IT to OT Security

IT to OT Security

IT to OT Security
Jun 02nd, 2018 | Saturday, 9am to 6pm, Reston VA & OnLine     


 


Industrial Control Systems (ICS) operate the technology needed for our Critical Infrastructures such as Transportation, Manufacturing. Etc. This class brings students closer to understanding the security implication of OT Security. Though not a pre-requisite, we recommend leveraging our OnRamp to IT security offering to get most out of this class. The AWS Security class will also add value to this class during hands on exercises.



This course will help you in understanding the security at high level and to gain your confidence in securing the AWS environment interspersed with labs on the main topics.


Course Advisor


Srinivasa Kasturi is an expert in the IT industry with a Masters Degree in Computer Engineering from Villanova University and certifications such as CISSP (Certified Information Systems Security Professional), ISSAP(Information Systems Security Architecture Professional) , CSSLP(07-17) (certified Secure Software Lifecycle Professional), TOGAF(03-09), CCSK(Certificate of Cloud Security Knowledge), PMP (Project Management Professional); as well as about twenty five years of experience with network architectures, processes, Conducting thorough risk assessments, providing incident response, and last but not least Cloud Enterprise Security Strategy



The Offering

Individuals

Business

  • RapidLearn BootCamp
  • Experience Heavy (Hands-On)
  • WeekEnd Class (Saturday 9am-6pm)
  • WeekDay Evenings (Mon, Tue, Thu 7pm-10pm)
  • Enhance Job Performance / Support Career Changes
  • InPerson (Reston, VA), and OnLine
  • Instructor-Lead and OnLine
  • Experience Heavy (Hands On)
  • Custom Dates for Businesses
  • Custom Timings for Businesses
  • Enhance Job Performance
  • Business OnSite Option

Who should take this training?

IT Security Admins, IT Auditors, IT Project Manager, Software Professionals, Security Testers, IT Monitoring Personnel, programmers, developers, web app developers, folks in Critical Infrastructure industries e.g. Electric Power, Oil & Gas, Chemical, Water and other such industries.


Developers, Account Managers, Procurement Managers, Contract Managers, Project Managers, Technical Writers, Customer Service/Relations, Business Analysts, and Sales Representatives.


Looking to start a new exciting career path? CyberForce helps you with valued information to succeed in any technology field!



Key Features / Highlights

60% Interactive Learning Material

Online or InPerson

Work with real tools of the trade!

Learn ICS security fundamentals.

Coding/Development with Python

Learn How to spot certain attacks.

Instructor Led with 25+ years experience.


Course Description

Industrial Control Systems (ICS) operate the technology needed for our Critical Infrastructures such as Transportation, Manufacturing. Etc. This class brings students closer to understanding the security implication of OT Security. Though not a pre-requisite, we recommend leveraging our OnRamp to IT security offering to get most out of this class. The AWS Security class will also add value to this class during hands on exercises.


Skill(s) Learned / Enhanced

Learn how to efficiently create a ICS based infrastructure and how to secure it. All the while enhancing your ability to manage and understand what happens in a cloud based network architecture.


What do I learn?

Learn about the ICS security challenges, as well as learning best practices to ensure your organization limits its vulnerabilities during phases of the development lifecycle.



Course Preview

CyberForce’s AWS Bootcamp is a hands-on heavy course that combines hands on interactive learning modules with a knowledgeable instructor with more than ten years of experience in IT, Cybersecurity (including ICS), and Cloud Systems.


Industrial Control Systems (ICS) operate the technology needed for our Critical Infrastructures such as Transportation, Manufacturing. Etc. This class brings students closer to understanding the security implication of OT Security. Though not a pre-requisite, we recommend leveraging our OnRamp to IT security offering to get most out of this class. The AWS Security class will also add value to this class during hands on exercises.


