ICS/SCADA

Cybersecurity and industrial compliance
Level IV - Specialist

Course Description

The EC-Council ICS/SCADA Cybersecurity program is designed to address the unique security challenges of industrial control systems (ICS) and operational technology (OT). It provides hands-on training for professionals working with critical infrastructure systems, such as SCADA, DCS, and PLCs. Participants will gain practical knowledge in identifying and mitigating vulnerabilities specific to ICS networks, learning both offensive and defensive cybersecurity techniques tailored to OT environments. The course also covers securing communication protocols and managing legacy technologies commonly found in industrial settings. Real-world attack simulations are incorporated to help learners understand the threats that ICS systems face. Additionally, the program introduces essential compliance standards, including NIST and IEC 62443. By the end of the training, participants will be fully equipped to safeguard critical systems against modern cyber threats.

Who Should Attend

This training is intended for professionals involved in securing and managing industrial control systems and critical infrastructure. It is particularly relevant for individuals in the following roles:

  • Industrial Control System (ICS) Engineers
  • SCADA System Administrators
  • OT (Operational Technology) Security Professionals
  • Cybersecurity Analysts working in industrial sectors
  • Penetration Testers and Red Teamers focused on ICS/SCADA environments
  • Infrastructure and Utility Operators
  • Plant IT Staff managing hybrid IT/OT networks
  • Compliance Officers in critical infrastructure sectors

ICS/SCADA Course

  • Module 01: Introduction to ICS/SCADA Network Defense
  • Module 02: TCP/IP 101
  • Module 03: Introduction to Hacking
  • Module 04: Vulnerability Management
  • Module 05: Standards and Regulations for Cybersecurity
  • Module 06: Securing the ICS Network
  • Module 07: Bridging the Air Gap
  • Module 08: Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS)