VTG Bundle

VTG Ch2 - ICS Vulnerabilities (VTG102)

Chapter 2 of 5-Part VTG Bundle
60 day lab access included with bundle, see details below*

The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.

In the previous chapter you explored the DMZ network and pivoted down to the ICS network of a power plant. In this chapter you will continue your exploration learning about common vulnerabilities deeper in the ICS network and ultimately cause a power outage in the simulated power plant. After completing this chapter, users will be able to:

• Run advanced network scanning to enumerate ICS devices
• Run password cracking tools against remote access protocols (RDP)
• Understand the function of HMIs in ICS networks
• Perform man-in-the-middle (MITM) attacks using ARP spoofing
• Explore ICS protocols using Wireshark
• Understand how PLCs are programmed

*Professional users get 60 days of lab access starting during the next available time slot. Once purchased, Fortiphyd support will contact you to coordinate the start date. Academic user pricing and duration of lab access dependent on agreement with school.

  • Introduction
  • Introduction
  • Key Terms Review
  • Advanced Network Scanning
  • 2.1
  • Exercise Review
  • Network Scan Safety
  • 2.2
  • Exercise Review
  • 2.3
  • Exercise Review
  • Password Cracking - RDP
  • 2.4
  • Exercise Review
  • Sniffing Fieldbus Traffic
  • 2.5
  • Exercise Review
  • Human Machine Interfaces
  • 2.6
  • Exercise Review
  • PLC Programming
  • 2.7
  • Exercise Review
  • 2.8
  • Exercise Review
  • Conclusion
  • Network Diagram
  • Chapter 2 Feedback
  • Discussion and Q&A
Completion rules
  • All units must be completed
  • Leads to a certification with a duration: 3 years