Gain practical, hands-on experience in securing OT environments through simulated exercises and real-world scenarios. Learn from an expert with extensive experience, providing valuable insights and guidance throughout the course. Elevate your defensive OT skills to the next level.
Join now and step into the exciting world of OT security! In this comprehensive course, you will embark on a mission to assess and protect the infrastructure of Joy Cookie Factory as it prepares to transition its entire shop floor online. Unlike previous courses, we prioritize understanding the environment in which OT devices operate, recognizing threats, and implementing effective onboard protection techniques to fortify these devices against cyber threats.
In this course, you’ll dive into the essentials of OT security, focusing on practical skills and actionable strategies. Whether you’re a newcomer to the field or a seasoned professional, this course will empower you to safeguard OT environments effectively.
Gain a comprehensive understanding of the ecosystem in which OT devices operate, enabling you to identify potential vulnerabilities and threats. Learn how to create a thorough OT asset inventory and assess devices for common vulnerabilities, laying the groundwork for robust security measures. Acquire essential skills and techniques to fortify your OT environment against attacks, utilizing onboard resources and a firewall without relying on expensive detection and response tools.
While participation in the predecessor course, Practical Industrial Control System Penetration Testing, is optional, it is highly recommended. Both courses together provide a holistic understanding of OT device vulnerabilities and their operating environments, setting you up for success in securing OT systems effectively.
Get Instant Notification of New Courses on our
Telegram channel.
Noteβ Make sure your ππππ¦π² cart has only this course you're going to enroll it now, Remove all other courses from the ππππ¦π² cart before Enrolling!
The core exercise of this course revolves around a simulated OT network of a cookie factory, offering hands-on experience in creating an OT asset inventory and assessing devices for vulnerabilities. Through practical exercises and real-world scenarios, you’ll develop the skills needed to defend OT environments effectively.
Enroll today and take the first step towards mastering the art of defending industrial control systems. Equip yourself with the knowledge and skills needed to safeguard critical infrastructure and protect against evolving cyber threats. Don’t miss out on this opportunity to advance your career and make a tangible impact in the world of OT security. Join us now and embark on a journey towards a more secure future!
Curious about penetration testing of ICS/OT devices? Join my course Practical Industrial Control System Penetration Testing.
Please note that the software used is not mine. I can only offer limited assistance in case of problems. Please contact the publisher of the software for help. The installation instructions were created to the best of my knowledge, but the responsibility for the installation lies with the participants.
Welcome to the Course!
Introduction
Contrasting IT and OT
Pentest Classifications of ICS/OT Systems
ICS/OT Devices are Easy Targets
Reviewing the Industrial Attack Landscape
OT OSINT Techniques you can try for yourself
Summary
Test your Knowledge!
Setting Up Your ICS/OT Lab
Introduction to Setting Up Your ICS/OT Lab
Understanding Virtualization and Virtual Machines
Installation of VirtualBox
Installing the Kali Linux VM and downloading additional nmap scripts
Installing the Ubuntu Desktop VM
Running the install script to get the course materials
Setting up the HostOnly network
Summary of Setting Up Your ICS/OT Lab
Practical Refresher
Introduction to Practical Refresher
Setup the VM, Start the S7-300 Emulation and Excercise Tasks
Recap Netdiscover, Nmap, Nmap NSE (Spoiler Free)
Step by Step Excercise Solution: S7-300 Recon, Enum and Assessment
Report Writing with ChatGPT
Summary of Practical Refresher
Test your Practical Refresher Knowledge!
Preparing the Assessment
Introduction to Preparing the Assessment
Setting the Stage: Crumbs of Joy Cookie Factory and getting to know their OT
The Penetration Testing Agreement
Your Asset Inventory Template
Migrating the Client’s Data into our Asset Inventory
Create a Network Topology from Scratch with draw.io
Summary of Preparing the Assessment
Test your Preparing the Assessment Knowledge!
OT Network Assessment
Introduction to OT Network Assessment
Performing a Layer 2 Asset Discovery – Task
Performing a Layer 2 Asset Discovery – Solution
Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan – Task
Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan – Solution
Scanning the OT Network for Open Ports with Nmap – Task
Scanning the OT Network for Open Ports with Nmap – Solution
Summary of OT Network Assessment
Test your OT Network Assessment Knowledge!
PLC Assessment
Introduction to PLC Assessment
Setting up the PLC Emulation and Task
Scanning for Open Ports and Probing the Industrial Protocol with Nmap – Solution
Assessing the PLC’s Exposed Webserver – Solution
Summary of PLC Assessment
Test your PLC Assessment Knowledge!
Human-Machine-Interface Assessment
Introduction to Human-Machine-Interface Assessment
Setting up the HMI Emulation and Task
Scanning for Open Ports with Nmap – Solution
Assessing the HMI’s Remote Access Services – Solution
Summary of Human-Machine-Interface Assessment and Bonus
Test your Human-Machine-Interface Assessment Knowledge!
Summarizing the Findings and Reporting
Introduction to Summarizing the Findings and Reporting
Update the Network Topology – Task
Update the Network Topology – Solution
Discovering Undocumented Network Hosts
Critical Findings: OT Network Architecture, Remote Access, PLC, HMI
Summarizing Key-Findings in an Dashboard
Reporting the Findings with ChatGPT
Summary of Summarizing the Findings and Reporting
Test your Summarizing the Findings and Reporting Knowledge!
Risk Assessment and Threat Modelling
Introduction to Risk Assessment and Threat Modelling
Risks of a Flat OT Network Architecture
Risks of VPN Remote Access Router
Security Maturity Levels as in IEC/ISA 62443
Introduction to the ICS ATT&CK Framework
Understanding common used techniques by creating a heatmap in ATT&CK
Developing a Threat Scenario on the PLC and HMI using ATT&CK – Task
Developing a Threat Scenario on the PLC and HMI using ATT&CK – Solution
Mitigating Threats using the ATT&CK Mitigation Recommendations
Developing a Threat Scenario using HAZOP and Dynamical Systems Theory
Developing a Threat Scenario using the Use Case Abuse Model (OT Thought Model)
Adding Identified Risks to the Report
Summary of Risk Assessment and Threat Modelling
Test your Risk Assessment and Threat Modelling Knowledge!
Protection Techniques
Introduction to Protection Techniques
The Purdue Reference Model and the Automation Pyramid
Defense in Depth Model
System Hardening of the PLC
System Hardening of the HMI and Secure HMI Screen Design
System Hardening vs Threat Scenario in ICS ATT&CK
Reducing the Risks of a Flat OT Network with Network Segmentation
Best Practises for Secure Remote Access
Remote Access via Jump Host
Attack Surface Reduction with Secure Coding
Adding Mitigation Recommendations to the Report
Summary of Protection Techniques
Test your Protection Techniques Knowledge!
Connecting the IT and OT Worlds
Introduction to Connecting the IT and OT Worlds
Understanding the Workforce of the OT Side
Analytical and Narrative Persuation
Evolution of OT Devices
Summary of Connecting the IT and OT Worlds
Test your Connecting the IT and OT Worlds Knowledge!
Thank You, Closing Thoughts and Free ICS/OT Security Ressources