Assessing and Protecting Industrial Control Systems
- Description
- Curriculum
- FAQ
- Reviews
Gain practical, hands-on experience in securing OT environments through simulated exercises and real-world scenarios. Learn from an expert with extensive experience, providing valuable insights and guidance throughout the course. Elevate your defensive OT skills to the next level.
Join now and step into the exciting world of OT security! In this comprehensive course, you will embark on a mission to assess and protect the infrastructure of Joy Cookie Factory as it prepares to transition its entire shop floor online. Unlike previous courses, we prioritize understanding the environment in which OT devices operate, recognizing threats, and implementing effective onboard protection techniques to fortify these devices against cyber threats.
In this course, you’ll dive into the essentials of OT security, focusing on practical skills and actionable strategies. Whether you’re a newcomer to the field or a seasoned professional, this course will empower you to safeguard OT environments effectively.
Gain a comprehensive understanding of the ecosystem in which OT devices operate, enabling you to identify potential vulnerabilities and threats. Learn how to create a thorough OT asset inventory and assess devices for common vulnerabilities, laying the groundwork for robust security measures. Acquire essential skills and techniques to fortify your OT environment against attacks, utilizing onboard resources and a firewall without relying on expensive detection and response tools.
While participation in the predecessor course, Practical Industrial Control System Penetration Testing, is optional, it is highly recommended. Both courses together provide a holistic understanding of OT device vulnerabilities and their operating environments, setting you up for success in securing OT systems effectively.
The core exercise of this course revolves around a simulated OT network of a cookie factory, offering hands-on experience in creating an OT asset inventory and assessing devices for vulnerabilities. Through practical exercises and real-world scenarios, you’ll develop the skills needed to defend OT environments effectively.
Enroll today and take the first step towards mastering the art of defending industrial control systems. Equip yourself with the knowledge and skills needed to safeguard critical infrastructure and protect against evolving cyber threats. Don’t miss out on this opportunity to advance your career and make a tangible impact in the world of OT security. Join us now and embark on a journey towards a more secure future!
Curious about penetration testing of ICS/OT devices? Join my course Practical Industrial Control System Penetration Testing.
Please note that the software used is not mine. I can only offer limited assistance in case of problems. Please contact the publisher of the software for help. The installation instructions were created to the best of my knowledge, but the responsibility for the installation lies with the participants.
-
1IntroductionVideo lesson
-
2Contrasting IT and OTVideo lesson
-
3Pentest Classifications of ICS/OT SystemsVideo lesson
-
4ICS/OT Devices are Easy TargetsVideo lesson
-
5Reviewing the Industrial Attack LandscapeVideo lesson
-
6OT OSINT Techniques You can try for YourselfVideo lesson
-
7SummaryVideo lesson
-
8Test your Knowledge!Quiz
-
9Introduction to Setting Up Your ICS/OT LabVideo lesson
-
10Understanding Virtualization and Virtual MachinesVideo lesson
-
11Installation of VirtualBoxVideo lesson
-
12Installing the Kali Linux VM and downloading additional nmap scriptsVideo lesson
-
13Installing the Ubuntu Desktop VMVideo lesson
-
14Running the Install Script to get the Course MaterialsVideo lesson
-
15Setting up the HostOnly NetworkVideo lesson
-
16Summary of Setting Up Your ICS/OT LabVideo lesson
-
17Introduction to Practical RefresherVideo lesson
-
18Setup the VM, Start the S7-300 Emulation and Excercise TasksVideo lesson
-
19Recap Netdiscover, Nmap, Nmap NSE (Spoiler Free)Video lesson
-
20Step by Step Excercise Solution: S7-300 Recon, Enum and AssessmentVideo lesson
-
21Report Writing with ChatGPTVideo lesson
-
22Summary of Practical RefresherVideo lesson
