Tags
Language
Tags
May 2025
Su Mo Tu We Th Fr Sa
27 28 29 30 1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Assessing And Protecting Industrial Control Systems

    Posted By: ELK1nG
    Assessing And Protecting Industrial Control Systems

    Assessing And Protecting Industrial Control Systems
    Published 4/2024
    MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
    Language: English | Size: 2.37 GB | Duration: 3h 35m

    Empowering You to Navigate the OT Landscape: Keystone Actions for Robust Industrial Control Systems Security

    What you'll learn

    Assessing a simulated cookie factory with real pentesting tools

    Creating cyber threat scenarios using various frameworks and defining protection meausrements

    Building a free open source virtual lab environment

    NO exploiting or pwning, the focus is on understanding the challenges of an OT production environment

    Requirements

    Windows system with 8GB RAM and virtualization enabled

    Basic knowledge or interest in industrial process automation

    No licenses needed. All tools are open source!

    Completion of the previous course is optional

    Description

    Gain practical, hands-on experience in securing OT environments through simulated exercises and real-world scenarios. Learn from an expert with extensive experience, providing valuable insights and guidance throughout the course. Elevate your defensive OT skills to the next level.Join now and step into the exciting world of OT security! In this comprehensive course, you will embark on a mission to assess and protect the infrastructure of Joy Cookie Factory as it prepares to transition its entire shop floor online. Unlike previous courses, we prioritize understanding the environment in which OT devices operate, recognizing threats, and implementing effective onboard protection techniques to fortify these devices against cyber threats.In this course, you'll dive into the essentials of OT security, focusing on practical skills and actionable strategies. Whether you're a newcomer to the field or a seasoned professional, this course will empower you to safeguard OT environments effectively.Gain a comprehensive understanding of the ecosystem in which OT devices operate, enabling you to identify potential vulnerabilities and threats. Learn how to create a thorough OT asset inventory and assess devices for common vulnerabilities, laying the groundwork for robust security measures. Acquire essential skills and techniques to fortify your OT environment against attacks, utilizing onboard resources and a firewall without relying on expensive detection and response tools.While participation in the predecessor course, Practical Industrial Control System Penetration Testing, is optional, it is highly recommended. Both courses together provide a holistic understanding of OT device vulnerabilities and their operating environments, setting you up for success in securing OT systems effectively.The core exercise of this course revolves around a simulated OT network of a cookie factory, offering hands-on experience in creating an OT asset inventory and assessing devices for vulnerabilities. Through practical exercises and real-world scenarios, you'll develop the skills needed to defend OT environments effectively.Enroll today and take the first step towards mastering the art of defending industrial control systems. Equip yourself with the knowledge and skills needed to safeguard critical infrastructure and protect against evolving cyber threats. Don't miss out on this opportunity to advance your career and make a tangible impact in the world of OT security. Join us now and embark on a journey towards a more secure future!

    Overview

    Section 1: Welcome to the Course!

    Lecture 1 Introduction

    Lecture 2 Contrasting IT and OT

    Lecture 3 Pentest Classifications of ICS/OT Systems

    Lecture 4 ICS/OT Devices are Easy Targets

    Lecture 5 Reviewing the Industrial Attack Landscape

    Lecture 6 OT OSINT Techniques you can try for yourself

    Lecture 7 Summary

    Section 2: Setting Up Your ICS/OT Lab

    Lecture 8 Introduction to Setting Up Your ICS/OT Lab

    Lecture 9 Understanding Virtualization and Virtual Machines

    Lecture 10 Installation of VirtualBox

    Lecture 11 Installing the Kali Linux VM and downloading additional nmap scripts

    Lecture 12 Installing the Ubuntu Desktop VM

    Lecture 13 Running the install script to get the course materials

    Lecture 14 Setting up the HostOnly network

    Lecture 15 Summary of Setting Up Your ICS/OT Lab

    Section 3: Practical Refresher

    Lecture 16 Introduction to Practical Refresher

    Lecture 17 Setup the VM, Start the S7-300 Emulation and Excercise Tasks

    Lecture 18 Recap Netdiscover, Nmap, Nmap NSE (Spoiler Free)

    Lecture 19 Step by Step Excercise Solution: S7-300 Recon, Enum and Assessment

    Lecture 20 Report Writing with ChatGPT

    Lecture 21 Summary of Practical Refresher

    Section 4: Preparing the Assessment

    Lecture 22 Introduction to Preparing the Assessment

    Lecture 23 Setting the Stage: Crumbs of Joy Cookie Factory and getting to know their OT

