Tutelr Infosec Private Limited
Certification in ICS Visibility, Detection
IT & Software (Computer Science & IT)
Shortlisted by 78+ Students
Location: Chennai
Duration: 3 MONTH
Regular / Offline
Average Fees: ₹ 98000
Highlights TICS: ICS Visibility, Detection, and Response will help you gain visibility and asset identification in your Industrial Control System (ICS)/Operational Technology (OT)networks, monitor for and detect cyber threats, deconstruct ICS cyber attacks to extract lessons learned, perform incident response, andtakean intelligence-driven approach to executing a world-leading ICS cybersecurity program to ensure safe and reliable operations.The course will empower students to understand their networked ICS environment,monitor it for threats, perform incident response against identified threats, and learn from interactions with the adversary to enhance network security. This approach is important to being able to counter sophisticated threats such as those seen with malware including STUXNET, HAVEX, BLACKENERGY2, CRASHOVERRIDE,TRISIS/TRITON,and ransomware.
Syllabus
Module Description
SECTION 1: ICS Cyber Threat Intelligence
TOPICS: Case Study: STUXNET; Introduction to ICS Active Defense and Course Scenario; Cyber Threat Intelligence Primer; ICS Cyber Kill Chain; Threat Intelligence Consumption; ICS Threat Landscape
SECTION 2: Visibility and Asset Identification
TOPICS: Case Study: Bhopal Disaster; Asset Inventories and Collection Management Frameworks; ICS Network Visibility and IT Discovery Protocols; Case Study: Ransomware and Prevention Atrophy; ICS Protocols; Case Study: DRAGONFLY – HAVEX; ICS Network
SECTION 3:ICS Threat Detection
TOPICS: Case Study: German Steelworks Attack; ICS Threat Hunting; Threat Detection Strategies; Case Study: SANDWORM – BlackEnergy 2 and BlackEnergy 3; ICS Network Security Monitoring; Event Analysis and Physical Consequence.
SECTION 4:Incident Response
TOPICS: Case Study: SANDWORM – Ukraine 2015; ICS Digital Forensics and Incident Response Overview; Preparing an ICS Incident Response Team; Case Study: ELECTRUM and CRASHOVERRIDE – Ukraine 2016; Initial Compromise Vectors; Forensic Data Sources
SECTION 5:Threat and Environment Manipulation
TOPICS: Case Study: XENOTIME – TRISIS; ICS Threat and Environment Manipulation Goals and Considerations; Threat Analysis and Malware Triaging; YARA; Mini-Capstone
SECTION 6:Capstone Day,Under Attack
This section is a full day-long technical capstone where students will complete challenges that cover packet captures, logic, memory images, and more from compromised ICS ranges and equipment. This is intended to provide a fun and educational experience attempting to score the most points possible by solving technical challenges that prepare students for real world scenarios in ICS and OT.
How Promilo Works for Students
College Search Made Easy, Find the Right College for You in Minutes, Not Months!
Search your Career Goal
Discover courses, internships, and jobs that sync with your goals.
Register for Free
Get access to premium features and connect directly with experts. You're all set!
Book a Free Meeting
Schedule a free online meeting or talk to experts Jump into a meeting with pro-experts. We got you!
Stack Up Rewards
Your time is valuable, and we appreciate every moment you spend with us. That's why we continue to reward you for your engagement.