-
Section 1: Welcome to the Training!
8 Lessons -
Section 2: Setting Up Your ICS/OT Lab
8 Lessons-
Start8 Introduction to Setting Up Your ICS/OT Lab
-
Start9 Understanding Virtualization and Virtual Machines
-
Start10 Installation of VirtualBox
-
Start11 Installing the Kali Linux VM and downloading additional nmap scripts
-
Start12 Installing the Ubuntu Desktop VM
-
Start13 Running the Install Script to get the Course Materials
-
Start14 Setting up the HostOnly Network
-
Start15 Summary of Setting Up Your ICS/OT Lab
-
-
Section 3: Practical Refresher
7 Lessons-
Start16 Introduction to Practical Refresher
-
Start17 Setup the VM, Start the S7-300 Emulation and Excercise Tasks
-
Start18 Recap Netdiscover, Nmap, Nmap NSE (Spoiler Free)
-
Start19 Step by Step Excercise Solution_ S7-300 Recon, Enum and Assessment
-
Start20 Report Writing with ChatGPT
-
Start21 Summary of Practical Refresher
-
StartSection 3: Quiz
-
-
Section 4: Preparing the Assessment
8 Lessons-
Start22 Introduction to Preparing the Assessment
-
Start23 Setting the Stage: Crumbs of Joy Cookie Factory and getting to know their OT
-
Start24 The Penetration Testing Agreement
-
Start25 Your Asset Inventory Template
-
Start26 Migrating the Client's Data into our Asset Inventory
-
Start27 Create a Network Topology from Scratch with draw.io
-
Start28 Summary of Preparing the Assessment
-
StartSection 4: Quiz
-
-
Section 5: OT Network Assessment
9 Lessons-
Start29 Introduction to OT Network Assessment
-
Start30 Performing a Layer 2 Asset Discovery - Task
-
Start31 Performing a Layer 2 Asset Discovery - Solution
-
Start32 Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - Task
-
Start33 Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - Solution
-
Start34 Scanning the OT Network for Open Ports with Nmap - Task
-
Start35 Scanning the OT Network for Open Ports with Nmap - Solution
-
Start36 Summary of OT Network Assessment
-
StartSection 5: Quiz
-
-
Section 6: PLC Assessment
6 Lessons -
Section 7: HMI Assessment
6 Lessons-
Start42 Introduction to Human-Machine-Interface Assessment
-
Start43 Setting up the HMI Emulation and Task
-
Start44 Scanning for Open Ports with Nmap - Solution
-
Start45 Assessing the HMI_s Remote Access Services - Solution
-
Start46 Summary of Human-Machine-Interface Assessment and Bonus
-
StartSection 7: Quiz
-
-
Section 8: Summarizing the Findings and Reporting
9 Lessons-
Start47 Introduction to Summarizing the Findings and Reporting
-
Start48 Update the Network Topology - Task
-
Start49 Update the Network Topology - Solution
-
Start50 Discovering Undocumented Network Hosts
-
Start51 Critical Findings_ OT Network Architecture, Remote Access, PLC, HMI
-
Start52 Summarizing Key-Findings in an Dashboard
-
Start53 Reporting the Findings with ChatGPT
-
Start54 Summary of Summarizing the Findings and Reporting
-
StartSection 8: Quiz
-
-
Section 9: Risk Assessment and Threat Modelling
14 Lessons-
Start55 Introduction to Risk Assessment and Threat Modelling
-
Start56 Risks of a Flat OT Network
-
Start57 Risks of VPN Remote Access Router
-
Start58 Security Maturity Levels as in IEC/ISA 62443
-
Start59 Introduction to the ICS ATT&CK Framework
-
Start60 Understanding common used techniques by creating a heatmap in ATT&CK
-
Start61 Developing a Threat Scenario on the PLC and HMI using ATT&CK - Task
-
Start62 Developing a Threat Scenario on the PLC and HMI using ATT&CK - Solution
-
Start63 Mitigating Threats using the ATT&CK Mitigation Recommendations
-
Start64 Developing a Threat Scenario using HAZOP and Dynamical Systems Theory
-
Start65 Developing a Threat Scenario using the Use Case Abuse Model (OT Thought Model)
-
Start66 Adding Identified Risks to the Report
-
Start67 Summary of Risk Assessment and Threat Modelling
-
StartSection 9: Quiz
-
-
Section 10: Protection Techniques
13 Lessons-
Start68 Introduction to Protection Techniques
-
Start69 The Purdue Reference Model and the Automation Pyramid
-
Start70 Defense in Depth Model
-
Start71 System Hardening of the PLC
-
Start72 System Hardening of the HMI and Secure HMI Screen Design
-
Start73 System Hardening vs Threat Scenario in ICS ATT&CK
-
Start74 Reducing the Risks of a Flat OT Network with Network Segmentation
-
Start75 Best Practises for Secure Remote Access
-
Start76 Remote Access via Jump Host
-
Start77 Attack Surface Reduction with Secure Coding
-
Start78 Adding Mitigation Recommendations to the Report
-
Start79 Summary of Protection Techniques
-
StartSection 10: Quiz
-
-
Section 11: Connecting the IT and OT Worlds
6 Lessons -
Section 12: Closing
1 Lesson-
Start85 Thank You, Closing Thoughts and Free ICS/OT Security Ressources
-





