An in-depth course examining the fundamentals of the ICS/SCADA Domain.
120 Hours
Blue Team
120 Hours
Blue Team


The industrial control system environment is different from the IT world. A working understanding of the Industrialized world and technologies is now a must for IT/OT cyber professionals.

The course covers the following topics:


It’s important to improve the accordion’s behaviour

Getting Started
  • Introduction to industrial Control Systems
  • Impetus of ICS Protection
  • Evolution of ICS
  • ICS Architecture
  • Types of PLC’s
  • Types of HMI’s
  • Types of Historians
  • Importance of HMI’s and PLC’s
  • HMI Role in the ICS Environment
  • HMI Architecture
  • Importance of the Historian DB’s
  • Historian Role in the ICS Environment
  • Historian Architecture
  • ICS Communications and protocols
  • ICS Communication methods
  • Protocols
  • Protocol Based Vulnerabilities
  • Security Best practices for ICS
  • Introduction to Security Policies for ICS
ICS Attack and defence
  • Introduction to ICS Cyber Threats
  • Overview to ICS Cyber Threats
  • Categorisation of vulnerabilities in different critical infrastructure environments
  • Security difference between IT and ICS
  • Source of ICS Vulnerabilities
  • Attack Vectors in ICS environments
  • Cyber-Threats automation systems
  • Attack vectors in Automation
  • Consequences of ICS Attacks
  • Cyber-threats in ICS Protocols
  • In-Depth ICS Protocols
  • Interception of ICS communication Protocols
  • Cyber-Threats in ICS historian vulnerabilities
  • HMI vulnerabilities and OPC
  • Protection of Historian Platforms
  • A Study of Platform vulnerability in ICS Infrastructure
  • Awareness & Protection of ICS Environment
  • Physical protection aspects of Industrial network
  • Best Practices for Protecting ICS Environment
Protecting ICS Environment
  • ICS Incident Response Plan
  • 7-Stages Incident Response Plan
  • Overview of Available Protection Tools
  • Steps of Securing ICS Platform
  • Incident Prevention
  • Risk Management and Analysis
  • SCADA Security Policy Framework
  • Introduction to Incident Prevention
  • Exploration of Industrial Detection Tool and Mechanism
  • Security Defense Investigation
  • Managing Security Incident for ICS
  • ICS Security Checklist
  • Post Incident Forensics
  • Summary Exercise
Don't touch this tab

About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.

The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.

CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.

The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.

    • IT & Cyber professionals
    • ICS/SCADA professionals
    • CIRT in ICS sites
    • Previous knowledge or certification in:
    • Information Security
    • Ethical Hacking
    • Communications and networking
    • Operating systems
    • Understanding of the ICS/SCADA domain with hands-on experience on a physical kit
    • Understanding the key differences between the IT and the OT environments
    • Gaining knowledge on the cyber threats, risks, attacks, and defenses in the ICS world
    • Learning how to detect, respond, and prevent cyber incidents and risks in the ICS environment