<?xml version="1.0" encoding="utf-8" ?>
<!DOCTYPE FL_Course SYSTEM "https://www.flane.de/dtd/fl_course095.dtd"><?xml-stylesheet type="text/xsl" href="https://portal.flane.ch/css/xml-course.xsl"?><course productid="30298" language="en" source="https://portal.flane.ch/swisscom/en/xml-course/ec-ics-scada" lastchanged="2025-11-13T09:46:56+01:00" parent="https://portal.flane.ch/swisscom/en/xml-courses"><title>EC-Council ICS/SCADA Cybersecurity</title><productcode>ICS-SCADA</productcode><vendorcode>EC</vendorcode><vendorname>EC-Council</vendorname><fullproductcode>EC-ICS-SCADA</fullproductcode><version>1</version><essentials>&lt;ul&gt;
&lt;li&gt;Linux operating system fundamentals, including basic command line usage.&lt;/li&gt;&lt;li&gt;Conceptual knowledge of programming/scripting.&lt;/li&gt;&lt;li&gt;Solid grasp of essential networking concepts (OSI model, TCP/IP, networking devices, and transmission media).&lt;/li&gt;&lt;li&gt;Understanding of basic security concepts (e.g., malware, intrusion detection systems, firewalls, and vulnerabilities).&lt;/li&gt;&lt;li&gt;Familiarity with network traffic inspection tools (Wireshark, TShark, or TCPdump) is highly recommended.&lt;/li&gt;&lt;/ul&gt;</essentials><audience>&lt;p&gt;This course is designed for IT professionals who manage or direct their organization&amp;rsquo;s IT infrastructure and are responsible for establishing and maintaining information security policies, practices, and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.&lt;/p&gt;</audience><contents>&lt;ul&gt;
&lt;li&gt;Module 1: Introduction to ICS/SCADA Network Defense&lt;/li&gt;&lt;li&gt;Module 2: TCP/IP 101&lt;/li&gt;&lt;li&gt;Module 3: Introduction to Hacking&lt;/li&gt;&lt;li&gt;Module 4: Vulnerability Management&lt;/li&gt;&lt;li&gt;Module 5: Standards and Regulations for Cybersecurity&lt;/li&gt;&lt;li&gt;Module 6: Securing the ICS Network&lt;/li&gt;&lt;li&gt;Module 7: Bridging the Air Gap&lt;/li&gt;&lt;li&gt;Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)&lt;/li&gt;&lt;/ul&gt;</contents><outline>&lt;h5&gt;Module 1: Introduction to ICS/SCADA Network Defense&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;IT Security Model&lt;/li&gt;&lt;li&gt;ICS/SCADA Security Model&lt;/li&gt;&lt;li&gt;&lt;strong&gt;LAB: Security Model&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Security Posture&lt;/li&gt;&lt;li&gt;Risk Management in ICS/SCADA&lt;/li&gt;&lt;li&gt;Risk Assessment&lt;/li&gt;&lt;li&gt;Defining Types of Risk&lt;/li&gt;&lt;li&gt;Security Policy&lt;/li&gt;&lt;li&gt;&lt;strong&gt;LAB: Allowing a Service&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 2: TCP/IP 101&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Introduction and Overview&lt;/li&gt;&lt;li&gt;Introducing TCP/IP Networks&lt;/li&gt;&lt;li&gt;Internet RFCs and STDs&lt;/li&gt;&lt;li&gt;TCP/IP Protocol Architecture&lt;/li&gt;&lt;li&gt;Protocol Layering Concepts&lt;/li&gt;&lt;li&gt;TCP/IP Layering&lt;/li&gt;&lt;li&gt;Components of TCP/IP Networks&lt;/li&gt;&lt;li&gt;ICS/SCADA Protocols&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 3: Introduction to Hacking&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Review of the Hacking Process&lt;/li&gt;&lt;li&gt;Hacking Methodology&lt;/li&gt;&lt;li&gt;Intelligence Gathering&lt;/li&gt;&lt;li&gt;Footprinting&lt;/li&gt;&lt;li&gt;Scanning&lt;/li&gt;&lt;li&gt;Enumeration&lt;/li&gt;&lt;li&gt;Identify Vulnerabilities&lt;/li&gt;&lt;li&gt;Exploitation&lt;/li&gt;&lt;li&gt;Covering Tracks&lt;/li&gt;&lt;li&gt;&lt;strong&gt;LAB: Hacking ICS/SCADA Networks Protocols&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;How ICS/SCADA Are Targeted&lt;/li&gt;&lt;li&gt;Study of ICS/SCADA Attacks&lt;/li&gt;&lt;li&gt;ICS/SCADA as a High&amp;ndash;Value Target&lt;/li&gt;&lt;li&gt;Attack Methodologies In ICS&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 4: Vulnerability Management&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Challenges of Vulnerability Assessment&lt;/li&gt;&lt;li&gt;System