Certified SCADA Cyberspace Operations Engineer
Course number: CGISCADA40
Learn how to execute cyber missions in which a SCADA environment is part of the greater cyberspace operational environment.
This course provides you with a thorough understanding of Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) devices and their inner workings. You will learn how to execute cyber missions in which a SCADA environment is part of the greater cyberspace operational environment. By performing incident response on SCADA devices, you will learn in-depth concepts about SCADA devices.
Prerequisites
- Familiarity with basic network topology such as switching, routing, and IP addressing
- Recommended course book: Cybersecurity for Industrial Control Systems: SCADA, DCS, PLC, HMI, and SIS
Target Audience
Anyone involved with designing, monitoring, or operating SCADA/ICS network.
Certification
Certified SCADA Cyberspace Operations Engineer
Course Content
- ICS Systems Overview
- Controllers, Embedded Systems and Protocols
- PLCS, DCS, Hybrid Controllers, PC-Control
- SCADA and ICS Protocols
- Working with Modbus, OPC, and HMIs
- Different Levels of Network Communication Penetration Testing
- Serial Communications (RS-485, RS-232, Modbus RTU)
- Tests performed against SCADA networks
- External Penetration Testing
- Internal Penetration Testing
- Vulnerability Assessments
- Wireless Audits
- SCADA Vulnerability Assessment Methodology
- SCADA Protocols
- PLC< RTU, DCS, and Embedded Controllers
- SCADA Exploitation
- Analysis of embedded electronics in SCADA field and floor devices
- Discussion of device disassembly
- Introduction to SCADA Incident Response
- SCADA Incident Response Overview
- SCADA Incident Response In-Depth
- Analyzing Data Obtained from Data Dumping and Bus Snooping
- End-to-End Analysis and Reporting
- Introduction to SCAA Active Defense
- Network Segmentation
- Lab 1 – Introduction to SamuraiSTFU (Security Testing Framework for Utilities)
- Lab 2 – Pentesting RF Communications Between Master Servers and Field Devices
- Lab 3 – Pentesting TCP/IP Based SCADA Protocols
- Lab 4 – Pentesting Technician Interfaces On SCADA Field and Floor Devices
- Lab 5 – Analyzing Field and Floor Device Firmware
- Lab 6 – Overview of Pentesting Field and Floor Device Embedded Circuits
- Lab 7 – Dumping Data at Rest On Embedded Circuits
- Lab 8 – Bus Snooping On Embedded Circuits
- Lab 9 – Capture the Flag Event