Module 1

In our first module we will discuss the key differences between IT and OT in terms of function and security. After we have identified the major differences we will introduce you to the IEC62443 standard and the Purdue Reference Model, both of which act as a guideline for merging your enterprise and industrial networks, while minimizing the risk of vulnerabilities. Then we will introduce you to the Department of Homeland Security’s Cyber Security Evaluation Tool (often reffered to as CSET).


Module 2

In module two we will introduce you to Programmable Logic Controllers, ladder logic, and common OT protocols. Once we have become familiar with how PLC’s work and their components, we will walk you through the setup of a Siemens S7 12007 PLC. Once it is operational we will then walk you through the installation of the S7/TIA software.


Module 3

In module three we will discuss what possible security flaws may have been created in the setup module. We will also discuss common security concerns that are unique to OT and PLC’s in general, including inventory development, identity issues, password management, patch management, network footprint, logs and log aggregation, etc. After discussion we will attempt to look at what we set up in module 2 and audit it for the above concerns.


Module 4

In our next activity we will discuss the protocols and other factors that allow devices in an OT system to communicate. You will learn about the Internet of Things and Industrial Internet of Things (IoT&IIoT). You will then get devices such as a fan, light, sensor, or actuator programmed and communicating with our Siemens PLC and demonstrate how Modbus enables the devices to communicate. We will then explore the internet accessibility of the PLC and see how the IoT adds a new challenge to security.


Module 5

Now that we understand the concepts of OT, we will look at how vulnerabilities are exploited and thwarted in the Industrial Controls Systems sector. First we will start by conducting a simple Denial of Service attack on a PLC using OWASP Zed Attack Proxy to shut it down with a flood of HTTP requests, next we Will show you how to use the Python programming language to create a simple yet crippling attack on the Modbus protocol of the PLC, and last but not least we will learn about using NMAP to conduct a port scan on the PLC.


Module 6

Now that we know how to force our way into OT networks and wreak havoc, we will so you how to prevent attacks and stay up to date on vulnerabilities in the ever changing landscape of Critical Infrastructure. We will start by introducing you to Intrusion Detection and Intrusion Prevention systems and how they work, next we will set up an actual Intrusion Detection System from Radiflow.


Once the IDS is working we will gather some network traffic data and transfer it to the NSA’s GrassMarlin tool and analyze traffic and identify network assets. Once a comprehensive set of data has been gathered we will then conduct an asset based cybersecurity assessment using the DHS’ Cyber Security Evaluation Tool.


Next you will become familiar with NERC and CIP controls that dictate necessary security measures for Industrial Control Systems. You will then learn about some cool tools such as Splunk which can provide near-real time continuous network monitoring.



Certificate

CyberForce offers Certificates that confirm your successful completion and attendance to notify your current or potential employers of your enhanced skills and ability.


Our courses will help you achieve your career goals whether it is transitioning to the technology field, or just learning about some of the developments in a field with which you are already familiar.



Pre-requisites

Not enough experience for CISSP? GICSP? Can’t Become a Certified Ethical Hacker yet? Not to worry, Cyberforce is one of the only cybawsersecurity training companies that does not penalize you or turn you down due to inexperience. CyberForce is inclusive of everyone from every career path, and every age group. It doesn’t matter if you have never used a computer, or if you have been in tech for years! We want to see you succeed!


If you have taken our IT OnRamp Security or IT Security Career RapidStart BootCamps, it would be helpful.


All you need is:

A laptop

Notebook and pen for notes

Your desire to learn and excel in the technology field


FAQS

Trainer(s)

Our courses are instructor led by Srinivasa Kasturi who has over twenty five years of experience in IT, Cybersecurity, and Cloud Systems.


What equipment do I need to take the course?

A laptop

Notebook and pen for notes

Your desire to learn and excel in the technology field


Do I get Coffee & Tea if I take the class InPerson?

Bottled water and freshly brewed coffee are available as well as lunch.


Is this live InPerson training?

We do offer live in person training at our headquarters in Reston Virginia, as well as live on-site training for businesses.


Is it live OnLine Training?

We do offer live online training for our remote attendees.