$1,750 – $2,500

ThreatGEN Red vs. Blue: Practical ICS Cybersecurity Training Series

Event Information

Share this event

Date and Time

Location

Location

Marriott Sugarland Town Square

16090 City Walk

Sugar Land, TX 77479

View Map

Refund Policy

Refund Policy

Contact the organizer to request a refund.

Eventbrite's fee is nonrefundable.

Event description
The revolutionary new way to learn the practical skills needed to secure ICS, including red team tactics, vulnerability assessment, and more

About this Event

This 4 day class includes the following ThreatGEN Red vs. Blue classes:

  • TGICS 101: Introduction to Industrial Cybersecurity
  • TGICS 201: Industrial Cyber Risk Assessment
  • TGICS 301: Introduction to ICS Penetration Testing
  • TGICS 321: Intermediate ICS Penetration Testing

ThreatGEN™ Red vs. Blue: Practical Industrial Cybersecurity Training Series

Defending ICS networks and assets requires more than any single solution and it’s not a just matter of deploying “best practices” and “layered defense”. A necessary combination of proactive and reactive strategies such as vulnerability assessments, network segmentation, system hardening and threat monitoring, just to name a few, are needed. However, most organizations are often limited in their ability to deploy even the most basic security controls due to lack of required skills.

With cutting-edge technology, combined with proven methods and an innovative and modernized approach, ThreatGEN™ is the revolutionary new and entertaining way to learn practical and effective industrial cybersecurity and risk management skills, from beginner to technical.

Whether you need security skills training, want to learn how to build an entire industrial cyber risk management program, or just want to learn how to build a cost-effective security strategy on a limited budget, ThreatGEN™ has a training program to meet your needs. From basics and strategy to practical application and technical hands-on learning, students will learn the technical skills necessary to properly assess threats, vulnerabilities, and risks to their ICS, and how to create targeted defensive strategies (using limited resources) against a live opponent who is strategizing against them.

ThreatGEN™ Courses are created by globally recognized and trusted professionals that literally wrote the books on ICS cybersecurity: Clint Bodungen, leading author of “Hacking Exposed, Industrial Control Systems”, and Pascal Ackerman, author of “Industrial Cybersecurity”.

What is red team/blue team training?

Security aware and knowledgeable users serve as the “front line” of your overall security posture. As such, training is one of the most essential components of your risk mitigation strategy and overall cybersecurity program. However, without learning cybersecurity from the “hacker’s” perspective and gaining a true understanding of how adversaries attack and compromise ICS networks and assets, you’re only getting half of the picture. Without that other half, you’re essentially blindly deploying generic security controls and “best practices”. In order to have an efficient and cost-effective risk mitigation strategy, you must understand not only where your vulnerabilities are, but also the tactics that attackers will use to exploit these vulnerabilities. Red Team/Blue Team Training provides the opportunity to learn these adversarial tactics in conjunction with the defensive methods; and then students get to apply the skills they learn as they face off in a head-to-head competition, Blue Team (the defenders) against Red Team (the attackers).

Learn with Cutting Edge Computer Gaming & Simulation Technology

Traditionally, red team/blue (or red team vs. blue team) training has been a significant time commitment, often upwards of five days or more. This can be taxing on constrained schedules and budgets. Additionally, there has typically been a significant technical learning curve associated with being able to play the part of the red team. ThreatGEN™ Red Team/Blue Team Training uses cutting edge computer gaming technology developed by experienced industry professionals and authors of “Hacking Exposed: Industrial Control Systems”, to offer all the most valuable aspects of red team/blue team training, but in a fraction of the time and without a technical learning curve. Students of all levels can even play the part of the red team, regardless of experience or skill level. ThreatGEN™ ICS process simulation technology allows students to get hands-on experience with technical vulnerability assessments and penetration testing methods on ICS equipment in simulated industrial environments.

TGICS 101: Introduction to Industrial Cybersecurity

Industrial security should be ingrained in your company's culture, equivalent to safety. Cyber incident preparedness begins with people. ICS 301 begins from a strategic perspective, helping students “get their head around” the big picture. It introduces intermediate topics such as “hacker” methodologies and security controls at a comfortable and easy to follow pace. This course will help students gain an understanding of the overall cyber risk management program and strategy, as well as basic adversary methods, strategies, and the security controls to defend against them.