Vulnerabilities&lt;/li&gt;&lt;li&gt;Desktop Vulnerabilities&lt;/li&gt;&lt;li&gt;ICS/SCADA Vulnerabilities&lt;/li&gt;&lt;li&gt;Interpreting Advisory Notices&lt;/li&gt;&lt;li&gt;CVE&lt;/li&gt;&lt;li&gt;ICS/SCADA Vulnerability Sites&lt;/li&gt;&lt;li&gt;Life Cycle of a Vulnerability and Exploit&lt;/li&gt;&lt;li&gt;Challenges of Zero-Day Vulnerability&lt;/li&gt;&lt;li&gt;Exploitation of a Vulnerability&lt;/li&gt;&lt;li&gt;Vulnerability Scanners&lt;/li&gt;&lt;li&gt;ICS/SCADA Vulnerability Uniqueness&lt;/li&gt;&lt;li&gt;Challenges of Vulnerability Management Within ICS/SCADA&lt;/li&gt;&lt;li&gt;&lt;strong&gt;LAB: Vulnerability Assessment&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Prioritizing Vulnerabilities&lt;/li&gt;&lt;li&gt;CVSS&lt;/li&gt;&lt;li&gt;OVAL&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 5: Standards and Regulations for Cybersecurity&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;ISO 27001&lt;/li&gt;&lt;li&gt;ICS/SCADA&lt;/li&gt;&lt;li&gt;NERC CIP&lt;/li&gt;&lt;li&gt;CFATS&lt;/li&gt;&lt;li&gt;ISA99&lt;/li&gt;&lt;li&gt;IEC 62443&lt;/li&gt;&lt;li&gt;NIST SP 800-82&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 6: Securing the ICS Network&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Physical Security&lt;/li&gt;&lt;li&gt;Establishing Policy &amp;ndash; ISO Roadmap&lt;/li&gt;&lt;li&gt;Securing the Protocols Unique to the ICS&lt;/li&gt;&lt;li&gt;Performing a Vulnerability Assessment&lt;/li&gt;&lt;li&gt;Selecting and Applying Controls to Mitigate Risk&lt;/li&gt;&lt;li&gt;Monitoring&lt;/li&gt;&lt;li&gt;Mitigating the Risk of Legacy Machines&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 7: Bridging the Air Gap&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;Do You Really Want to Do This?&lt;/li&gt;&lt;li&gt;Advantages and Disadvantages&lt;/li&gt;&lt;li&gt;Guard&lt;/li&gt;&lt;li&gt;Data Diode&lt;/li&gt;&lt;li&gt;Next Generation Firewalls&lt;/li&gt;&lt;/ul&gt;&lt;h5&gt;Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)&lt;/h5&gt;&lt;ul&gt;
&lt;li&gt;What IDS Can and Cannot Do&lt;/li&gt;&lt;li&gt;Types IDS&lt;/li&gt;&lt;li&gt;Network&lt;/li&gt;&lt;li&gt;Host&lt;/li&gt;&lt;li&gt;Network Node&lt;/li&gt;&lt;li&gt;Advantages of IDS&lt;/li&gt;&lt;li&gt;Limitations of IDS&lt;/li&gt;&lt;li&gt;Stealthing the IDS&lt;/li&gt;&lt;li&gt;Detecting Intrusions&lt;/li&gt;&lt;li&gt;&lt;strong&gt;LAB: Intrusion Detection&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Log Analysis&lt;/li&gt;&lt;li&gt;ICS Malware Analysis&lt;/li&gt;&lt;li&gt;&lt;strong&gt;LAB: ICS Malware Analysis&lt;/strong&gt;&lt;/li&gt;&lt;li&gt;Essential Malware Mitigation Techniques&lt;/li&gt;&lt;li&gt;ICS/SCADA Network Monitoring&lt;/li&gt;&lt;li&gt;ICS/SCADA IDS&lt;/li&gt;&lt;/ul&gt;</outline><essentials_plain>- Linux operating system fundamentals, including basic command line usage.
- Conceptual knowledge of programming/scripting.
- Solid grasp of essential networking concepts (OSI model, TCP/IP, networking devices, and transmission media).
- Understanding of basic security concepts (e.g., malware, intrusion detection systems, firewalls, and vulnerabilities).
- Familiarity with network traffic inspection tools (Wireshark, TShark, or TCPdump) is highly recommended.</essentials_plain><audience_plain>This course is designed for IT professionals who manage or direct their organization’s IT infrastructure and are responsible for establishing and maintaining information security policies, practices, and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.</audience_plain><contents_plain>- Module 1: Introduction to ICS/SCADA Network Defense
- Module 2: TCP/IP 101
- Module 3: Introduction to Hacking
- Module 4: Vulnerability Management
- Module 5: Standards and Regulations for Cybersecurity
- Module 6: Securing the ICS Network
- Module 7: Bridging the Air Gap
- Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)</contents_plain><outline_plain>Module 1: Introduction to ICS/SCADA Network Defense


