ICS Cyber Security Training Curriculum
Threat Vulnerability & Risk Assessments for
Industrial Control Systems
This mission critical course focuses on one the most apparent weaknesses in securing operational technologies and their connected physical systems from threats aiming to cause harm – Risk. Training emphasizes the three cohesive activities that “assess” risk, “manage” risk, and deploy security controls that target and “mitigate” risk.
The curriculum introduces processes and methodologies based on decades of field activities and operational data to look at systems from a risk point-of-view that emphasize consequences or impact to critical services and functions rather than component or system level vulnerabilities that often do not map to any operational targets. This course is taught using a range of real-world architectures, components, devices, and protocols that leverage both traditional software vulnerabilities and other more subtle, hard to find yet equally if not, more powerful human vulnerabilities that arise from typical system configuration and usage to focus on mapping threats to impact. This course is based on a balanced combination of brief educational lectures that are reinforced with a combination of individual and group exercises. The typical course splits content with 40% lectures/discussions/demonstrations and 60% individual and group exercises.
Course Agenda
- Part 1: Risk Management, Architecture and Networking
- Present: Risk Assessment Process
- Present: Understanding the Components of Risk
- Present: Describe the Threat, Vulnerability, & Risk Assessment (TVRA) Process
- Present: Identifying and Quantifying Risk - Instrument Air System (IAS)
- Exercise: Assessment Preparation & Planning - Acme Manufacturing Company
- Present: ICS Architectures & Networking
- Exercise: Installing Network Analysis Tools (optional)
- Exercise: Using Network Analysis Tools
- Present: ICS Communication Protocols
- Exercise: Analyzing ICS Network Traffic with Network Analysis Tools
- Part 2: Deep Dive TVRA Process
- Present: ICS Asset Identification & Characterization - Process, Tools & Tricks
- Exercise: Multi-Zone Asset Discovery (Hardware & Software Inventories)
- Exercise: Multi-Zone Asset Discovery (Data Flow & Firewall Analysis)
- Present: ICS Vulnerability, Threat Discovery & Remediation
- Exercise: Vulnerability Identification on a Multi-Zone OT Architecture
- Exercise: Performing Credentialed Vulnerability Scans at Home using Nessus (optional)
- Exercise: Characterization & Compliance Auditing
- Demonstration: Collecting Assessment data using Tenable Nessus
- Present: Risk, Resiliency & Project Lifecycle
- Present: Alternatives to Traditional Risk Management Methods
- Exercise: ICS Risk Analysis & Control Selection
- Exercise: Addressing Resilience to Improve Security of OT Architectures
- Present: The Changing Threat Landscape
Student Requirements
Students will use their own laptop to complete activities and exercises included with this course. This student-supplied laptop will be used to access the ICSCSI Moodle Learning Management System (LMS) during and after the course. The laptop must have installed a modern Internet web browser such as Chrome, Edge, Firefox, Safari, etc. The platform operating system is not important and may include Linux (multiple distributions), macOS, or Windows. No additional software is required for this course.
Access to the LMS requires a public Internet connection that resolves the icscsi.org domain name and allows connectivity using TCP transport ports 443 and 8443.
The LMS will host content used throughout the course that can be viewed and downloaded by the students. This includes the course textbook, documents, spreadsheets, instructional videos and more. The LMS will also be available to students after the course that includes access to the ICSCSI course “Fundamentals of Industrial Control System Cyber Security (EXPRESS)” covering the operational skills and tools, techniques and procedures (TTP) needed to perform the activities that comprise a TVRA that are too extensive to include in this short format course.
Student Material
Students utilize both hard-copy and electronic versions of material used in the course. A typical list of student materials include:
- Course Textbook - "Industrial Network Security, 3rd ed."
- Threat, Vulnerability & Risk Assessment Sample Report
- Course Manual (presentation slides)
- Course Lab Manual (includes forms and detailed instructions
- Industrial Control System Cyber Security Assessment Field Manual
- Pre-Assessment Scope Definition Questionnaire
- Assessment Asset Collection Form
Students will also receive six (6) months of access to the full on-line course "Fundamemtals of Industrial Control System Cyber Security EXPRESS". This course provides more context around the material covered in this course, and provides a solid basis of establishing a baseline of knowledge that supports external qualification and certification examinations.
Training Logistics
The in-person training class size is limited to no more than 50 students. The instructor will use the class size to evaluate how the group activities will be conducted to maximize participation and individual student learning. This may include working in small groups (typically no more than 2-4 people per group).
Providing a suitable training room for in-person training is the responsibility of the client and should focus on a safe and comfortable learning environment for the group.
Recommended Optional Reading
Title | Publisher |
Applied Cyber Security and the Smart Grid | Syngress |
Hacking Exposed - Industrial Control Systems | McGraw Hill |
Open Source Security Testing Methodology Manual (OSTMM) | |
Security Assessing using the US National Security Agency Information Assurance Methodology | Syngress |
Security Controls Evaluation, Testing and Assessment Handbook | Syngress |
Pricing (scan applicable QR Code)
Domestic (US only): US$ 2,000
International: US$ 2,250
Training material will be shipped within 14 days from receipt of order using FedEx Express Saver (Domestic US Only) with delivery times typically 3-5 days. International shipping delivery times vary and will be provided prior to shipment.
Additional information on other courses offered as part of the curriculum can be viewed by selecting from the following list or the Quick Links located in the top righthand section of this page:
- Introduction to Industrial and Facility-Related Control System Cyber Security
- Fundamentals of Information (IT) and Operational Technology (OT) Systems
- Conducting Asset Inventories for U.S. Department of Defense Facility-Related Control Systems using the Army Methodology
- Fundamentals of Industrial and Facility-Related Control System Cyber Security
- Ethical Hacking for Industrial Control Systems
QUICK LINKS
Introduction to ICS/FRCS Cyber Security
Fundamentals of IT and OT Systems
Conducting Asset Inventories for US DoD FRCS using the Army Methodology
Fundamentals of ICS/FRCS Cyber Security
Conducting Threat, Vulnerability and Risk Assessments on ICS
Ethical Hacking for Industrial Control Systems
Training Overview
Training Alignment with Army Universal Task List (AUTL)
Training Alignment with Universal Naval Task List (UNTL)
COURSE TEXTBOOK

COURSE MANUALS



SUGGESTED READING



