Course Overview

Step into Operational Technology (OT) security with our "Assessing and Protecting Industrial Control Systems" course. Designed to provide practical, hands-on experience, this course will guide you through securing OT environments using simulated exercises and real-world scenarios. Learn from an expert with extensive experience in OT security, gaining valuable insights and guidance to elevate your defensive skills to the next level.

This course begins with an in-depth understanding of the OT ecosystem, focusing on identifying potential vulnerabilities and threats. You'll learn how to create a thorough OT asset inventory and assess devices for common vulnerabilities, setting the stage for robust security measures. Key topics include understanding the environment in which OT devices operate, recognizing and mitigating threats, and implementing effective onboard protection techniques without relying on expensive detection and response tools. The course's core exercise revolves around a simulated OT network of a cookie factory, offering hands-on experience in securing industrial control systems.

By the end of this course, you will be equipped with the knowledge and skills necessary to safeguard critical infrastructure and protect against evolving cyber threats.

The necessary resources for this course are in the "Resources" section of Video 1.1. You can also access them through this direct link - https://github.com/ec-council-learning/Assessing-and-Protecting-Industrial-Control-Systems

What You Will Learn

  • Assess a simulated cookie factory with real pentesting tools
  • Create cyber threat scenarios using various frameworks and defining protection measurements
  • Build a free open-source virtual lab environment
  • No exploiting or pwning
  • the focus is on understanding the challenges of an OT production environment

Program Curriculum

  • Introduction
  • Contrasting IT and OT
  • Pentest Classifications of ICS/OT Systems
  • ICS/OT Devices Are Easy Targets
  • Reviewing the Industrial Attack Landscape
  • OT OSINT Techniques You Can Try for Yourself
  • Summary
  • Chapter 1 Quiz

  • Introduction to Setting Up Your ICS/OT Lab
  • Understanding Virtualization and Virtual Machines
  • Installation of VirtualBox
  • Installing the Kali Linux VM and Downloading Additional Nmap Scripts
  • Installing the Ubuntu Desktop VM
  • Running the Install Script to Get the Course Materials
  • Setting up the HostOnly Network
  • Summary of Setting Up Your ICS/OT Lab
  • Chapter 2 Quiz

  • Introduction to Practical Refresher
  • Setup the VM, Start the S7-300 Emulation and Exercise Tasks
  • Recap Netdiscover, Nmap, Nmap NSE (Spoiler Free)
  • Step by Step Exercise Solution: S7-300 Recon, Enum, and Assessment
  • Report Writing with ChatGPT
  • Summary of Practical Refresher
  • Chapter 3 Quiz

  • Introduction to Preparing the Assessment
  • Setting the Stage: Crumbs of Joy Cookie Factory and Getting to Know their OT
  • The Penetration Testing Agreement
  • Your Asset Inventory Template
  • Migrating the Client's Data into Our Asset Inventory
  • Create a Network Topology from Scratch with draw.io
  • Summary of Preparing the Assessment
  • Chapter 4 Quiz

  • Introduction to OT Network Assessment
  • Performing a Layer 2 Asset Discovery - Task
  • Performing a Layer 2 Asset Discovery - Solution
  • Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - Task
  • Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - Solution
  • Scanning the OT Network for Open Ports with Nmap - Task
  • Scanning the OT Network for Open Ports with Nmap - Solution
  • Summary of OT Network Assessment
  • Chapter 5 Quiz

  • Introduction to PLC Assessment
  • Setting up the PLC Emulation and Task
  • Scanning for Open Ports and Probing the Industrial Protocol with Nmap - Solution
  • Assessing the PLC's Exposed Webserver - Solution
  • Summary of PLC Assessment
  • Chapter 6 Quiz

  • Introduction to Human-Machine-Interface Assessment
  • Setting up the HMI Emulation and Task
  • Scanning for Open Ports with Nmap - Solution
  • Assessing the HMI's Remote Access Services - Solution
  • Summary of Human-Machine-Interface Assessment and Bonus
  • Chapter 7 Quiz

  • Introduction to Summarizing the Findings and Reporting
  • Update the Network Topology - Task
  • Update the Network Topology - Solution
  • Discovering Undocumented Network Hosts
  • Critical Findings: OT Network Architecture, Remote Access, PLC, HMI
  • Summarizing Key-Findings in a Dashboard
  • Reporting the Findings with ChatGPT
  • Summary of Summarizing the Findings and Reporting
  • Chapter 8 Quiz

