VTG Bundle

VTG Ch1 - DMZ Vulnerabilities (VTG101)


Description
Chapter 1 of 5-Part VTG Bundle
60 day lab access included with bundle, see details below*

The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.

In this chapter you will explore the ICS DMZ network of a power plant located between the less trusted business network and the more trusted ICS network, learning about the common vulnerabilities and threats located there. After completing this chapter, users will be able to:

• Use basic Linux commands and tools (whoami, pwd, ls, mkdir, nano, cd, mv, cp, rm, man)
• Run basic network scans with nmap
• Understand the function of historians in ICS networks
• Test for SQL injection vulnerabilities
• Perform man-in-the-middle (MITM) attacks using ARP spoofing
• Explore ICS protocols using Wireshark
• Run password cracking tools against remote access protocols (SSH)
• Check for weak passwords by running a cracking tool against password files

*Professional users get 60 days of lab access starting during the next available time slot. Once purchased, Fortiphyd support will contact you to coordinate the start date. Academic user pricing and duration of lab access dependent on agreement with school.

Content
  • Welcome
  • ICS Security Awareness
  • ICS Security Awareness
  • Awareness Exercise - ICS Definition and Threats
  • Awareness Exercise - Asset Discovery
  • Awareness Exercise - Human Machine Interfaces
  • Awareness Exercise - Programmable Logic Controllers
  • Awareness Exercise - Network Architecture
  • Introduction
  • LAB ENVIRONMENT
  • DMZ Vulnerability Assessment Overview
  • Key Terms Review
  • Intro to Lab Machine and Linux
  • 1.1
  • Accessibility
  • Exercise Review
  • Intro to Network Scanning
  • 1.2
  • Exercise Review
  • SQL Injection Attacks
  • 1.3
  • Exercise Review
  • CROSS-SITE SCRIPTING
  • 1.4
  • Exercise Review
  • SESSION HIJACKING
  • 1.5
  • Exercise Review
  • SSH Password Cracking
  • 1.6
  • Exercise Review
  • Password File Cracking
  • 1.7
  • Exercise Review
  • ARP Spoofing to Sniff Traffic
  • 1.8
  • Exercise Review
  • EXTRACTING CREDENTIALS FROM A REMOTE DEVICE
  • 1.9
  • Exercise Review
  • Discussion
  • Pros and Cons of Online Training
  • Introductions and Learning Goals
  • Conclusion
  • Network Diagram
  • Chapter 1 Feedback
  • Discussion and Q&A
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: 3 years