Industrial Control Systems (ICS) and SCADA Cybersecurity
top of page

Course Description

Delve into the world of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) with our interactive ICS Cyber Security Course. This comprehensive ICS Security Training program is meticulously designed to provide a deep understanding of the nuances of ICS and SCADA systems and how they differ from traditional IT environments.


Our SCADA Security Training Courses explore high-profile case studies of notable ICS/SCADA malware and attacks. This immersive approach will offer you invaluable insights into the strategies of potential adversaries, enabling you to better anticipate and counter possible threats to your infrastructure.


Experience the intricate techniques of remotely hijacking control of these systems and understand how malware can be embedded in them. Our ICS SCADA Security Training will empower you with practical knowledge to protect your systems and your organization from looming cyber threats.


Whether you're an information security professional seeking to upgrade your skills or a member of the military tasked with protecting vital national assets, our SCADA Cyber Security Training is an invaluable resource. The Industrial Control Systems Security Training will equip you with the necessary skills to fortify your cyber defense strategies with specialized knowledge and advanced tactics.


Don't miss the opportunity to be at the forefront of ICS and SCADA Cyber Security Training. Secure your infrastructure, your organization, and the nation's critical systems by mastering the art of ICS and SCADA security.


Who Should Take This ICS and SCADA Security Training?

Our course is designed for a variety of professionals committed to enhancing the security of critical infrastructure:

  1. Cybersecurity Professionals: If you're a cybersecurity analyst, engineer, or consultant, this ICS Security Course will equip you with advanced skills to defend your organization's critical systems from cyber threats. Understand the unique challenges posed by ICS and SCADA systems and learn to develop strategies to counter them effectively.

  2. IT Professionals: IT managers, administrators, and professionals responsible for safeguarding critical infrastructure will greatly benefit from our SCADA Security Training Courses. Deepen your knowledge of ICS and SCADA systems and learn practical techniques to bolster their cybersecurity.

  3. Military Personnel: For those in the military, particularly those tasked with protecting national defense infrastructure, our ICS SCADA Security Training offers specialized knowledge in a critical aspect of cybersecurity.

  4. Industrial Engineers and Operators: Professionals operating in industries like manufacturing, power generation, oil and gas, water treatment, and transportation will gain valuable insights into the security aspects of ICS and SCADA systems through our Industrial Control Systems Security Training.

  5. Policy Makers and Regulators: Our ICS Cyber Security Course provides a comprehensive understanding of ICS/SCADA security challenges and complexities, equipping you to create more effective policies and regulations related to the cybersecurity of critical infrastructure.

  6. Risk Management Professionals: Enhance your risk assessment strategies with a comprehensive understanding of the unique risk landscape of ICS/SCADA systems through our SCADA Cyber Security Training.

By the end of our ICS and SCADA Security Training, all participants will have gained an extensive understanding of these systems, their associated cybersecurity threats, and effective countermeasures. 

Example Course Schedule:

Day 1: Introduction to ICS and SCADA On the first day, we delve into the fundamental principles of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems. We'll highlight their unique characteristics and how they contrast with traditional IT environments.

Day 2: In-depth Analysis of ICS/SCADA Architecture and Security On our second day, we dive deep into the architectural framework of ICS/SCADA systems, focusing on components, functions, and inherent security aspects. We'll address common vulnerabilities and the potential repercussions of security breaches.

Day 3: Case Studies of Notable ICS/SCADA Attacks Day three is dedicated to dissecting high-profile ICS/SCADA attacks and malware incidents. We’ll scrutinize attacker techniques, motives, and the impact of these attacks, enhancing your understanding of the threat landscape.

Day 4: Exploitation and Malware Embedment in ICS/SCADA Systems On the fourth day, we transition into a hands-on session where students witness the development process for remotely hijacking control of these systems and learn how to embed malware in them. This practical experience offers an inside look at the mechanics of these attack vectors.

Day 5: Threat Landscape, Risk Management, and Mitigation Strategies On the final day, we discuss the current threat landscape for ICS/SCADA systems, assess the risks posed by these threats, and explore mitigation strategies. Building on the previous day's practical exercise, we'll focus on how to defend systems against the kind of attacks we simulated, concluding the course by reinforcing the importance of proactive cybersecurity measures.

Prerequisites:

  • Basic knowledge of computer systems and networks, including TCP/IP protocols, operating systems, and programming languages such as Python.

  • Cyber security fundamentals, including encryption, authentication, and access control.

