ICS/SCADA Cyber Security
- 02 Aprile 2025
- Duration 24 weeks
- 01 June 2026
- Duration: 36 weeks
Protect industrial control systems and critical infrastructure with ICS/SCADA Cyber Security certification
As an Authorized Training Center of EC-Council, we deliver official ICS/SCADA training and certification designed to equip professionals with the expertise to secure operational technology (OT), defend critical infrastructure, and mitigate evolving industrial cyber threats
Key features & benefits
24 hours of immersive training with real-world ICS/SCADA attack and defense simulations
Hands-on labs with simulated industrial environments covering power, energy, water, and manufacturing sectors
Learn to identify and mitigate threats targeting PLCs, RTUs, HMIs, and other industrial devices
Gain expertise in securing operational technology (OT) and integrating it with IT security controls
Understand industrial communication protocols (Modbus, DNP3, IEC 60870-5-104) and their vulnerabilities
Build skills in incident detection, response, and forensic investigation in ICS/SCADA environments
Accredited and recognized globally by EC-Council with strong industry validation
Develop practical, job-ready expertise to protect critical infrastructure against cyberattacks
Course outline
Module 01
Introduction to ICS/SCADA network defense
Introduction to ICS/SCADA network defense
LAB: Security model
IT security model
ICS/SCADA security model
Lab: Allowing a service
- Security posture risk
- Management in ICS/SCADA
- Risk assessment
- Defining types of risk
Module 02
TCP/IP 101
TCP/IP 101
Introduction and overview
Introducing TCP/IP networks
Internet RFCs and STDs
TCP/IP protocol architecture
Protocol layering concepts
TCP/IP layering
Components of TCP/IP networks
ICS/SCADA protocols
Module 03
Introduction to hacking
Introduction to hacking
Review of the hacking process
Hacking methodology
Intelligence gathering
Footprinting
Scanning
Enumeration
Identify vulnerabilities
Exploitation
Covering tracks
Lab: Hacking ICS/SCADA networks protocols
- How ICS/SCADA are targeted
- Study of ICS/SCADA attacks
- ICS/SCADA as a high–value target
- Attack methodologies in ICS
Module 04
Vulnerability management
Vulnerability management
Challenges of vulnerability assessment
System vulnerabilities
Desktop vulnerabilities
ICS/SCADA vulnerabilities
Interpreting advisory notices
CVE
ICS/SCADA vulnerability sites
Life cycle of a vulnerability and exploit
Challenges of zero-day vulnerability
Exploitation of a vulnerability
Vulnerability scanners
ICS/SCADA vulnerability uniqueness
Challenges of vulnerability management within ICS/SCADA
Lab: Vulnerability assessment
- Prioritizing vulnerabilities
- CVSS
- OVAL
Module 05
Standards and regulations for cybersecurity
Standards and regulations for cybersecurity
ISO 27001
ICS/SCADA
NERC CIP
CFATS
ISA99
IEC 62443
NIST SP 800-82
Module 06
Securing the ICS network
Securing the ICS network
Physical security
Establishing policy – ISO roadmap
Securing the protocols unique to the ICS
Performing a vulnerability assessment
Selecting and applying controls to mitigate risk
Monitoring
Mitigating the risk of legacy machines
Module 07
Bridging the air gap
Bridging the air gap
Do you really want to do this?
Advantages and disadvantages
Guard
Data diode
Next generation firewalls
Module 08
Introduction to intrusion detection systems (IDS) and intrusion prevention systems (IPS)
Introduction to intrusion detection systems (IDS) and intrusion prevention systems (IPS)
What IDS can and cannot do
Types IDS
Network
Host
Network node
Advantages of IDS
Limitations of IDS
Stealthing the IDS
Detecting intrusions
Our partners & vendors







Ready to grow your cybersecurity team?
Training prerequisites
Core knowledge
Basic understanding of computer networks and TCP/IP protocols
Familiarity with information security concepts and common cyber threats
Awareness of industrial control systems (ICS) and supervisory control and data acquisition (SCADA) basics
Technical skills
Ability to use common security tools (e.g., Wireshark, nmap) for basic reconnaissance and analysis
Experience with vulnerability assessment and security controls at an introductory level
Familiarity with incident response fundamentals and system monitoring
OS & tools
Comfortable working with Windows and Linux operating systems
Basic skills with command-line utilities and log analysis
Understanding of industrial protocols (Modbus, DNP3, IEC 60870-5-104) is beneficial but not mandatory
Training & register details
TRAINING OVERVIEW
ICS/SCADA Cyber Security
Protect industrial control systems and SCADA environments with hands-on training in defense strategies and cyber resilience

Training Duration: 3 days (24 hours)

Format: Instructor-Led Online

Level: Intermediate

Language: Ukrainian

Materials: English | 24 months valid

Labs: 24/7 180 days access

Exam Attempts: 1 official exam voucher included
HOW TO REGISTER
1. Submit your application
Submit a quick application to let us know you’re interested in the course.
2. Intro call
We’ll schedule a short call to learn more about your goals and expectations.
3. Confirm your spot
Get accepted and complete the paperwork. We’ll send you all the info you need.
4. Start learning
Access your learning platform and get familiar with the materials.
5. Join the community
Get access to the student chat, events, and mentorship opportunities.
Who is ICS/SCADA Cyber Security for?
Cybersecurity professionals
Advance your career by mastering ICS/SCADA defense skills and gaining the expertise to protect critical infrastructures
Teams & businesses
Strengthen your organization’s resilience with specialists trained to secure industrial environments and respond to real-world threats.
Government & defense
Trusted globally by agencies and defense bodies for building strong cyber defense capabilities in critical national infrastructure
Educators
Incorporate official ICS/SCADA training into academic and corporate programs to prepare experts for securing industrial control systems
FAQ
What is ICS/SCADA cybersecurity?
ICS/SCADA cybersecurity focuses on protecting industrial control systems and supervisory control and data acquisition environments from cyber threats that can disrupt critical infrastructure like energy, water, transportation, and manufacturing.
Who should take this course?
The course is ideal for cybersecurity professionals, SOC analysts, engineers, IT and OT specialists, government and defense staff, and anyone responsible for securing critical infrastructure.
Are there prerequisites for enrollment?
Yes. A basic understanding of computer networks, operating systems, and cybersecurity fundamentals is recommended. Familiarity with TCP/IP, ICS/SCADA protocols, and common security tools will be helpful.
How long is the training?
The official training is delivered over 3 days (24 hours) of intensive instructor-led sessions, with access to labs and course materials for extended practice.
What hands-on experience will I get?
You’ll practice in real-world simulated environments, working with industrial protocols, intrusion detection systems (IDS/IPS), vulnerability management, and secure configurations for ICS networks.
Is the certification globally recognized?
Yes. The course and certification are delivered under EC-Council standards and are recognized internationally as proof of specialized expertise in ICS/SCADA cybersecurity.
What career opportunities does this course open?
Graduates can work in roles such as ICS/SCADA Security Specialist, Critical Infrastructure Security Analyst, SOC Analyst for OT environments, Cybersecurity Engineer, and consultant for industrial sectors.
Do I receive access to labs after the course?
Yes. Students are granted 180 days of extended 24/7 virtual lab access for continued practice after completing the training.