    Lecture 24 The Penetration Testing Agreement

    Lecture 25 Your Asset Inventory Template

    Lecture 26 Migrating the Client's Data into our Asset Inventory

    Lecture 27 Create a Network Topology from Scratch with draw.io

    Lecture 28 Summary of Preparing the Assessment

    Section 5: OT Network Assessment

    Lecture 29 Introduction to OT Network Assessment

    Lecture 30 Performing a Layer 2 Asset Discovery - Task

    Lecture 31 Performing a Layer 2 Asset Discovery - Solution

    Lecture 32 Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - Task

    Lecture 33 Marking OT Devices as Safe to Scan with a Layer 3 ICMP Scan - Solution

    Lecture 34 Scanning the OT Network for Open Ports with Nmap - Task

    Lecture 35 Scanning the OT Network for Open Ports with Nmap - Solution

    Lecture 36 Summary of OT Network Assessment

    Section 6: PLC Assessment

    Lecture 37 Introduction to PLC Assessment

    Lecture 38 Setting up the PLC Emulation and Task

    Lecture 39 Scanning for Open Ports and Probing the Industrial Protocol with Nmap - Solution

    Lecture 40 Assessing the PLC's Exposed Webserver - Solution

    Lecture 41 Summary of PLC Assessment

    Section 7: Human-Machine-Interface Assessment

    Lecture 42 Introduction to Human-Machine-Interface Assessment

    Lecture 43 Setting up the HMI Emulation and Task

    Lecture 44 Scanning for Open Ports with Nmap - Solution

    Lecture 45 Assessing the HMI's Remote Access Services - Solution

    Lecture 46 Summary of Human-Machine-Interface Assessment and Bonus

    Section 8: Summarizing the Findings and Reporting

    Lecture 47 Introduction to Summarizing the Findings and Reporting

    Lecture 48 Update the Network Topology - Task

    Lecture 49 Update the Network Topology - Solution

    Lecture 50 Discovering Undocumented Network Hosts

    Lecture 51 Critical Findings: OT Network Architecture, Remote Access, PLC, HMI

    Lecture 52 Summarizing Key-Findings in an Dashboard

    Lecture 53 Reporting the Findings with ChatGPT

    Lecture 54 Summary of Summarizing the Findings and Reporting

    Section 9: Risk Assessment and Threat Modelling

    Lecture 55 Introduction to Risk Assessment and Threat Modelling

    Lecture 56 Risks of a Flat OT Network Architecture

    Lecture 57 Risks of VPN Remote Access Router

    Lecture 58 Security Maturity Levels as in IEC/ISA 62443

    Lecture 59 Introduction to the ICS ATT&CK Framework

    Lecture 60 Understanding common used techniques by creating a heatmap in ATT&CK

    Lecture 61 Developing a Threat Scenario on the PLC and HMI using ATT&CK - Task

    Lecture 62 Developing a Threat Scenario on the PLC and HMI using ATT&CK - Solution

    Lecture 63 Mitigating Threats using the ATT&CK Mitigation Recommendations

    Lecture 64 Developing a Threat Scenario using HAZOP and Dynamical Systems Theory

    Lecture 65 Developing a Threat Scenario using the Use Case Abuse Model (OT Thought Model)

    Lecture 66 Adding Identified Risks to the Report

    Lecture 67 Summary of Risk Assessment and Threat Modelling

    Section 10: Protection Techniques

    Lecture 68 Introduction to Protection Techniques

    Lecture 69 The Purdue Reference Model and the Automation Pyramid

    Lecture 70 Defense in Depth Model

    Lecture 71 System Hardening of the PLC

    Lecture 72 System Hardening of the HMI and Secure HMI Screen Design

    Lecture 73 System Hardening vs Threat Scenario in ICS ATT&CK

    Lecture 74 Reducing the Risks of a Flat OT Network with Network Segmentation

    Lecture 75 Best Practises for Secure Remote Access

    Lecture 76 Remote Access via Jump Host

    Lecture 77 Attack Surface Reduction with Secure Coding

    Lecture 78 Adding Mitigation Recommendations to the Report

    Lecture 79 Summary of Protection Techniques

    Section 11: Connecting the IT and OT Worlds

    Lecture 80 Introduction to Connecting the IT and OT Worlds

    Lecture 81 Understanding the Workforce of the OT Side

    Lecture 82 Analytical and Narrative Persuation

    Lecture 83 Evolution of OT Devices

    Lecture 84 Summary of Connecting the IT and OT Worlds

    Lecture 85 Thank You, Closing Thoughts and Free ICS/OT Security Ressources

    People who are curious about methods to assess and strengthen the cybersecurity posture of an OT environment.,Participants of Practical Industrial Control System Penetration Testing,IT Professionals,Automation Experts