VTG (Lab) Bundle

ICS Vulnerabilities - VTG Ch2 (ICS002)


Description
Lab: 1.5 CPE

After pivoting into the ICS network, continue your exploration of common ICS protocol and software vulnerabilities to reprogram a PLC and cause a power outage in the simulated power plant. After completing this chapter, users will be able to:

• Run advanced network scanning to enumerate ICS devices
• Run password cracking tools against remote access protocols (RDP)
• Understand the function of HMIs in ICS networks
• Perform man-in-the-middle (MITM) attacks using ARP spoofing
• Explore ICS protocols using Wireshark
• Understand how PLCs are programmed

The Fortiphyd Virtual Training Grounds series equips you with the practical experience needed to secure ICS networks. Practice launching real attacks, see their physical consequences, and learn how to defend against them all in realistic 3D simulated plants.

Content
  • LAB ENVIRONMENT
  • Introduction
  • Introduction
  • Key Terms Review
  • Advanced Network Scanning
  • Advanced Scanning
  • Advanced Scanning Review
  • Network Scan Safety
  • Scan Safety
  • Scan Safety Review
  • DENIAL OF SERVICE AND BASH SCRIPTING
  • DoS and Bash
  • DoS and Bash Review
  • Password Cracking - RDP
  • RDP Cracking
  • RDP Cracking Review
  • Sniffing Fieldbus Traffic
  • Sniffing Fieldbus
  • Sniffing Fieldbus Review
  • POLLING ENIP VALUES
  • Polling ENIP
  • Polling ENIP Review
  • Human Machine Interfaces
  • HMIs
  • HMI Review
  • PLC Programming
  • PLC Programming
  • PLC Programming Review
  • SPEAR PHISHING
  • Spear Phishing
  • Spear Phishing Review
  • Conclusion
  • Network Diagram
  • Chapter 2 Feedback
  • Discussion and Q&A
Completion rules
  • All units must be completed
  • Leads to a certificate with a duration: 3 years