Course Summary

This course will enhance your ability to gain visibility and identify assets within your Industrial Control System (ICS)/Operational Technology (OT) networks. The course covers how to monitor for and detect cyber threats, analyze ICS cyber attacks to extract valuable lessons, conduct incident response, and adopt an intelligence-driven approach to building a leading ICS cybersecurity program that ensures safe and reliable operations.

By the end of the course, students will be equipped to understand their networked ICS environment, monitor it for potential threats, respond to identified incidents, and leverage lessons learned from adversary interactions to strengthen network security.

Key Topics Covered:

Active Defense Concepts and Application, Detection, and Analysis in an ICS Environment
Discovery and Monitoring in an ICS Environment, ICS-Focused Digital Forensics, and ICS-Specific Incident Response
Malware Analysis Techniques, Threat Analysis in an ICS Environment, and Threat Intelligence Fundamentals

Active Defense in an ICS Environment
The candidate will demonstrate an understanding of active defense applied to ICS environments and how well-known ICS attacks provide insight today.
Detection in an ICS Environment
The candidate will demonstrate an understanding of the tools and techniques used to analyze network security evidence in an ICS environment
Incident Response in an ICS Environment
The candidate will demonstrate an understanding of digital forensics and incident response and the unique challenges to performing DFIR in an ICS environment.
Monitoring in an ICS Environment
The candidate will demonstrate an understanding of network related monitoring specific to ICS protocols and environments.
Threat Hunting and Analysis in an ICS Environment
The candidate will demonstrate an understanding of threat hunting and analysis in an ICS environment.
Threat Intelligence in an ICS Environment
The candidate will demonstrate an understanding of threat intelligence concepts and their application to an ICS environment.
Visibility and Asset Awareness in an ICS Environment
The candidate will demonstrate an understanding of strategies for asset discovery and network visibility in an ICS environment.

There are currently no prerequisites for this course. However a fundamental cybersecurity experience is recommended.

proctored exam 75 questions 2 hours Minimum passing score of 74%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?