Overview
This hands-on training program equips participants with the critical skills needed to identify and mitigate cybersecurity risks in ICS and OT environments. Taught by experienced field professionals, the course emphasises real-world applications, from air-gap bypassing techniques to network forensics and fuzzing. With dedicated assistant instructors providing 1:1 coaching and support throughout the labs, participants can deepen their understanding through personalized guidance. This program is ideal for engineers, security practitioners, and IT teams who seek practical, immediate competencies in safeguarding industrial infrastructure.
As industrial systems become increasingly connected, the threat landscape facing critical infrastructure continues to expand. The ICS/OT Cybersecurity Training is a three-day immersive program designed to provide cybersecurity professionals with hands-on experience in identifying vulnerabilities of Operational Technology (OT) and Industrial Control Systems (ICS). Led by industry experts with direct field experience, this training offers unique insights into real-world attack scenarios and defence strategies. Participants will engage in practical labs on bypassing air gaps using USB, Radio Frequency, and DNS-based techniques, conduct protocol vulnerability assessments, and explore fuzzing-based discovery methods. The program also includes foundational training on PLCs, HMIs, and ICS network forensics. With assistant instructors available for 1:1 coaching during the labs, participants receive tailored support to maximize their learning outcomes.
Curriculum
Day 1: Introduction & Fundamentals
Environment Setup & Orientation
Overview of ICS/SCADA Security Training
Case Studies: ICS Incidents in Airports, Trains, and Industrial Plants
Hands-on: Bypassing Air Gaps using Radio Frequency (RF)
Day 2: Practical Exploitation Techniques
Hands-on: Bypassing Air Gaps using BadUSB
Hands-on: Bypassing Air Gaps using DNS-based Attacks
ICS/SCADA Protocol Vulnerability Analysis
Day 3: Advanced Threats & Defense
ICS Software Vulnerability Discovery via Fuzzing
PLC & HMI Security Fundamentals
ICS Network Traffic Analysis for Incident Response & System Protection
Recommended for:
This training is ideal for professionals who are responsible for the security, safety, and reliability of industrial control systems (ICS) and operational technology (OT), including:
OT Engineers
Automation Facility Safety and Security Managers
ICS Security Managers
ICS Network/System Administrators
Security Researchers
IT Support and Infrastructure Teams
Whether you are directly involved in managing industrial networks or supporting cybersecurity initiatives in OT environments, this training will help you build essential knowledge and skills to protect critical infrastructure.
Hands-on Tools
Participants will gain practical experience using a wide range of simulation platforms, testbeds, hardware, and software tools commonly used in ICS/OT cybersecurity environments. These Hands-on Simulations and Tools are developed in-house, by the instructors.
Simulation and Hardware Tools:
RA-T Runway, RA-T Crane, RA-T SFPCS, RA-T SmartCity, HackRF, P4wnP1, Teensy
Software and Programming Tools: VMWare Workstation, Siemens TIA Portal, Shodan, Censys, StealthMole, Python, WireShark
Prerequisites
To fully benefit from this training, participants are expected to have the following foundational knowledge:
Basic understanding of information security domains
Familiarity with Linux-based operating systems (especially Kali Linux)
Introductory knowledge of Python programming
Basic skills in network vulnerability analysis
While not required, foundational knowledge enables participants to gain maximum benefit from the hands-on exercises.
Laptop requirements
The participants are expected to bring their own device
Minimum Specification : 16GB RAM / 100GB Storage / Ethernet Adaptor / USB Ports
Schedule
End Date: 19 Jun 2025, Thursday
Timewise, 9:30 am - 6:00pm
Location: 32 Carpenter Street, 059911Speakers
Speaker's Profile:
Hae-eun Moon, Researcher / Security Consultant, NSHC Inc
- CS Device Zero-Day Vulnerability Chief Detector/Analyst - IoT Device & Application Zero-Day Vulnerability Chief Detector/Analyst - 2019-Present | DSTA CDDC CTF Organizer - 2019-2023 | MOTIE CTF Organizer - 2018-Present | DEF CON ICS/SCADA CTF Organizer - 2016-Present | NSHC Training (ICS/SCADA, IoT Exploitation) Instructor - 2017, 2019 | STUD S3 CTF Winner - 2015, 2017 | CODE BLUE Hack2Win Winner - 2009, 2013 | DEF CON 17th, 21st CTF Finalist
Speaker's Profile:
Rana, Researcher / Security Consultant, NSHC Inc
- CS/SCADA Security Researcher - Regional Manager (EMEA) - 2022 - Present | DEFCON RED ALERT ICS CTF Organizer - 2022 - Present | DSTA CDDC CTF Organizer - 2021 | Hack In The Box - CyberWeek - OT Security Villager - 2019 - Present | NSHC Training (ICS/SCADA) Instructor - 2019 | International Atomic Energy Agency - Instructor/SME for Protecting Computer Based Systems in Nuclear Security
Speaker's Profile:
Sunghun Do, Researcher / Security Consultant, NSHC Inc
- PLC/HMI Testbed Engineer - 2022 - Present | Brainhack CDDC CTF Organizer - 2021 - Present | ICS/OT Security Training Instructor (PLC/HMI Basics) - 2021 | DEF CON ICS/SCADA CTF Organizer - 2020 - 2021 | MOTIE CTF Organizer - 2018 - 2020 | Manager, PLC-based Automatic Machinery Production & Installation
Partners