- IT Security Model
- ICS/SCADA Security Model
- LAB: Security Model
- Security Posture
- Risk Management in ICS/SCADA
- Risk Assessment
- Defining Types of Risk
- Security Policy
- LAB: Allowing a Service
Module 2: TCP/IP 101


- Introduction and Overview
- Introducing TCP/IP Networks
- Internet RFCs and STDs
- TCP/IP Protocol Architecture
- Protocol Layering Concepts
- TCP/IP Layering
- Components of TCP/IP Networks
- ICS/SCADA Protocols
Module 3: Introduction to Hacking


- Review of the Hacking Process
- Hacking Methodology
- Intelligence Gathering
- Footprinting
- Scanning
- Enumeration
- Identify Vulnerabilities
- Exploitation
- Covering Tracks
- LAB: Hacking ICS/SCADA Networks Protocols
- How ICS/SCADA Are Targeted
- Study of ICS/SCADA Attacks
- ICS/SCADA as a High–Value Target
- Attack Methodologies In ICS
Module 4: Vulnerability Management


- Challenges of Vulnerability Assessment
- System Vulnerabilities
- Desktop Vulnerabilities
- ICS/SCADA Vulnerabilities
- Interpreting Advisory Notices
- CVE
- ICS/SCADA Vulnerability Sites
- Life Cycle of a Vulnerability and Exploit
- Challenges of Zero-Day Vulnerability
- Exploitation of a Vulnerability
- Vulnerability Scanners
- ICS/SCADA Vulnerability Uniqueness
- Challenges of Vulnerability Management Within ICS/SCADA
- LAB: Vulnerability Assessment
- Prioritizing Vulnerabilities
- CVSS
- OVAL
Module 5: Standards and Regulations for Cybersecurity


- ISO 27001
- ICS/SCADA
- NERC CIP
- CFATS
- ISA99
- IEC 62443
- NIST SP 800-82
Module 6: Securing the ICS Network


- Physical Security
- Establishing Policy – ISO Roadmap
- Securing the Protocols Unique to the ICS
- Performing a Vulnerability Assessment
- Selecting and Applying Controls to Mitigate Risk
- Monitoring
- Mitigating the Risk of Legacy Machines
Module 7: Bridging the Air Gap


- Do You Really Want to Do This?
- Advantages and Disadvantages
- Guard
- Data Diode
- Next Generation Firewalls
Module 8: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)


- What IDS Can and Cannot Do
- Types IDS
- Network
- Host
- Network Node
- Advantages of IDS
- Limitations of IDS
- Stealthing the IDS
- Detecting Intrusions
- LAB: Intrusion Detection
- Log Analysis
- ICS Malware Analysis
- LAB: ICS Malware Analysis
- Essential Malware Mitigation Techniques
- ICS/SCADA Network Monitoring
- ICS/SCADA IDS</outline_plain><duration unit="d" days="3">3 days</duration><pricelist><price country="GR" currency="EUR">2350.00</price><price country="MK" currency="EUR">2350.00</price><price country="HU" currency="EUR">2350.00</price><price country="DE" currency="EUR">2950.00</price><price country="AT" currency="EUR">2950.00</price><price country="SE" currency="EUR">2950.00</price><price country="SI" currency="EUR">2950.00</price><price country="IL" currency="EUR">2950.00</price><price country="CH" currency="CHF">2950.00</price></pricelist><miles/></course>