Course Summary

This course will enhance your ability to gain visibility and identify assets within your Industrial Control System (ICS)/Operational Technology (OT) networks. The course covers how to monitor for and detect cyber threats, analyze ICS cyber attacks to extract valuable lessons, conduct incident response, and adopt an intelligence-driven approach to building a leading ICS cybersecurity program that ensures safe and reliable operations.

By the end of the course, students will be equipped to understand their networked ICS environment, monitor it for potential threats, respond to identified incidents, and leverage lessons learned from adversary interactions to strengthen network security.

Key Topics Covered:

Active Defense Concepts and Application, Detection, and Analysis in an ICS Environment
Discovery and Monitoring in an ICS Environment, ICS-Focused Digital Forensics, and ICS-Specific Incident Response
Malware Analysis Techniques, Threat Analysis in an ICS Environment, and Threat Intelligence Fundamentals

Active Defense in an ICS Environment
The candidate will demonstrate an understanding of how active defense strategies are applied within ICS environments, and how insights from well-known ICS attacks can inform modern defense practices.

Detection in an ICS Environment
The candidate will demonstrate proficiency in the tools and techniques used to analyze network security evidence in an ICS environment.

Incident Response in an ICS Environment
The candidate will demonstrate an understanding of digital forensics and incident response (DFIR), focusing on the unique challenges of performing these tasks within an ICS environment.

Monitoring in an ICS Environment
The candidate will demonstrate knowledge of network monitoring techniques specific to ICS protocols and environments.

Threat Hunting and Analysis in an ICS Environment
The candidate will demonstrate an understanding of threat hunting and analysis practices tailored to ICS environments.

Threat Intelligence in an ICS Environment
The candidate will demonstrate an understanding of threat intelligence concepts and how they apply to securing an ICS environment.

Visibility and Asset Awareness in an ICS Environment
The candidate will demonstrate knowledge of strategies for asset discovery and enhancing network visibility within an ICS environment.

There are no formal prerequisites for this course; however, a basic understanding of cybersecurity concepts is recommended.

proctored exam 75 questions 2 hours Minimum passing score of 74%

Following your booking, a confirmation message will be sent to all participants, ensuring you're well-informed of your successful enrollment. Calendar placeholders will also be dispatched to assist you in scheduling your commitments around the course. Rest assured, all course materials and access to necessary labs or platforms will be provided no later than one week before the course begins, allowing you ample time to prepare and engage fully with the learning experience ahead.

Our comprehensive training package includes all the necessary materials and resources to facilitate a full learning experience. Enrollees will be provided with detailed course content, encompassing a wide array of topics to ensure a thorough understanding of the subject matter. Additionally, participants will receive a certificate of completion to recognize their dedication and hard work. It's important to note that while the course fee covers all training materials and experiences, the examination fee for certification is not included but can be purchased separately.

Questions About This Course?