Intermediate

ICS Security Foundation

40 hrs of ICS Security Learnings

Our 5-day ICS Cybersecurity Course is tailored for professionals aiming to master the intricacies of industrial control systems (ICS) cybersecurity. This comprehensive program offers in-depth knowledge of ICS architecture, threat landscapes, and advanced security practices, reinforced through hands-on virtual labs.

5 Days
Duration
40 Hours
Training
Virtual
Delivery
October 18-19, Nov 1-2,8, 2025
Next Batch

Course Bonuses

Get all the learning for appearing for GICSP Certification Exam
2 GICSP level Practice Exams
59,999

For payments outside India, click on the USD enrollment option

What's Included:

Hands-on Virtual Labs
GICSP Certification Preparation
Real-world Case Studies
Expert Instructors
Online Community Access
Post-course Support
Next Batch Starts
October 18-19, Nov 1-2,8, 2025

Course Curriculum

Topics Covered

  • Introduction to Industrial Control Systems (ICS)
  • ICS Architecture (Purdue Model Levels 0-3)
  • Cyber-Physical Considerations
  • Controllers, field devices, HMIs, historians

Practical Exercises

  • Simulated PLC Programming using online simulators
  • ICS Component Mapping virtual exercise
  • ICS Terminology Quiz

Topics Covered

  • Threats and Vulnerabilities in ICS
  • Real-world case studies of ICS security incidents
  • Designing Secure ICS Architectures
  • Securing remote access and defensible architectures

Practical Exercises

  • Identifying Attack Surfaces using case studies
  • Architecting Secure Sites collaborative design
  • Modbus Protocol Analysis in virtual lab

Topics Covered

  • ICS Communication Protocols (Modbus, DNP3)
  • Ethernet and TCP/IP in ICS environments
  • Network traffic analysis and security
  • Firewalls, NIDS/NIPS, and data diodes

Practical Exercises

  • Network Capture Analysis with cloud-hosted Wireshark
  • Enumerating ICS Protocols
  • Virtual Firewall Configuration
  • Encryption Exercise

Topics Covered

  • SCADA, HMIs, and historian systems
  • Vulnerabilities and attack vectors
  • Workstation and Server Security
  • Incident Response in ICS

Practical Exercises

  • Simulated Attacks on HMIs
  • Securing Windows Systems
  • SCADA System Hardening

Topics Covered

  • Governance and Compliance frameworks
  • Linux Systems in ICS environments
  • Building a Robust ICS Security Program
  • Risk management and disaster recovery

Practical Exercises

  • Hardening Linux Systems
  • Log Management virtual machines
  • Policy Development Workshop
  • Disaster Recovery Plan Exercise

Prerequisites

Equipment

  • Laptop with at least 8 GB of RAM

Software

  • VirtualBox must be installed before the course begins

Other Requirements

  • Stable Internet connection

Additional Resources

Study Materials

  • Access to digital reading lists and study guides
  • Case studies and industry reports accessible online

Practice Scenarios

  • Real-world scenarios and challenges through virtual labs

Post-Course Support

  • Online community access for peer support
  • Follow-up virtual sessions and resources

Ready to Advance Your Career?

Join thousands of professionals who have enhanced their OT cybersecurity skills with our training.

OT Security Huddle