What to expect
The OT course is a combination of lectures and hands-on exercises with industrial control systems emphasizing
cybersecurity risks. This is a three-day course that runs from 8:30a-5:00p. Each topic in the course will include
lectures, puzzles, labs, and lab review.
Audience
- Security operation center staff
- Incident responders
- Reverse engineers
- Software engineers
- IT Staff responsible for operational technology or coordinating with OT/operations staff
- Cybersecurity staff with some responsibility for OT systems
- Operations staff who are responsible for OT/ICS/process systems
- Managers responsible for coordinating incident response, training, or who have an interest in how OT cybersecurity could fit into your organizational construct
- Anyone interested in learning about OT
Applicability
If you are unfamiliar with operational technology, this course will provide you with a baseline knowledge of
cybersecurity topics related to OT. If you are familiar with OT, this course will provide you with hands-on
exercises that allow you to interact with key ICS devices in a way that will bolster your knowledge around
related cybersecurity topics.
Objectives
- Understand how Industrial Control Systems (ICS) and Operational Technology (OT) are implemented in various operational industries.
- Understand OT network topology along with piping and instrument diagrams.
- Understand the consequences of an OT cyberattack.
- Understand how field controllers (RTU, IED, PAC, PLC) are different than a typical PC.
- Perform OT-focused open-source reconnaissance techniques.
- Understand how attackers take unauthorized control of a poorly protected HMI.
- Understand how to extract, open, and analyze a piece of firmware.
- Search PCAPs to find a malicious executable.
- Locate potentially compromised hosts.
- Determine origination of command and control traffic.
- Recognize log file manipulations.
Typical Agenda
Day 0 | |
180m |
|
180m |
|
Day 1 | |
90m |
|
90m |
|
90m |
|
90m |
|
Day 2 | |
360m |
|
Setup
For this course, a laptop is required. Participants will need to have administrative access on that laptop
in order to run a virtual machine provided by the course instructors. The VM will require that the laptop be
capable of running an Intel or AMD 64 bit virtual machine image.