VTG (Lab) Bundle

ICS Vulnerabilities - VTG Ch2 (ICS002)


Description
Lab access included*

After pivoting into the ICS network, continue your exploration of common ICS protocol and software vulnerabilities to reprogram a PLC and cause a power outage in the simulated power plant. After completing this chapter, users will be able to:

• Run advanced network scanning to enumerate ICS devices
• Run password cracking tools against remote access protocols (RDP)
• Understand the function of HMIs in ICS networks
• Perform man-in-the-middle (MITM) attacks using ARP spoofing
• Explore ICS protocols using Wireshark
• Understand how PLCs are programmed

1.5 CPE

The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.

*Professional users get 60 days of lab access with purchase of bundle or 7 days per individual course, starting during the next available time slot. Academic user pricing and duration of lab access dependent on agreement with school.

Content
  • LAB ENVIRONMENT
  • Introduction
  • Introduction
  • Key Terms Review
  • Advanced Network Scanning
  • Advanced Scanning
  • Advanced Scanning Review
  • Network Scan Safety
  • Scan Safety
  • Scan Safety Review
  • DENIAL OF SERVICE AND BASH SCRIPTING
  • DoS and Bash
  • DoS and Bash Review
  • Password Cracking - RDP
  • RDP Cracking
  • RDP Cracking Review
  • Sniffing Fieldbus Traffic
  • Sniffing Fieldbus
  • Sniffing Fieldbus Review
  • POLLING ENIP VALUES
  • Polling ENIP
  • Polling ENIP Review
  • Human Machine Interfaces
  • HMIs
  • HMI Review
  • PLC Programming
  • PLC Programming
  • PLC Programming Review
  • SPEAR PHISHING
  • Spear Phishing
  • Spear Phishing Review
  • Conclusion
  • Network Diagram
  • Chapter 2 Feedback
  • Discussion and Q&A
Completion rules
  • All units must be completed
  • Leads to a certificate with a duration: 3 years