- 27-28 Feb 2019 from 09:00 till 17:00
Industrial Control Systems (including DCS, HMI, PLC, SCADA, SIS) are often poorly understood, yet they are used in the most critical environments in the world. Although they generally remain unseen they are responsible for the smooth running of our daily routines from the moment we turn on a tap in the morning, to turning off the lights at night.
This two-day course will take a deep-dive into advanced ICS security techniques and provide participants with the knowledge that they need to safely evaluate and protect these systems against emerging cyber threats.
The course will also provide methodologies through which security research may be performed against ICS devices in order to identify zero-day vulnerabilities; taking a deep dive into industrial protocols used within low-level ICS assets such as OPC, IEC 60870-5-104 and Modbus in addition to discussing DNP3, Ethernet/IP, Profinet, MMS, WirelessHART, ISA100.11a. During the course, participants will have the opportunity to engage in real-life attacks against key ICS/SCADA components and other Industrial Control Systems, by performing activities such as firmware reverse engineering of ICS assets, and ICS protocol fuzzing.
Day 1 - ICS Fundamentals & Attack Introduction
1.Industrial Control Systems Overview
2.Securing Industrial Control Systems
3.Open Source Intelligence (OSINT)
4.Attacking ICS Devices
5.Hacking Windows Based Control Systems
Day 2 - Attacking ICS – real-life hacking
7.Hacking SCADA Applications
8.OPC Configuration Vulnerabilities and Hardening
9.Fuzzing Industrial Protocols
10.Firmware Analysis & Reverse Engineering
Secure your seat for the next session by filling out out the form below!