Training

We provide courses ranging from 1 day to 5 days that deliver training covering basics of ICS security through to a wide variety of attacks and defences. We also offer bespoke courses tailored to the needs of an organisation. All courses include hands-on training on the state-of-the-art equipment that we utilise. This also provides attendees a unique opportunity to experience attacks and defences for industrial control systems security on devices and platforms used in real-world systems.

We have an extensive library of courses in addition to the below examples which can all be tailored to the specific requirements of our clients. Please contact us to discuss your priorities.

OT Security Bootcamp for IT Security Professionals (One Day)

This bootcamp is based on our highly successful bootcamps delivered in Spring 2025 across the South West of England. It provides IT security professionals a first foray into industrial control systems security, introducing the architectures, devices and communication protocols typically used, the security tools required to study attacks and their impacts, and hands-on experience with basic asset discovery and vulnerability exploitation. 

Establishing a Security Baseline of an ICS environment (Two Days)

This course trains attendees in basics of ICS security, followed by experience with asset discovery tools and techniques, developing a detailed understanding of the protocols used for communication and their vulnerabilities as well as traffic capture and analysis. Hands-on experience provides a tailored understanding of vulnerabilities and their impact on the safety and operation of an ICS.

 

ICS Security for Safety Engineers (Three Days)

This course provides an understanding of fundamental principles in cyber security, relevant tooling to assess the cyber security of Industrial Control Systems and an understanding of vulnerabilities, their impacts and how to mitigate against the risks posed.

 

 

Hands on with Attacks against ICS (Five Days)

This course provides a deep dive into different classes of attacks against ICS, including relevant tools and techniques used by attackers to successfully exploit vulnerabilities. The course also covers impacts on the safety, reliability and availability of critical systems as a consequence of the attacks and provides an overview of mitigation mechanisms to reduce the risks of attacks successfully reaching critical system elements.

These courses are exemplars...

Contact us for more of our pre-designed courses.

 

Custom courses

Do you have something specific in mind? Get in touch with us to discuss your requirements.