For the Live Online course, it can run either as a 4-day course 9am-5pm or as 8 half-days 1pm-5 pm over a two week period.
This is not your traditional SCADA/ICS/IIoT security course!
How many courses send you home with a $500 kit including your own PLC and a set of hardware/RF hacking tools?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications.
Skills you will learn in this course will applydirectly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, synchrophasors, and even IoT.
Justin Searle specializing in ICS security architecture design and penetration testing. He led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and has played key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).
Justin has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security
conferences. He is currently a Senior Instructor for the SANS Institute and a faculty member at IANS. In addition to electric power industry conferences, Justin leads prominent open source projects including the Control Thing Platform, Samurai Web Testing Framework (SamuraiWTF), Samurai Security Testing Framework for Utilities (SamuraiSTFU). He has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), Web Application Penetration
The following items (or rough equivalents depending on availability) are provided to each student to use in class and to keep after course completion:
- Programmable Logic Controller (PLC)
- Software to program the PLC to keep (non-expiring)
- Software to program an HMI for the PLC (non-expiring)
- RTL-SDR (Software Defined Radio)
- Great Scott Gadgets Yardstick sub-GHz Radio
- Great Scott Gadgets GreatFET
- Breadboard with SPI and I2C EEPROMs
- TivaC Launchpad (ARM m4) for Firmware exercises
- Latest version of the ControlThings Platform on USB
It is assumed that attendees will have no knowledge of ICS, Smart Grid, SCADA, or critical infrastructure. This course is designed for intermediate level security professionals, be they engineers, technicians, analysts, managers, or penetration testers.
- Attendees will be able to explain the steps and methodology used in performing penetration tests on Industrial Control Systems and Industrial Internet of Things.
- Attendees will be able to use the free and open source tools in ControlThings Platform to discover and identify vulnerabilities in web applications.
- Attendees will be able to exploit several hardware, network, serial, user interface, RF, and server-side vulnerabilities.
Cyber Security Learning Paths
Want to boost your career in Cyber Security? Click on the roles below to see QA‘s learning pathways, specially designed to give you the skills to succeed.