Zenler Player
Your course is loading. Hang tight.
Advanced OT Cyber Security (ICS-DCS-SCADA)
Back to curriculum
0% Complete
0% Complete
Introduction to ICS
IT vs OT
Architecture and ICS components
The Purdue Model
Standards and guidelines
IEC 62443 security levels
PLCs and control loops
PLC programming languages
Ladder logic programming introduction
Download and Use Rockwell RSLogix
Writing a ladder program
ICS Protocols Intro
ICS Lab Setup
Network PDUs
Modbus architecture, weaknesses and vulnerabilities
Virtual PLC Emulation Running Modbus
Modbus packet analysis in Wireshark
S7Comm architecture, weaknesses and vulnerabilities
Virtual PLC Emulation Running S7
S7Comm packet analysis in Wireshark
DNP3 and DNP3 SA architecture, weaknesses and vulnerabilities
DNP3 emulation
DNP3 packet analysis in Wireshark
OPC UA architecture, weaknesses and vulnerabilities
OPC UA emulation
OPC UA packet analysis in Wireshark
Profinet architecture, weaknesses and vulnerabilities
Profinet traffic generation and analysis in Wireshark
BACnet architecture, weaknesses and vulnerabilities
BACnet emulation
BACnet packet analysis in Wireshark
Common ICS vulnerabilities
ICS MITRE ATT&CK vs ICS Cyber Kill Chain
IIOT attack surface
Incidents that changes the world
PLCs vulnerabilities and security
OSINT overview
Google dorks in ICS
Shodan OSINT
Zoomeye OSINT
Censys OSINT
Artificial intelligence and OSINT
ICS pentest methodology
What to attack
ICS pentest tools
NMAP in ICS
Scanning for Modbus with Metasploit
Hands on pentest for Modbus with Metasploit
Attacking Modbus with MBTGET
Attacking Modbus with Python Scripts
Hands on pentest for S7comm
SNMP enumeration
Attacking PLC features
Attacking HMI
Attacking historians
Attacking active directory
Fuzzing ICS protocols
Fuzzing Modbus
Fuzzing Profinet
BACnet Enumeration
Attacking OPC UA
Deploy an ICS Honeypot (Conpot)
What is an Airgap?
Issues with Airgap
Does Airgap exist?
Airgap and network topologies
Attacking Airgaps
Airgap channels
Securing the Airgap
Artificial intelligence and ICS threats
ICS risk management and threat modeling
Roadmap to ICS cyber security program
Organizational ICS cyber security measures
Technical ICS cyber security measures
ICS cyber security awareness
Physical security measures
How to build a comprehensive ICS cyber security program
How to monitor ICS systems
OT SIEM use cases
ICS cyber insurance
Course Resources and Scripts
Domain One – Foundations of ICS and OT Cyber Security
Introduction to ICS
Preview
IT vs OT
Architecture and ICS components
The Purdue Model
Standards and guidelines
IEC 62443 security levels
Domain Two - PLCs and Ladder Logic Programming
PLCs and control loops
PLC programming languages
Ladder logic programming introduction
Download and Use Rockwell RSLogix
Writing a ladder program
Domain Three - Dissecting Industrial Protocols
ICS Protocols Intro
ICS Lab Setup
Network PDUs
Modbus architecture, weaknesses and vulnerabilities
Virtual PLC Emulation Running Modbus
Modbus packet analysis in Wireshark
S7Comm architecture, weaknesses and vulnerabilities
Virtual PLC Emulation Running S7
Preview
S7Comm packet analysis in Wireshark
DNP3 and DNP3 SA architecture, weaknesses and vulnerabilities
DNP3 emulation
DNP3 packet analysis in Wireshark
OPC UA architecture, weaknesses and vulnerabilities
OPC UA emulation
OPC UA packet analysis in Wireshark
Profinet architecture, weaknesses and vulnerabilities
Profinet traffic generation and analysis in Wireshark
BACnet architecture, weaknesses and vulnerabilities
BACnet emulation
BACnet packet analysis in Wireshark
Domain Four - Pentesting ICS Vulnerabilities
Common ICS vulnerabilities
ICS MITRE ATT&CK vs ICS Cyber Kill Chain
IIOT attack surface
Incidents that changes the world
PLCs vulnerabilities and security
OSINT overview
Google dorks in ICS
Shodan OSINT
Zoomeye OSINT
Censys OSINT
Artificial intelligence and OSINT
ICS pentest methodology
What to attack
ICS pentest tools
NMAP in ICS
Scanning for Modbus with Metasploit
Hands on pentest for Modbus with Metasploit
Preview
Attacking Modbus with MBTGET
Attacking Modbus with Python Scripts
Hands on pentest for S7comm
Preview
SNMP enumeration
Attacking PLC features
Attacking HMI
Attacking historians
Attacking active directory
Fuzzing ICS protocols
Fuzzing Modbus
Fuzzing Profinet
BACnet Enumeration
Attacking OPC UA
Deploy an ICS Honeypot (Conpot)
Preview
What is an Airgap?
Issues with Airgap
Does Airgap exist?
Airgap and network topologies
Attacking Airgaps
Airgap channels
Securing the Airgap
Artificial intelligence and ICS threats
Domain Five - Securing and Monitoring ICS
ICS risk management and threat modeling
Roadmap to ICS cyber security program
Preview
Organizational ICS cyber security measures
Technical ICS cyber security measures
ICS cyber security awareness
Physical security measures
How to build a comprehensive ICS cyber security program
How to monitor ICS systems
OT SIEM use cases
ICS cyber insurance
Domain Six - Course Resources and Scripts
Course Resources and Scripts
×
This is an unpublished lesson. This lesson will not be shown for students unless you set it as Public.
Back to Dashboard
No contents are available in this lesson!
No lessons available !
Back to Dashboard
Lesson contents locked
Enroll to unlock this lesson.
Enroll to unlock
Next Lesson