About

Conference

SecurityWeek’s ICS Cyber Security Conference is the conference where ICS users, ICS vendors, system security providers and government representatives meet to discuss the latest cyber-incidents, analyze their causes and cooperate on solutions.

<We_can_help/>

What are you looking for?

>Uncategorized >New Training: Advanced ICS/IIoT Security 1-Day Training (Singapore)

New Training: Advanced ICS/IIoT Security 1-Day Training (Singapore)

SecurityWeek is pleased to offer the following optional workshop for attendees of our 2019 Singapore ICS Cyber Security Conference, taking place April 16-18, 2019.

When: Thursday, April 18, 2019 – 8AM-5PM ($400 Fee – Limited to 40 Students – Register Now)

Industrial Control Systems (including DCS, HMI, PLC, SCADA, SIS) and Industrial IoT are often poorly understood, yet they are used in the most critical environments in the world. Although they generally remain unseen they are responsible for the smooth running of our daily routines from the moment we turn on a tap in the morning, to turning off the lights at night.

This one-day training will take a deep-dive into advanced ICS security techniques and provide participants with the knowledge that they need to safely evaluate and protect these systems against emerging cyber threats.
The course will also provide methodologies through which security research may be performed against ICS devices in order to identify zero-day vulnerabilities; taking a deep dive into industrial protocols used within low-level ICS assets such as OPC, IEC 60870-5-104 and Modbus in addition to discussing DNP3, Ethernet/IP, Profinet, MMS, WirelessHART, ISA100.11a. During the course, participants will have the opportunity to engage in real-life attacks against key ICS/IIoT components and other Industrial Control Systems, by performing activities such as firmware reverse engineering of ICS assets, and ICS protocol fuzzing.

Course Outline
ICS Fundamentals & Attack Introduction (Morning)
1. Industrial Control Systems Overview
2. Securing Industrial Control Systems
3. Open Source Intelligence (OSINT)
4. Attacking ICS Devices
5. Hacking Windows Based Control Systems

Attacking ICS – real-life hacking (Afternoon)
6.Ransomware
7.Hacking SCADA Applications
8.OPC Configuration Vulnerabilities and Hardening
9.Fuzzing Industrial Protocols
10.Firmware Analysis & Reverse Engineering

Add Comment