What you will get out of this class:

  • Gain a comprehensive, “big picture” understanding of how all the cybersecurity pieces work together
  • Learn and apply practical industrial cybersecurity and risk management concepts
  • An introductory overview of the concepts, function, and components of industrial control systems, equipment, and technology
  • Learn vulnerabilities and attack vectors specific to ICS
  • Learn about the methods and strategies hackers use to attack industrial control systems as well as traditional IT systems (Introductory level. This is not a technical hands-on, “hacking” course)
  • Learn how to deploy efficient and cost-effective mitigation strategies and security controls
  • Learn how to build a complete ICS cyber security program
  • Apply what you’ve learned against a live adversary using the cutting edge, turn-based computer training simulation/game, ThreatGEN™ Red vs. Blue
  • Learn how to respond to, adapt, and defend against active attacks (Introductory level, this is not an incident response or threat hunting class)
  • Participate as the blue team and the red team, regardless of experience or technical skill level
  • Taught by industry-leading, world-class ICS cybersecurity experts with years of real-world experience

Intended Audience:

  • Anyone interested in gaining beginner to intermediate knowledge of ICS/OT cybersecurity
  • Anyone interested in or tasked with ICS/OT risk assessment and management
  • Anyone interested in gaining a better understanding over the overall cybersecurity “big picture”
  • Cybersecurity managers
  • Upper management concerned with IT/OT cybersecurity
  • Plant managers and asset owners
  • IT cybersecurity staff tasked with ICS/OT cybersecurity
  • Engineers tasked with ICS/OT cybersecurity
  • End users looking for a more effective (and entertaining) cybersecurity awareness training

CURRICULUM OUTLINE

TGICS 201: Industrial Cyber Risk Assessment

This course builds upon the knowledge gained in ICS 101 by applying technical cyber risk and vulnerability assessment skills. Through a combination of lecture and hands-on labs, students will learn how to perform standards-based gap assessments and technical ICS vulnerability assessments using industry standard tools and applications. In addition to standard methodologies, they will also learn “ICS safe” methods. Then, they will tie it all together with consequence-driven risk calculation methods.

BONUS CONTENT:

This course includes content from Clint Bodungen’s upcoming book, “Complete Industrial Cybersecurity Program Management, A Practical Guide to ICS/OT Cyber Risk Management”: Students will learn how to use VBA and PowerShell scripts (in a way that students of all levels can follow and utilize) to automate vulnerability assessment data analysis and maximize the value of vulnerability scanning tool reports.

What you will get out of this class:

  • Learn to perform security standards-based gap assessments
  • Learn and apply consequence-driven risk assessment concepts
  • Learn to perform ICS vulnerability assessments in technical hands-on labs
  • Learn to perform ICS vulnerability assessments that are safe for ICS environments
  • Learn to use VBA and PowerShell scripts to analyze vulnerability assessment data
  • Learn to maximize the value of vulnerability scanning tool reports
  • Taught by industry-leading, world-class ICS cybersecurity experts with years of real-world experience

Intended Audience:

  • Anyone interested in gaining beginner to intermediate knowledge of ICS/OT cybersecurity
  • Anyone interested in or tasked with ICS/OT risk assessment and management
  • Anyone interested in learning more about technical ICS/OT vulnerability assessment
  • Cybersecurity managers
  • Plant managers and asset owners
  • IT cybersecurity staff tasked with ICS/OT cybersecurity
  • Engineers tasked with ICS/OT cybersecurity

CURRICULUM OUTLINE

TGICS 301: Introduction to ICS Penetration Testing

Understanding the adversaries’ offensive methods, strategies, and techniques is paramount in order to build an efficient and cost-effective cybersecurity program and risk mitigation strategy. This class builds upon these concepts that were introduced in ICS 101 by adding hands-on labs that that will help students gain a technical understanding of some of common attack techniques used by adversaries. Students will also learn how setup, manage and perform an ICS penetration testing project, including the special considerations for critical ICS environments.

What you will get out of this class:

  • Learn to setup, manage and perform ICS penetration testing projects
  • Learn how to perform penetration testing for sensitive critical environments and systems
  • Gain a technical understanding of some of the most commonly used ICS attack vectors and techniques
  • Get hands-on experience exploiting some of the most common ICS protocol, device, and application vulnerabilities
  • Experience realistic industrial environment feedback using ThreatGEN’s 3D Industrial Process Simulation Platform
  • Taught by industry-leading, world-class ICS cybersecurity experts with years of real-world experience

Intended Audience:

  • Anyone interested in gaining intermediate knowledge of ICS/OT cybersecurity
  • Anyone interested in or tasked with ICS/OT risk assessment and management
  • Anyone interested in learning more about technical ICS/OT penetration testing
  • Cybersecurity managers looking for technical understanding
  • Plant managers and asset owners looking for technical understanding
  • IT cybersecurity staff tasked with ICS/OT cybersecurity
  • Engineers tasked with ICS/OT cybersecurity

CURRICULUM OUTLINE

Share with friends

Date and Time

Location

Marriott Sugarland Town Square

16090 City Walk

Sugar Land, TX 77479

View Map

Refund Policy

Contact the organizer to request a refund.

Eventbrite's fee is nonrefundable.

Save This Event

Event Saved