Cybersecurity Industrial Control Systems Engineer | SGInnovate

DATE: TBC

Location

TBC , SINGAPORE

Cybersecurity Industrial Control Systems Engineer

Presented by SGInnovate, Tegasus International & ST Engineering

Together with Tegasus International and the ST Engineering Cybersecurity Academy, SGInnovate is proud to present a series of Cybersecurity workshops in Operational Technology (OT) designed to get you and your organisation ready for impending Cybersecurity threats and vulnerabilities.

Supported by SkillsFuture Singapore, these OT courses are aligned with the key pillars of the Singapore Cybersecurity Strategy and tailored to the needs of those working in the 11 Critical Information Infrastructure (CII) sectors in Singapore.

In this 3-day workshop, you will gain a deeper understanding of the OT Cybersecurity ecosystem through real-world use cases, hands-on applications and exercises, incorporated with realistic scenarios built around operational cyber-physical testbeds.

Concepts in embedded systems, protocols fundamentals, known vulnerabilities discovery, forensic investigation and process exploitation will be covered. You will also learn about threats and cyber-risks to Industrial Control Systems (ICS) and the different types and stages of a cyber-attack.

By the end of the workshop, you will be able to recognise the symptoms of a cyber-attack, use tools and techniques to investigate possible breaches in the ICS, and be able to demonstrate a multitude of cybersecurity techniques including vulnerability assessments, sensor disruption and defence-in-depth.

This workshop is pending funding support. For more details, please refer to the "Pricing" tab above.

Workshop Overview:
In this course, participants will learn:

  • Basic Cyber-Physical Systems (CPS)
  • Cyber-risks and security vulnerabilities in CPS
  • Process control exploitation
  • Basic networking concepts necessary for active and passive network discovery
  • Network attacks and exploits: different stages of an attack
  • Network defence and incident response

Prerequisites:

  • Basic understanding of ICS, CPS or operational technology
  • At least two years of Cybersecurity-related work experience
  • A keen interest in Cybersecurity

Pre-Workshop Instructions:

  • Bringing your own laptop is a must

Day 1

Overview of Cyber-Physical Systems (CPS)

Basic CPS

  • Overview of CPS: Industrial Control Systems (ICS) with a communication network
  • ICS basics including data flow and protocol
  • Hands-on exercise

Cyber-risk and Security Vulnerabilities in CPS

  • Cyber risks to ICS
  • Threat trends for control systems
  • Security Topics: Information Technology (IT) vs Operational Technology (OT)
  • Common vulnerabilities for control systems
  • Case studies
  • Demonstration

Process Control Exploitation

  • Overview of the SWaT architecture and a demonstration of the network layout
  • Static multiple point attacker paths and model
  • Demonstration

IT and OT Networks Discovery

Basic Networking Concepts 

  • The IP address and basic networking
  • NEY and IANA
  • OSI 7-layer model 
  • Address Resolution Protocol (ARP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP)
  • Protocol characteristics and relevant threats

Passive Discovery

  • Passive discovery vs active discovery
  • Intelligence gathering tools
  • Tools and techniques for passive discovery
  • Hands-on exercise

Day 2

IT and OT Networks Discovery

Active Discovery

  • Nmap 
  • Host Discovery in IT and OT
  • Port scanning and states in IT and OT
  • ICS challenges
  • Introduction to Nessus (vulnerability scanner)
  • Introduction to OpenVAS (Open Vulnerability Assessment System)
  • Hands-on exercise

CPS and Network Attacks and Exploits

Discuss the different stages of attacks

  • Attacker profiles, attack stages, tasks and consideration
  • System vulnerabilities and software vulnerability 
  • National vulnerability database CVSS
  • Exploit types 
  • Attack operations
  • Bypass network controls
  • Hands-on exercise

CPS Attack Surface

  • Metasploit framework
  • Basic exploit process
  • Meterpreter: Useful commands
  • Hands-on exercise

Day 3

Network Defence and Incident Response

CPS Attack Surface

  • Hands-on exercise: Armitage on IT and OT Networks

Security Monitoring and Incident Response

  • Understanding defence-in-depth
  • Intrusion detection/protection system
  • Signature vs anomaly detection
  • Intrusion Prevention Systems (IPS) vs Intrusion Detection Systems (IDS)
  • Incident response plan for CPS 
  • Hands-on exercise 
  • Assessment

Funding Support
This workshop is currently in the process of applying for funding. Register your interest now, and we will contact you when registrations are open.

Ivan Lee, Co-founder, Tegasus International

Ivan works with various global strategic partners such as the NATO Cooperative Cyber Defence Centre of Excellence, US Department of Homeland Security ICS-CERT Idaho National Laboratory and local government agencies on critical initiatives and training programmes. 

He started his career with Accenture, a global top IT consulting MNC company and has assumed various tech management roles in the telecommunication, cGMP and Operational Technology sectors regionally.

He has attended various professional training courses and acquired certifications as listed below:

  • Certified Information Systems Security Professional (CISSP)
  • US Department of Homeland Security ICS-CERT Industrial Control Systems (ICS) Cybersecurity (301)
  • Advanced Penetration Testing, Exploit Writing, Ethical Hacking (SANS)
  • Advanced Course on Darknet and Cryptocurrencies
  • Hands-on Hardware Hacking and Reverse Engineering (Blackhat 2015)
  • Cybersecurity: Technology, Application and Policy (MIT Digital Program)
  • FORENSICS: Reverse-Engineering Malware (SANS)
  • Managing Successful Programmes (MSP) Practitioner, 2014
  • Introduction to Business Process Re-engineering Workshop
  • Live Hacking & Information Security Masterclass
  • Self-Discovery Leadership
  • EC-Council Certified Security Analyst (ECSA), 2013
  • Certified Ethical Hacker (CEH), 2013
  • Project Management Professional (PMP)
     

Topics: Cybersecurity

You may also like the following: