product Vulnerabilities
-
- Products and Devices
-
- Assessment and Mitigation
-
- In-Practice
Regulatory
Enforceable Standards
NERC CIP
FAQ
This course is ideal for those interested in learning the fundamentals of ICS/OT, IT professionals new to ICS/OT, IT Security practitioners transitioning to industrial environments, and anyone responsible for securing critical infrastructure.
About the Instructor
Giovanni Cofré
"Professionally Evil"Bio
Team Consultant Lead at Secure Ideas, Giovanni brings over 26 years of Information Technology experience, focusing on securing and defending corporate networks, Operational Technology (OT) environments, and high-profile E-commerce sites since 2000. His passion for the Information Security discipline is matched by a commitment to mentoring future Security professionals, sharing his wide-ranging experience, and fostering a culture of Security awareness.
Related products
-
Tanya JancaLive4 Hrs
Workshop: The OWASP API Security Top Ten 2023 with Tanya Janca
View Course This product has multiple variants. The options may be chosen on the product page -
Michael AllenLiveOD16 Hrs
Red Team Initial Access with Michael Allen
View Course This product has multiple variants. The options may be chosen on the product page -
John StrandLiveOD16 Hrs
Introduction to Pentesting with John Strand
View Course This product has multiple variants. The options may be chosen on the product page -
Faan RossouwLive4 Hrs
Workshop: Build a Multi-Modal C2 Covert Channel in Golang with Faan Rossouw
View Course This product has multiple variants. The options may be chosen on the product page
