ICS/OT Cyber Security Engineer Course
ICS/OT Cyber Security Engineer course focuses on safeguarding Industrial Control Systems (ICS) and Operational Technology (OT) environments from cyber threats. Participants learn to identify vulnerabilities, implement security measures, and manage risk in critical infrastructure. The course covers topics such as network segmentation, threat detection, incident response, and regulatory compliance specific to ICS/OT settings. Practical exercises and real-world scenarios prepare professionals to protect and secure industrial systems against emerging cyber risks.
ICS/OT Cyber Security Engineer Course Highlights
-
01
Lifetime access
-
02
Real-time case studies
-
03
24*7 Support from our team of administrators
-
04
Lifetime video access
-
05
The project integrated into the Curriculum
-
06
Access to Recorded Sessions
-
07
Interview Prep
-
08
Lab Access – Virtual Labs
Training Calender
Start Date | End Date | Start-End Time | Batch Type | Training Mode | Batch Status | Start Learning |
---|---|---|---|---|---|---|
27th Sep 2024 | 25th Nov 2024 | 09:00 - 13:00 IST | Weekend | Online | (Open) | Enroll Now |
Course Syllabus
Overview
ICS-OT Cybersecurity Training builds better understanding of the terminologies, purpose,
security goals, and technologies deployed in OT environments and security programs. Upon completing
this course, users will be able to:
• Analyze core ICS technologies and security concepts
• Understand how to safely assess ICS networks
• Explore different types of ICS operations
• Evaluate design decisions and priorities for OT system components
Module - 1 (Introduction to ICS Networks)
Introduction to ICS Networks
• Introduction to Industrial Control Systems (ICS, DCS, SCADA, etc.)
• Sensors and actuators
• Industrial devices
• Industrial programming languages
• Protocols and communications
• Supervisory and Operations systems
Module - 2 (Assessing the ICS Environment)
Assessing the ICS Environment
• Overview types of security assessments in the context of ICS (both active and passive)
• Recommendations on safely assessing ICS
• Learn about the tools and techniques for collecting and analyzing assessment data
• Assessments
• Architecture Review
• Vulnerability Assessment
• Penetration Testing
• Red Team Assessment Project Planning
• Vulnerability Research
• Open Source Intelligence
Labs
Day 1
Lab 1 Getting Online with the PLC
Lab 2 Modbus Traffic
Lab 3 ICS Communication Protocols
ICS/OT CYBERSECURITY TRAINING
Day 2
Lab 1 Port Scanning (nmap)
Lab 2 Vulnerability Scanning (OpenVAS)
Lab 3 Exploitation with Tools
Lab 4 Research and Exploit Development
Lab 5 OSINT (Google Hacking/Device Manuals/Shodan)
Our Reviews
What Says Our Happy Clients
START LEARNING
Still Unsure ? Contact us & we will get back to you.
Let’s Connect
Email Information
Trainings: trainings@cyberhuntit.com
Business : sales@cyberhuntit.com
Recruitment information / General – hr@cyberhuntit.com
Address
Meridian Plaza, office No-301A, 3rd floor, Ameerpet Rd, Greenlands, Begumpet, Hyderabad, Telangana 500016