ICS410: ICS/SCADA Security Essentials
ICS410: ICS/SCADA Security Essentials Training (GICSP)
ICS410: ICS/SCADA Security Essentials provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.
Training at a glance
Level
Intermediate
Duration
6 Days
Experience
2 years: IT & Security
Average Salary
$104,616
Labs
Yes
Level
Intermediate
Duration
6 Days
Experience
2 years: IT & Security
Average Salary
$104,616
Labs
Yes
Training Details
The course will provide you with:
- An understanding of industrial control system components, purposes, deployments, significant drivers, and constraints.
- Hands-on lab learning experiences to control system attack surfaces, methods, and tools
- Control system approaches to system and network defense architectures and techniques
- Incident-response skills in a control system environment
- Governance models and resources for industrial cybersecurity professionals.
You Will Be Able To
- Better understand various industrial control systems and their purpose, application, function, and dependencies on network IP and industrial communications
- Work with control network infrastructure design (network architecture concepts, including topology, protocols, and components) and their relation to IEC 62443 and the Purdue Model.
- Run Windows command line tools to analyze the system looking for high-risk items
- Run Linux command line tools (ps, ls, netstat, ect) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
- Work with operating systems (system administration concepts for Unix/Linux and/or Windows operating systems)
- Better understand the systems' security lifecycle
- Better understand information assurance principles and tenets (confidentiality, integrity, availability, authentication, non-repudiation)
- Use your skills in computer network defense (detecting host and network-based intrusions via intrusion detection technologies)
- Implement incident response and handling methodologies
- Map different ICS technologies, attacks, and defenses to various cybersecurity standards including NIST Cyber Security Framework, ISA/IEC 62443, ISO/IEC 27001, NIST SP 800-53, Center for Internet Security Critical Security Controls, and COBIT 5
Lesson 1: ICS Overview
Lesson 2: Architectures and Processes
Lesson 3: Communications and Protocols
Lesson 4: Supervisory Systems
Lesson 5: ICS Security Governance
Lesson 6: Capstone CTF
Hands-On Training
- Programming a PLC
- Programming an HMI
- Architecting a Secure DCS
- Finding Passwords in Embedded Devices
- Exploring Fieldbus Protocols
- Network Capture Analysis
- Enumerating Modbus TCP
- Network Forensics of an Attack
- Bypassing Auth with SQL Injection
- Password Fuzzing
- Baselining with PowerShell
- Configuring Host-Based Firewalls
- Windows Event Logs
- Finding Remote Access
- Incident Response Tabletop Exercise
The course is designed for the range of individuals who work in, interact with, or can affect industrial control system environments, including asset owners, vendors, integrators, and other third parties. These personnel primarily come from four domains:
- IT (includes operational technology support)
- IT security (includes operational technology security)
- Engineering
- Corporate, industry, and professional standards
NICE Framework Work Roles
- Process Control Engineer / Instrument & Control Engineer (ZZ-ICS-001)
- ICS/SCADA Security Engineer (ZZ-ICS-002)
- ICS/OT Systems Engineer (ZZ-ICS-003)
- OT SOC Operator (ZZ-ICS-004)
Course participants need to have a basic understanding of networking and system administration, TCP/IP, networking design/architecture, vulnerability assessment, and risk methodologies. ICS410 covers many of the core areas of security and assumes a basic understanding of technology, networks, and security. For those who are brand new to the field and have no background knowledge, SEC301: Intro to Information Security would be the recommended starting point. While SEC301 is not a prerequisite, it provides introductory knowledge that will help maximize a student's experience with ICS410.
Depending on your current role or future plans, one of these courses is a great next step in your cybersecurity journey:
ISC Security Professionals:
- ICS515: ICS Visibility, Detection, and Response
- ICS612: ICS Cyber Security In-Depth
ISC Security Managers:
- ICS418: ICS Security Essentials for Managers
NERC Protection:
- ICS456: Essentials for NERC Critical Infrastructure Protection
Upcoming Classes
We Offer More Than Just SANS Training
Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.
Strategic Planning & Project Management
From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
IT & Cybersecurity
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Leadership & Management
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.