Hands on with Attacks against ICS (Five Days)
Topics Covered
- Introduction to ICS and OT including differences between IT Security and OT Security using a number of case studies
- Anatomy of different OT attacks, reconnaissance of OT systems and how to mitigate against reconnaissance by mal-actors while supporting legitimate asset discovery
- Exploitation of industrial protocols and how to mitigate against such exploits
- PLC attacks and how to mitigate against them
- Use of traditional IT attacks against OT and how to defend OT systems from such attacks
- Evasion strategies used by attackers, how to implement these for testing and how to identifying indicators of evasion during and post attack
Training Outcomes
You should commission this course to provide your team with:
- An understanding of Operational Technology used in industrial control systems
- Ability to contrast IT and OT security as well as appreciation of convergence of the two domains and the attacks resulting from such convergence
- Knowledge of different classes of attacks and the vulnerabilities exploited by such attacks
- An understanding of relevant mitigation techniques pertinent to different classes of attacks
- Hands-on training with tools and techniques used by attackers to compromise OT security
- Hands-on training with attacks and their impact on industrial control systems