-
23Test your Practical Refresher Knowledge!Quiz
-
24Introduction to Preparing the AssessmentVideo lesson
-
25Setting the Stage: Crumbs of Joy Cookie Factory and getting to know their OTVideo lesson
-
26The Penetration Testing AgreementVideo lesson
-
27Your Asset Inventory TemplateVideo lesson
-
28Migrating the Client's Data into our Asset InventoryVideo lesson
-
29Create a Network Topology from Scratch with draw.ioVideo lesson
-
30Summary of Preparing the AssessmentVideo lesson
-
31Test your Preparing the Assessment Knowledge!Quiz
-
32Introduction to OT Network AssessmentVideo lesson
-
33Performing a Layer 2 Asset Discovery - TaskVideo lesson
-
34Performing a Layer 2 Asset Discovery - SolutionVideo lesson
-
35Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - TaskVideo lesson
-
36Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - SolutionVideo lesson
-
37Scanning the OT Network for Open Ports with Nmap - TaskVideo lesson
-
38Scanning the OT Network for Open Ports with Nmap - SolutionVideo lesson
-
39Summary of OT Network AssessmentVideo lesson
-
40Test your OT Network Assessment Knowledge!Quiz
-
41Introduction to PLC AssessmentVideo lesson
-
42Setting up the PLC Emulation and TaskVideo lesson
-
43Scanning for Open Ports and Probing the Industrial Protocol with Nmap - SolutionVideo lesson
-
44Assessing the PLC's Exposed Webserver - SolutionVideo lesson
-
45Summary of PLC AssessmentVideo lesson
-
46Test your PLC Assessment Knowledge!Quiz
-
47Introduction to Human-Machine-Interface AssessmentVideo lesson
-
48Setting up the HMI Emulation and TaskVideo lesson
-
49Scanning for Open Ports with Nmap - SolutionVideo lesson
-
50Assessing the HMI's Remote Access Services - SolutionVideo lesson
-
51Summary of Human-Machine-Interface Assessment and BonusVideo lesson
-
52Test your Human-Machine-Interface Assessment Knowledge!Quiz
-
53Introduction to Summarizing the Findings and ReportingVideo lesson
-
54Update the Network Topology - TaskVideo lesson
-
55Update the Network Topology - SolutionVideo lesson
-
56Discovering Undocumented Network HostsVideo lesson
-
57Critical Findings: OT Network Architecture, Remote Access, PLC, HMIVideo lesson
-
58Summarizing Key-Findings in an DashboardVideo lesson
-
59Reporting the Findings with ChatGPTVideo lesson
-
60Summary of Summarizing the Findings and ReportingVideo lesson
-
61Test your Summarizing the Findings and Reporting Knowledge!Quiz
-
62Introduction to Risk Assessment and Threat ModellingVideo lesson
-
63Risks of a Flat OT Network ArchitectureVideo lesson
-
64Risks of VPN Remote Access RouterVideo lesson
-
65Security Maturity Levels as in IEC/ISA 62443Video lesson
-
66Introduction to the ICS ATT&CK FrameworkVideo lesson
-
67Understanding common used techniques by creating a heatmap in ATT&CKVideo lesson
-
68Developing a Threat Scenario on the PLC and HMI using ATT&CK - TaskVideo lesson
-
69Developing a Threat Scenario on the PLC and HMI using ATT&CK - SolutionVideo lesson
-
70Mitigating Threats using the ATT&CK Mitigation RecommendationsVideo lesson
-
71Developing a Threat Scenario using HAZOP and Dynamical Systems TheoryVideo lesson
-
72Developing a Threat Scenario using the Use Case Abuse Model (OT Thought Model)Video lesson
-
73Adding Identified Risks to the ReportVideo lesson
-
74Summary of Risk Assessment and Threat ModellingVideo lesson
-
75Test your Risk Assessment and Threat Modelling Knowledge!Quiz
-
76Introduction to Protection TechniquesVideo lesson
-
77The Purdue Reference Model and the Automation PyramidVideo lesson
-
78Defense in Depth ModelVideo lesson
-
79System Hardening of the PLCVideo lesson
-
80System Hardening of the HMI and Secure HMI Screen DesignVideo lesson
-
81System Hardening vs Threat Scenario in ICS ATT&CKVideo lesson
-
82Reducing the Risks of a Flat OT Network with Network SegmentationVideo lesson
-
83Best Practises for Secure Remote AccessVideo lesson
-
84Remote Access via Jump HostVideo lesson
-
85Attack Surface Reduction with Secure CodingVideo lesson
-
86Adding Mitigation Recommendations to the ReportVideo lesson
-
87Summary of Protection TechniquesVideo lesson
-
88Test your Protection Techniques Knowledge!Quiz

External Links May Contain Affiliate Links read more