  • Network architecture and protocols, including TCP/IP, DNS, and routing.

  • Operating systems and applications, including Windows, Linux, and mobile devices.

Whether you're just stepping into the world of cybersecurity or you're a seasoned professional looking to expand your knowledge, our ICS Security Course is your gateway to mastering the intricacies of ICS and SCADA systems. Our SCADA Security Course will take you step-by-step through the unique aspects of SCADA systems, deepening your understanding of their vulnerabilities and the techniques used to exploit them. Join us as we equip you with the knowledge and skills you need to defend our most critical infrastructure against increasingly sophisticated cyber threats.

About Boston Cybernetics Institute

Boston Cybernetics Institute, PBC was created by former MIT Lincoln Lab cybersecurity researchers to give meaningful niche cyber instruction to a new generation of cybersecurity professionals.

 

We avoid the normal style of teaching with PowerPoint and lectures, opting to provide instead real-life engaging instruction that takes place in a customized environment. We have given our style of instruction to multiple DoD agencies, US commercial companies, and international companies.

BCI_LOGO_FINAL_Seal_Black-MOD2.png

Instructors at Boston Cybernetics Institute

Jeremy Blackthorne.png

Jeremy Blackthorne

President of the Boston Cybernetics Institute

Jeremy Blackthorne is a Lead Instructor at the Boston Cybernetics Institute (BCI). Before BCI, he was a researcher in the Cyber System Assessments group at MIT Lincoln Laboratory. Blackthorne is the co-creator and instructor for the Rensselaer Polytechnic Institute (RPI) courses: Modern Binary Exploitation, Spring 2015 and Malware Analysis, Spring 2013. ​Jeremy has published research at various academic and industry conferences. He served in the U.S. Marine Corps and is an alumnus of RPISEC. He holds a BS and MS in computer science. ​ Blackthorne was an active member of the Student Security Club and CTF team, RPISEC, from 2012 to 2015, where he taught seminars on Reverse-Engineering, Exploitation, and various other Cybersecurity topics.

Clark-Wood.jpg

Clark Wood

security researcher and instructor

Clark Wood is a security researcher and instructor at the Boston Cybernetics Institute (BCI), focusing on Reverse Engineering, Exploitation, and CI/CD. He recently built a Reverse-Engineering and Exploitation platform for a DoD customer and is the Lead Engineer for BCI’s Government Services. Clark was formerly on the technical staff at MIT Lincoln Laboratory where he was a member of the Cyber System Assessments Group. ​Clark holds a BA in Economics from the University of Florida, a BS and MS in Computer Science from Florida State University, and a Master’s in Technology and Policy from MIT. ​

Rodolfo.png

Rodolfo Cuevas

security researcher and instructor

Rodolfo Cuevas is a security researcher and instructor at BCI, where he focuses on understanding how design constraints can be used to limit the impact of an attacker on a system. His research combines the adversarial mindset with approaches influenced by Systems and Control Theory. ​ Rodolfo was a staff member at MIT Lincoln Laboratory and began his career as a RADAR and Ballistic Missile Defense System (BMDS) analyst. Later, Rodolfo transitioned to evaluating and Red-Teaming tactical and commercial cyber systems in support of DoD and other government programs. ​ Rodolfo holds a BS, M.Eng., and M.S. in Electrical and Computer Engineering from Cornell University.

Reed-Porada.jpg

Reed Porada

security researcher and instructor

Reed Porada is a security researcher and instructor at BCI, focused on getting to the "so what" of both defensive and offensive cyber measures. Reed also leads BCI training in Cyber Systems Analysis, focusing on developing systems-thinking skills of developers up to managers. ​Reed was a staff member at MIT Lincoln Laboratory for ten years, where he was responsible for Test and Evaluation, Test Automation Research, Red-Teaming of Cyber Systems, and Blue System Architectures. Reed was a computer scientist at the Naval Research Laboratory focused on wireless communication systems. He holds a BS in Computer Science from the University of Maryland, College Park and an MS in Software Engineering from Carnegie Mellon University.

Industrial Control Systems (ICS) and SCADA Cybersecurity

Master the Art of Protecting and Exploiting Critical Infrastructure.

Cyber-security-course.png

COURSE PRICE

Upon request

COURSE LENGTH:

Varies

What happens after I click the button?

Your default e-mail client will pop up and you'll be asked to write us a short message. Please let us know which course you are interested in and what dates would work for you.

Anchor 1
bottom of page