  • Introduction to Risk Assessment and Threat Modelling
  • Risks of a Flat OT Network Architecture
  • Risks of VPN Remote Access Router
  • Security Maturity Levels as in IEC/ISA 62443
  • Introduction to the ICS ATT&CK Framework
  • Understanding Commonly used Techniques by Creating a Heatmap in ATT&CK
  • Developing a Threat Scenario on the PLC and HMI using ATT&CK - Task
  • Developing a Threat Scenario on the PLC and HMI using ATT&CK - Solution
  • Mitigating Threats using the ATT&CK Mitigation Recommendations
  • Developing a Threat Scenario using HAZOP and Dynamical Systems Theory
  • Developing a Threat Scenario using the Use Case Abuse Model (OT Thought Model)
  • Adding Identified Risks to the Report
  • Summary of Risk Assessment and Threat Modelling
  • Chapter 9 Quiz

  • Introduction to Protection Techniques
  • The Purdue Reference Model and the Automation Pyramid
  • Defense in Depth Model
  • System Hardening of the PLC
  • System Hardening of the HMI and Secure HMI Screen Design
  • System Hardening vs. Threat Scenario in ICS ATT&CK
  • Reducing the Risks of a Flat OT Network with Network Segmentation
  • Best Practices for Secure Remote Access
  • Remote Access via Jump Host
  • Attack Surface Reduction with Secure Coding
  • Adding Mitigation Recommendations to the Report
  • Summary of Protection Techniques
  • Chapter 10 Quiz

  • Introduction to Connecting the IT and OT Worlds
  • Understanding the Workforce of the OT Side
  • Analytical and Narrative Persuasion
  • Evolution of OT Devices
  • Summary of Connecting the IT and OT Worlds
  • Thank You, Closing Thoughts and Free ICS/OT Security Resources
  • Chapter 11 Quiz
Load more modules

Instructor

Marcel Rick-Cen

Marcel Rick-Cen is an OT Security Consultant with years of experience in the field of automation technology. He holds a master's degree in automation engineering and has a strong background in fixing mechanical, electrical, and software problems on the shopfloor. Marcel has worked on the shopfloor in various international locations, gaining firsthand experience in the challenges of keeping OT systems running. Additionally, as an ethical hacker, he spends his nights trying open-source exploits against real industrial hardware in his ICS homelab. Marcel's unique blend of technical expertise and real-world experience makes him an invaluable contributor to the OT security field. In his courses and workshops, he teaches newcomers exciting basics about the possibilities to attack and defend an ICS/OT system and places special emphasis on practicality.

Join over 1 Million professionals from the most renowned Companies in the world!

certificate

Empower Your Learning with Our Flexible Plans

Invest in your future with our flexible subscription plans. Whether you're just starting out or looking to enhance your expertise, there's a plan tailored to meet your needs. Gain access to in-demand skills and courses for your continuous learning needs.

Monthly Plans
Annual Plans
Save 20% with our annual plans!

Pro

Ideal for continuous learning, offering extensive resources with 600+ courses and diverse Learning Paths to enhance your skills.

$ 499.00
Billed annually or $59.00 billed monthly

What is included

  • 700+ Premium Short Courses
  • 50+ Structured Learning Paths
  • Validation of Completion with all courses and learning paths
  • New Courses added every month
Early Access Offer

Pro +

Experience immersive learning with Practice Labs, CTF Challenges, and exclusive EC-Council certifications for comprehensive skill-building.

$ 599.00
Billed annually or $69.00 billed monthly

Everything in Pro and

  • 800+ Practice Lab exercises with guided instructions
  • 150+ CTF Challenges with detailed walkthroughs
  • New Practice Labs and Challenges added every month
  • 3 Official EC-Council Essentials Certifications¹ (retails at $897!)
    Exclusive Bonus with Annual Plans

¹This plan includes Digital Forensics Essentials (DFE), Ethical Hacking Essentials (EHE), and Network Defense Essentials (NDE) certifications. No other EC-Council certifications are included.

Related Courses

1 of 8