Class Details

 

Course Outline

MOdule 1: INDUSTRIAL CONTROL SYSTEMS

·         An overview of an Industrial control system

·         The Industrial control system architecture

·         The Purdue model for Industrial control systems

·         Industrial control system communication media and protocols

 

Module 2: INSECURE BY INHERITANCE

·         Industrial control system history

·         Modbus and Modbus TCP/IP

·         PROFINET

·         Common IT protocols found in the ICS

 

module 3: ANATOMY OF AN ICS ATTACK SCENARIO

·         Setting the stage

·         The Slumbertown paper mill

·         Trouble in paradise

·         What can the attacker do with their access?

·         The cyber kill chain

·         Phase two of the Slumbertown Mill ICS attack

·         Other attack scenarios

 

module 4: INDUSTRIAL CONTROL SYSTEM RISK ASSESSMENT

·         Attacks, objectives, and consequences

·         Risk assessments

·         A risk assessment example

 

module 5: THE PURDUE MODEL AND A CONVERGED PLANTWIDE ETHERNET

·         The Purdue Enterprise Reference Architecture

 

module 6: THE DEFENSE-IN-DEPTH MODEL

·         ICS security restrictions

·         How to go about defending an ICS?

·         The ICS is extremely defendable

·         The defense-in-depth model

 

module 7: PHYSICAL ICS SECURITY

·         The ICS security bubble analogy

·         Segregation exercise

·         Down to it – Physical security

 

module 8: ICS NETWORK SECURITY

·         Designing network architectures for security

 

module 9: ICS COMPUTER SECURITY

·         Endpoint hardening

·         Configuration and change management

·         Patch management

·         Endpoint protection software

 

module 10: ICS APPLICATION SECURITY

·         Application security

·         Application security testing

·         ICS application patching

·         ICS secure SDLC

 

module 11: ICS DEVICE SECURITY

·         ICS device hardening

·         ICS device patching

·         The ICS device life cycle

 

module 12: THE ICS CYBERSECURITY PROGRAM DEVELOPMENT PROCESS

·         The NIST Guide to Industrial control systems security

  The ICS security program development process