Students will learn about basic ICS protocols and SCADA systems. Students will then be introduced to the threats and risks that are associated with ICS systems. This course will also teach students how ICS technology differs from the traditional enterprise networking environment. Basic ICS and critical infrastructure terminology will be covered in this course. Students will also learn which part of the CIA Triad is emphasized with critical infrastructure systems and receive an introduction to major components of an ICS network. The course will briefly touch on the OWASP Top 10 and how it relates to ICS systems. Students will learn about the Modbus protocol structure and work through different case studies of real life attacks.
Basic understanding of TCP/IP
Basic understanding of remote management protocols
Basic understanding of network protocols
Curiosity with ICS SCADA Systems
By the end of this course, students should be able to:
Discover commonly used ICS SCADA Protocols used in production
Understand why availability is paramount in ICS technology
* Understand the general differences between IT and ICS technology
This course is part of a Career Path:
No items found.
Chris Kubecka is the founder and CEO of HypaSec offering nation-state incident management, ethical hacking training in IT, IOT, ICS SCADA and expert advisory services to governments. Prior to HypaSec, she headed the Information Protection Group and international intelligence for the Aramco family. Re-establishing international business operations, helping to stabilize the oil market and implementing digital security after the company suffered from the world’s most devastating Shamoon cyberwarfare attacks which wiped out 85% of computer systems and over 35,000 Windows systems which deeply affected the countries of Saudi Arabia, Qatar and Bahrain. At Unisys, she helped halt the July 2009 second wave cyberwarfare attacks against South Korea during her time advising the company’s flagship customers Danone and Lloyds TSB. A USAF veteran, serving her country both as a military aviator and handling command and control systems for Space Command. Beginning her computer career at the age of five coding but was restricted from using computer systems from the age of ten until eighteen after hacking into the DOJ. Chris combines highly technical skills, ethical hacking, OSINT, strategy, leadership and governance expertise. Presenting at Europol, Interpol, national police, EU/NATO cyberwarfare exercises, DefCon, Black Hat, United Nations, Oxford, Cambridge, OWASP and BSides globally. Author of several technical, engineering and management courses and books Down the Rabbit Hole An OSINT Journey, Hack the World with OSINT and her upcoming book Hack the Galaxy with OSINT.
Certificate of Completion
Complete this entire course to earn a ICS/SCADA Fundamentals Certificate of Completion