Just Added

Introduction to ICS/SCADA Cybersecurity Workshop by EC-Council

  • Ages 18+

Learn how to protect ICS and SCADA networks from cyber threats at EC-Council's hands-on workshop at the ICS/SCADA Cybersecurity Symposium!

By EC-Council

Date and time

Monday, June 2 · 9am - 5pm CDT

Location

205 W Wacker Dr

205 West Wacker Drive Chicago, IL 60606

Refund Policy

Refunds up to 1 day before event

About this event

  • Event lasts 8 hours
  • Ages 18+

Welcome to the Introduction to ICS/SCADA Cybersecurity Workshop by EC-Council! Join us for an interactive session where you'll learn all about securing Industrial Control Systems and Supervisory Control and Data Acquisition systems. Workshop participants receive a 20% discount towards the ICS/SCADA Cybersecurity Symposium 2025!

Instructor: Kevin Cardwell

Workshop Agenda

Overview of ICS/SCADA Systems
What are ICS/SCADA systems?
Common components: PLCs, RTUs, HMIs, etc.
Industrial protocols: Modbus, DNP3, IEC 61850
Differences between IT and OT environments
Standards & Regulations (NIST 800-82, IEC 62443, NERC CIP)

Hands-On:
Network scanning & asset discovery in a simulated ICS environment

Cybersecurity Challenges in ICS/SCADA
Unique vulnerabilities and attack vectors
Consequences of cyberattacks on critical infrastructure
Attack techniques (MITRE ATT&CK for ICS)
Case studies: Stuxnet, Triton, Industroyer

Hands-On:
Traffic capture & analysis using Wireshark

ICS Network Security & Segmentation
Implementing DMZs and security zones best practices
Configuring firewalls
Intrusion Detection & Prevention in ICS/SCADA

Hands-On:
Configuring an ICS firewall & network segmentation
Setting up and configuring IDS/IPS for ICS protocols
Analyzing network traffic for anomalies
Demonstrating the detection of common ICS attacks

Hands-On:
Log analysis & detecting unauthorized Modbus commands

Protocol Analysis and Monitoring
Using Wireshark or similar tools to capture and analyze ICS protocol traffic
Identifying suspicious communication patterns
Setting up alerts for specific protocol events
Intrusion Detection & Prevention in ICS/SCADA
Defending against unauthorized access

Hands-On:
Deploying Snort/Suricata for ICS network monitoring

Securing ICS/SCADA Environments
Hardening ICS devices & protocols
Securing PLCs
Risk assessment & resilience planning

Hands-On:
Securing ICS endpoints

Incident Response and Recovery
Developing incident response procedures
Communication and coordination
Incident response framework for ICS breaches
Log analysis & anomaly detection

Hands-On:
Investigating an ICS breach scenario


Register now to secure your spot!

Organized by

EC-Council is a member-based organization that certifies individuals in cyber security and e-commerce. It is the owner and developer of 20 security certifications, including Certified Ethical Hacker (CEH), Computer Hacking Forensics Investigator (CHFI) and Certified Security Analyst /Licensed Penetration Tester (ECSA/LPT). EC-Council has trained over 90,000 security professionals and certified more than 40,000 members. EC-Council’s certification programs are offered by over 450 training centers across 87 countries. These certifications are recognized worldwide and have received endorsements from various government agencies including the U.S. Department of Defense via DoD 8570.01-M, the Montgomery GI Bill, National Security Agency (NSA) and the Committee on National Security Systems (CNSS). EC-Council also operates EC-Council University and the global series of Hacker Halted information security conferences. The global organization is headquartered in Albuquerque, New Mexico. 

$149