×
 
 Back to all events

ICS/OT Cybersecurity Training

 

17 Jun 2025, Tuesday - 19 Jun 2025, ThursdaySee Schedule below for times (GMT +8:00) Kuala Lumpur, Singapore

 

32 Carpenter Street, 059911

0%

Overview

This hands-on training program equips participants with the critical skills needed to identify and mitigate cybersecurity risks in ICS and OT environments. Taught by experienced field professionals, the course emphasises real-world applications, from air-gap bypassing techniques to network forensics and fuzzing. With dedicated assistant instructors providing 1:1 coaching and support throughout the labs, participants can deepen their understanding through personalized guidance. This program is ideal for engineers, security practitioners, and IT teams who seek practical, immediate competencies in safeguarding industrial infrastructure.

As industrial systems become increasingly connected, the threat landscape facing critical infrastructure continues to expand. The ICS/OT Cybersecurity Training is a three-day immersive program designed to provide cybersecurity professionals with hands-on experience in identifying vulnerabilities of Operational Technology (OT) and Industrial Control Systems (ICS). Led by industry experts with direct field experience, this training offers unique insights into real-world attack scenarios and defence strategies. Participants will engage in practical labs on bypassing air gaps using USB, Radio Frequency, and DNS-based techniques, conduct protocol vulnerability assessments, and explore fuzzing-based discovery methods. The program also includes foundational training on PLCs, HMIs, and ICS network forensics. With assistant instructors available for 1:1 coaching during the labs, participants receive tailored support to maximize their learning outcomes.

Curriculum

Day 1: Introduction & Fundamentals

  • Environment Setup & Orientation

  • Overview of ICS/SCADA Security Training

  • Case Studies: ICS Incidents in Airports, Trains, and Industrial Plants

  • Hands-on: Bypassing Air Gaps using Radio Frequency (RF)

Day 2: Practical Exploitation Techniques

  • Hands-on: Bypassing Air Gaps using BadUSB

  • Hands-on: Bypassing Air Gaps using DNS-based Attacks

  • ICS/SCADA Protocol Vulnerability Analysis

Day 3: Advanced Threats & Defense

  • ICS Software Vulnerability Discovery via Fuzzing

  • PLC & HMI Security Fundamentals

  • ICS Network Traffic Analysis for Incident Response & System Protection

Recommended for:

This training is ideal for professionals who are responsible for the security, safety, and reliability of industrial control systems (ICS) and operational technology (OT), including:

  • OT Engineers

  • Automation Facility Safety and Security Managers

  • ICS Security Managers

  • ICS Network/System Administrators

  • Security Researchers

  • IT Support and Infrastructure Teams

Whether you are directly involved in managing industrial networks or supporting cybersecurity initiatives in OT environments, this training will help you build essential knowledge and skills to protect critical infrastructure.

Hands-on Tools

Participants will gain practical experience using a wide range of simulation platforms, testbeds, hardware, and software tools commonly used in ICS/OT cybersecurity environments. These Hands-on Simulations and Tools are developed in-house, by the instructors.

Simulation and Hardware Tools:

RA-T Runway, RA-T Crane, RA-T SFPCS, RA-T SmartCity, HackRF, P4wnP1, Teensy

Software and Programming Tools: VMWare Workstation, Siemens TIA Portal, Shodan, Censys, StealthMole, Python, WireShark

Prerequisites

To fully benefit from this training, participants are expected to have the following foundational knowledge:

  • Basic understanding of information security domains

  • Familiarity with Linux-based operating systems (especially Kali Linux)

  • Introductory knowledge of Python programming

  • Basic skills in network vulnerability analysis

While not required, foundational knowledge enables participants to gain maximum benefit from the hands-on exercises.

Laptop requirements

The participants are expected to bring their own device

Minimum Specification : 16GB RAM / 100GB Storage / Ethernet Adaptor / USB Ports

Schedule

Start Date: 17 Jun 2025, Tuesday
End Date: 19 Jun 2025, Thursday

Timewise, 9:30 am - 6:00pm

Location: 32 Carpenter Street, 059911

Speakers

Speaker's Profile:

Hae-eun Moon, Researcher / Security Consultant, NSHC Inc
Hae-eun Moon

- CS Device Zero-Day Vulnerability Chief Detector/Analyst - IoT Device & Application Zero-Day Vulnerability Chief Detector/Analyst - 2019-Present | DSTA CDDC CTF Organizer - 2019-2023 | MOTIE CTF Organizer - 2018-Present | DEF CON ICS/SCADA CTF Organizer - 2016-Present | NSHC Training (ICS/SCADA, IoT Exploitation) Instructor - 2017, 2019 | STUD S3 CTF Winner - 2015, 2017 | CODE BLUE Hack2Win Winner - 2009, 2013 | DEF CON 17th, 21st CTF Finalist

Speaker's Profile:

Rana, Researcher / Security Consultant, NSHC Inc
Rana

- CS/SCADA Security Researcher - Regional Manager (EMEA) - 2022 - Present | DEFCON RED ALERT ICS CTF Organizer - 2022 - Present | DSTA CDDC CTF Organizer - 2021 | Hack In The Box - CyberWeek - OT Security Villager - 2019 - Present | NSHC Training (ICS/SCADA) Instructor - 2019 | International Atomic Energy Agency - Instructor/SME for Protecting Computer Based Systems in Nuclear Security

Speaker's Profile:

Sunghun Do, Researcher / Security Consultant, NSHC Inc
Sunghun Do

- PLC/HMI Testbed Engineer - 2022 - Present | Brainhack CDDC CTF Organizer - 2021 - Present | ICS/OT Security Training Instructor (PLC/HMI Basics) - 2021 | DEF CON ICS/SCADA CTF Organizer - 2020 - 2021 | MOTIE CTF Organizer - 2018 - 2020 | Manager, PLC-based Automatic Machinery Production & Installation

Partners

NSHC Inc
Technology:
Industries:

Other events you may like