VTG (Lab) Bundle

ICS Vulnerabilities - VTG Ch2 (ICS002)


Description
Lab access included*

After pivoting into the ICS network, continue your exploration of common ICS protocol and software vulnerabilities to reprogram a PLC and cause a power outage in the simulated power plant. After completing this chapter, users will be able to:

• Run advanced network scanning to enumerate ICS devices
• Run password cracking tools against remote access protocols (RDP)
• Understand the function of HMIs in ICS networks
• Perform man-in-the-middle (MITM) attacks using ARP spoofing
• Explore ICS protocols using Wireshark
• Understand how PLCs are programmed

1.5 CPE

The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.

*Professional users get 60 days of lab access with purchase of bundle or 7 days per individual course, starting during the next available time slot. Academic user pricing and duration of lab access dependent on agreement with school.

Content
  • LAB ENVIRONMENT
  • Introduction
  • Introduction
  • Key Terms Review
  • Advanced Network Scanning
  • 2.1
  • Exercise Review
  • Network Scan Safety
  • 2.2
  • Exercise Review
  • DENIAL OF SERVICE AND BASH SCRIPTING
  • 2.3
  • Exercise Review
  • Password Cracking - RDP
  • 2.4
  • Exercise Review
  • Sniffing Fieldbus Traffic
  • 2.5
  • Exercise Review
  • POLLING ENIP VALUES
  • 2.6
  • Exercise Review
  • Human Machine Interfaces
  • 2.7
  • Exercise Review
  • PLC Programming
  • 2.8
  • Exercise Review
  • SPEAR PHISHING
  • 2.9
  • Exercise Review
  • Conclusion
  • Network Diagram
  • Chapter 2 Feedback
  • Discussion and Q&A
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: 3 years