Course Summary
ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.
Industrial control system components, purposes, deployments, significant drivers, and constraints
Control system attack surfaces, methods, and tools
Control system approaches to system and network defense architectures and techniques
Incident-response skills in a control system environment
Governance models and resources for industrial cybersecurity professionals
Hardening & Protecting Endpoints
The candidate will be able to describe how to implement endpoint security software along with hardening and patching, to secure the Windows and Unix style operating systems commonly found in an ICS environment.
ICS Components & Architecture
The candidate will be able to categorize assets that comprise Purdue Reference Architecture levels zero through three and describe how they can be implemented in a securable architecture. The candidate will also be able to summarize the use of levels and zones in defining a secure ICS architecture, as well as the devices deployed at each level and zone.
ICS Overview & Concepts
The candidate will be able to summarize the function of high-level ICS processes as well as ICS roles and responsibilities. The candidate will also be able to compare and contrast high-level differences between ICS and IT, including physical security considerations.
ICS Program & Policy Development
The candidate will be able to summarize the steps and best practices used in building a security program and creating enforceable security policies for an ICS.
Intelligence Gathering & Threat Modeling
The candidate will be able to determine the threat landscape of an ICS and high-level concepts of threat modeling.
PERA Level 0 & 1 Technology Overview and Compromise
The candidate will be able to describe level 0 and level 1 devices and technologies and summarize how those devices and technologies are targeted and attacked.
PERA Level 2 & 3 Technology Overview and Compromise
The candidate will be able to describe level 2 and level 3 devices and technologies and summarize how those devices and technologies are targeted and attacked.
Protocols, Communications, & Compromises
The candidate will be able to describe the basic structures, protocols, and defense of communications within an ICS and summarize how they can be compromised. This includes TCP/IP as well as ICS specific protocols. The candidate will also be able to, at a basic level, describe the cryptography used to protect communications.
Risk Based Disaster Recovery & Incident Response
The candidate will be able to describe how risk is measured and how it can be used to inform disaster recovery and incident response.
Wireless Technologies & Compromises
The candidate will be able to summarize the different wireless communication technologies used in an ICS, how they are targeted, and how they can be defended.
Other Popular Courses
Next Generation Mindfulness
- Duration: 1 Days
- Language: English
- Level: Foundation
- Exam: NGM
Nutanix Multicloud Infrastructure Design (NMC...
- Duration: 1 Days
- Language: English
- Level: Advanced
- Exam: Nutanix Certifi
CertNexus: CyberSec First Responder (CFR)
- Duration: 5 Days
- Language: English
- Level: Advanced
- Exam: CFR-410