Cybersecurity Industrial Control Systems Engineer | SGInnovate





Cybersecurity Industrial Control Systems Engineer

Presented by SGInnovate, Tegasus International & ST Engineering

Specially curated with Tegasus International and ST Engineering Cybersecurity Academy, SGInnovate presents a full spectrum of Cybersecurity Workshops in Operational Technology (OT) designed to get you and your organisation ready for impending security threats and vulnerabilities.

These OT courses are structured to align with the key pillars of the Singapore Cybersecurity Strategy and will be tailored to the needs of those working the in the 11 Critical Information Infrastructure (CII) sectors in Singapore.

In this 3-days' workshop, you will have a deeper understanding into the OT Cybersecurity ecosystem with concepts covering embedded systems, protocols fundamentals, known vulnerabilities discovery, forensic investigation and process exploitation. You will also learn about threats and cyber risks to Industrial Control Systems (ICS) as well as the different types and stages of a cyber-attack.

Through the span of 3 days, there will be emphasis on real world use cases and examples, hands-on applications and exercises that are incorporated with realistic scenarios built around operational cyber physical testbeds.

By the end of the course, you will be able to recognise the symptoms of an attack and use tools and techniques to investigate possible breaches into ICS and be able to demonstrate a multitude of cybersecurity techniques including vulnerability assessments, sensor disruption and defence in-depth.

Workshop Overview:
In this course, participants will learn:

  • Basic Cyber Physical Systems (CPS)
  • Cyber risks and security vulnerabilities in CPS
  • Process Control exploitation
  • Basic networking concepts necessary for active and passive network discovery
  • Network attacks and exploits: different stages of an attack
  • Network defence and incident response

Recommended Prerequisites:

  • Basic understanding of industrial control system, cyber physical system or operational technology
  • Recommended for individual in the cybersecurity space for at least 2 years or possess a strong interest in understanding Operational Technology (OT) cyber security for their organisation would be encouraged

Still interested in the workshop? Leave your details below and we will contact you when it's available again.

Day 1 (17 February 2020)

Overview of Cyber Physical Systems (CPS)

Basic cyber physical systems

  • Overview of cyber physical systems: Industrial Control Systems (ICS) with communication network
  • ICS basic including data flow and protocol
  • Hands-on Exercise

Cyber Risk and Security Vulnerabilities in CPS

  • Cyber risks to ICS
  • Threat trends for control systems
  • Security Topics: Information Technology (IT) vs Operational Technology (OT)
  • Common vulnerabilities for control systems
  • Case Studies: Real-life cyber attacks
  • Demonstration

Process Control Exploitation

  • Overview of the SWaT architecture and a demonstration of the network layout
  • Static multiple point attacker paths and model
  • Demonstration

IT and OT Networks Discovery

Basic Networking Concepts

  • IP address and basic networking
  • NEY and IANA
  • OSI 7-layer model
  • Address Resolution Protocol (ARP), Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Internet Control Message Protocol (ICMP)
  • Protocol characteristics and relevant threats

Passive Discovery

  • Passive discovery vs active discovery
  • Intelligence gathering tools
  • Tools and techniques for passive discovery
  • Hands-on exercise

Day 2 (18 February 2020)

IT and OT Networks Discovery

Active Discovery

  • Nmap 
  • Host Discovery in IT and OT
  • Port scanning and states in IT and OT
  • ICS challenges
  • Introduction to Nessus (vulnerability scanner)
  • Introduction to OpenCAS (Open Vulnerability Assessment System)
  • Exercise

CPS and Network Attacks and Exploits

Discuss the different stages of attacks

  • Attacker profiles, attack stages, tasks and consideration
  • System vulnerabilities and software vulnerability 
  • National vulnerability database CVSS
  • Exploit types 
  • Attack operations
  • Bypass network controls
  • Hands-on exercise

CPS Attack Surface

  • Metasploit framework
  • Basic exploit process
  • Meterpreter: Useful commands
  • Hands-on exercise

Day 3 (19 February 2020)

Network Defence and Incident Response

CPS Attack Surface

  • Hands-on exercise: Armitage on IT and OT Networks

Security Monitoring and Incident Response

  • Understanding defence-in-depth
  • Intrusion detection/protection system
  • Signature vs anomaly detection
  • Intrusion Prevention Systems (IPS) vs Intrusion Detection Systems (IDS)
  • Incident response plan for CPS 
  • Hands-on exercise 
  • Assessment

S$2,568/pax (before GST)

Ivan Lee, Co-founder, Tegasus International

Across the globe, Ivan works with various strategic partners such as the NATO Cooperative Cyber Defence Centre of Excellence, US Department of Homeland Security ICS-CERT Idaho National Laboratory and local government agencies on key initiatives and training programmes.

He started his career with Accenture, global top IT consulting MNC company and has assumed various tech-management roles in the telecommunication, cGMP and Operational Technology sectors regionally. He is the Deputy Director, Cyber Security Technologies of iTrust, Centre for Research in Cyber Security that was established by Ministry of Defence and Singapore University of Technology and Design.

He is also a SUTD Academy Fellow and a member of the Coordinating Committee for Cybersecurity (CCCY) Subcommittee for Critical Information Infrastructure (CII).

He has attended various professional training courses and acquired certifications as listed below:

  • Certified Information Systems Security Professional (CISSP)
  • US Department of Homeland Security ICS-CERT Industrial Control Systems (ICS) Cybersecurity (301)
  • Advanced Penetration Testing, Exploit Writing, Ethical Hacking (SANS)
  • Advanced Course on Darknet and Cryptocurrencies
  • Hands-on Hardware Hacking and Reverse Engineering (Blackhat 2015)
  • Cybersecurity: Technology, Application and Policy (MIT Digital Program)
  • FORENSICS: Reverse-Engineering Malware (SANS)
  • Managing Successful Programmes (MSP) Practitioner, 2014
  • Introduction to Business Process Re-engineering Workshop
  • Live Hacking & Information Security Masterclass
  • Self-Discovery Leadership
  • EC-Council Certified Security Analyst (ECSA), 2013
  • Certified Ethical Hacker (CEH), 2013
  • Project Management Professional (PMP)

Topics: Cybersecurity

You may also like the following: