Course Summary

The ICS/SCADA Cybersecurity course teaches the foundations of security and defending network architectures from attacks. Students will learn to think like a malicious hacker to defend their organizations.

ICS/SCADA teaches powerful methods to analyze risks possessed by network infrastructure in IT and corporate spaces. Once your foundation or basic concepts are clear, you will learn a systematic process of intrusion and malware analysis. After this, you will learn about digital forensic process and incident response techniques upon detecting a breach.

Module 1: Introduction to ICS/SCADA Network Defense

• IT Security Model
• ICS/SCADA Security Model
• Security Posture
• Risk Management in ICS/SCADA
• Risk Assessment
• Defining Types of Risk
• Security Policy

Module 2: TCP/IP 101

• Introduction and Overview
• Introducing TCP/IP Networks
• Internet RFCs and STDs
• TCP/IP Protocol Architecture
• Protocol Layering Concepts
• TCP/IP Layering
• Components of TCP/IP Networks
• ICS/SCADA Protocols

Module 3: Introduction to Hacking

• Review of the Hacking Process
• Hacking Methodology
• Intelligence Gathering
• Footprinting
• Scanning
• Enumeration
• Identify Vulnerabilities
• Exploitation
• Covering Tracks
• How ICS/SCADA Are Targeted
• Study of ICS/SCADA Attacks
• ICS/SCADA as a High–Value Target
• Attack Methodologies In ICS

Module 4: Vulnerability Management

• Challenges of Vulnerability Assessment
• System Vulnerabilities
• Desktop Vulnerabilities
• ICS/SCADA Vulnerabilities
• Interpreting Advisory Notices
• CVE
• ICS/SCADA Vulnerability Sites
• Life Cycle of a Vulnerability and Exploit
• Challenges of Zero-Day Vulnerability
• Exploitation of a Vulnerability
• Vulnerability Scanners
• ICS/SCADA Vulnerability Uniqueness
• Challenges of Vulnerability Management Within • ICS/SCADA
• Prioritizing Vulnerabilities
• CVSS
• OVAL

Module 5: Standards and Regulations for Cybersecurity

• ISO 27001
• ICS/SCADA
• NERC CIP
• CFATS
• ISA99
• IEC 62443
• NIST SP 800-82

Module 6: Securing the ICS network

• Physical Security
• Establishing Policy – ISO Roadmap
• Securing the Protocols Unique to the ICS
• Performing a Vulnerability Assessment
• Selecting and Applying Controls to Mitigate Risk
• Monitoring
• Mitigating the Risk of Legacy Machines

Module 7: Bridging the Air Gap

• Do You Really Want to Do This?
• Advantages and Disadvantages
• Guard
• Data Diode
• Next Generation Firewalls

Module 8: Introduction to Intrusion Detection

• Systems (IDS) and Intrusion Prevention Systems (IPS)
• What IDS Can and Cannot Do
• Types IDS
• Network
• Host
• Network Node
• Advantages of IDS
• Limitations of IDS
• Stealthing the IDS
• Detecting Intrusions
• Essential Malware Mitigation Techniques
• ICS/SCADA Network Monitoring
• ICS/SCADA IDS

You should have knowledge in: • Linux operating system fundamentals, including basic command line usage • Programming/scripting • Networking concepts (OSI model, TCP/IP, networking devices, and transmission media) • Security concepts (e.g., malware, intrusion detection systems, firewalls, and vulnerabilities) • Network traffic inspection tools (Wireshark, TShark, or TCPdump)

EC-Council ICS/SCADA Cyber Security exam Duration: 2 hours Number of questions: 70

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?