Skip to content
Antisyphon Training

Antisyphon Training

  • Home
  • News & Updates
  • Calendar
  • Training
    • Course Catalog
    • Live Training
      • Live Courses Catalog
      • Live Training Calendar
    • On-Demand Training
      • On-Demand Catalog
      • Security for MSPs
    • Pay What You Can Training
    • Cybersecurity Training for Businesses
    • The Vault Program
    • Training Roadmap
  • Summits
    • Upcoming Summits
    • Past Summits
  • Cyber Range
    • About Our Cyber Range
    • ACE-T™ Certification
    • Purchase Subscription
  • About
    • Mission
    • FAQ
    • Our Instructors
    • Giving Back
    • Testimonials
  • Contact Us
  • Toggle search form
Loading Events

« All Events

Introduction to Industrial Control Systems

Event Series Event Series (See All)

November 17 @ 12:00 pm – 4:00 pm EST

Instructor: Ashley Van Hoesen
Course Length: 4 Days, 16 Hours

Includes: Twelve months of complimentary access to the Antisyphon Cyber Range, certificate of participation, six months access to class recordings.

Introduction to Industrial Control Systems with Ashley Van Hoesen
Register for Live Training!

Clicking on this button will take you to our registration form on Cvent.

Pricing:

$575 per person
Tags
Ashley Van Hoesen, ICS, Introduction to Industrial Control Systems
Event Categories:
Live, Virtual

Location:

Online

  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live

Course Description

This comprehensive course is designed to deeply understand cybersecurity’s key concepts, components, and role in modern industries. Whether you have minimal knowledge or experience in ICS, this course will equip you with the necessary skills to excel in this field. Through theoretical instruction and hands-on lab exercises, you will develop a solid foundation in ICS devices, components, architecture, and applications. You will also learn about ICS networking protocols and how to ensure secure communication within these systems. As you progress, you will explore common ICS attacks and acquire essential defense strategies to protect against them. The practical application of your knowledge will be facilitated through hands-on lab exercises conducted in a virtual environment.

Course Objectives

  • Develop an understanding of ICS devices, components, architecture, and applications.
  • Gain knowledge of ICS networking protocols and secure communication.
  • Learn about common ICS attacks and how to defend against them.
  • Apply the acquired knowledge through hands-on lab exercises in a virtual environment.

Who Should Take This Course

  • Process Control Engineer / Instrument & Control Engineer
  • ICS/SCADA Security Engineer
  • ICS/SCADA Penetration Tester
  • ICS/OT Systems Engineer
  • OT SOC Operator

Audience Skill Level

This course is tailored to beginners. The course addresses the core security principles needed to support critical infrastructure while examining the greatest risks and needs in an industrial control system environment.

Student Requirements

While the course covers core principles regarding industrial control systems, course participants should have a basic understanding of networking and system administration, TCP/IP, networking design/architecture, vulnerability assessment and penetration testing skills.

What Each Student Should Bring

Each student will need a laptop or desktop with the following hardware requirements:

  • CPU: 64-bit processor (Intel i5/i7 8th generation or newer, or AMD equivalent recommended)
  • BIOS: Intel-VTx or AMD-V enabled. You must be able to access your BIOS if changes are necessary.
  • RAM: A minimum of 8GB of RAM is required. It is recommended to have 16GB or more of RAM.
  • STORAGE: A minimum of 40GB of free storage space is required.

NOTE: Apple systems using the M1/M2 processor line cannot perform the necessary virtualization functions and therefore cannot be used for this course.

Additionally, students will need the following host and software requirements:

  • Download and install, one of the following:
    • VMware Workstation Pro 16.2.X+ or VMware Player 16.2.X+
    • VMware Workstation Pro 17.0.0+ or VMware Player 17.0.0+
    • VMWare Fusion Pro 12.2+ or VMware Fusion Player 11.5+

If you do not own a licensed copy of VMware Workstation Pro or VMware Fusion Pro, you can download a free 30-day trial copy from VMware. VMware will send you a time-limited serial number if you register for the trial at their website. VMware player can be used, but it offers fewer features than Workstation Pro.

  • Disable antivirus or endpoint protection
  • Local Administrative access
  • Download and install:
    • 7-zip for Windows Hosts
    • Keka for macOS hosts

Trainer & Author

Ashley Van Hoesen
Ashley Van Hoesen

Ashley Van Hoesen is a Security Analyst with experience in risk and vulnerability assessments, penetration testing, and advising on information security vulnerabilities and architecture. Ashley has vast experience working with Industrial Control System environments in a large variety of sectors.

Antisyphon Training

701-484-2447, ext. 5

View Organizer Website

support@antisyphontraining.com

Online

  • Google Calendar
  • iCalendar
  • Outlook 365
  • Outlook Live

Related Events

  • Secure Ideas - Introduction to PCI (PCI 101)

    Introduction to PCI (PCI 101)

    October 3 @ 12:00 pm – 4:00 pm EDT Event Series
  • Secure Ideas - Professionally Evil CISSP Mentorship

    Professionally Evil CISSP Mentorship Program

    October 3 @ 2:00 pm – 4:00 pm EDT Event Series
  • Professionally Evil Application Security (PEAS): Unveiling Server-Side Discovery and Exploitation

    October 4 @ 12:00 pm – 4:00 pm EDT Event Series

Event Navigation

  • « Practical Physical Exploitation
  • Practical Physical Exploitation »
Join the Antisyphon Training Discord Server!
  • Twitter
  • LinkedIn
  • Mastodon
PROMPT#

Copyright © 2023 Antisyphon

Powered by PressBook Dark WordPress theme