SCADA - ICS - IIoT Security

This class covers the steps and methodology used in performing penetration tests on Industrial Control and Smart Grid systems and is primarily targeted towards Information Technology Professionals, Information Security Professionals, Control Systems Engineers, and SCADA System Operators with a background in computer hardware and operating systems. 

This course also covers both the Attack and Defense of SCADA devices like Historians, HMI, PLCs, and other equipment.

Our Training

Courses with Information Warfare Center take you though the entire SCADA - ICS - IIoT security process and use the IWC Cyber Live Fire Range (CLFR), a portable Cyber Range on an External Hard Drive that you can take home with you to hone your tradecraft. Includes Modbus labs and NSA's Grass Marlin.

Our team primarily uses this CLFR during real work penetration tests and Red Team exercises. It is not only built for training, but as a main assessment system.

Student quotes

"was very knowledgable of the course material but also of real world scenarios. He was very helpful and always available."

"Great class. The instructor was willing to help, will get on your level so you will understand concepts."

"Great training. I appreciated the examples given from real world experience to back up the training materials."

"Loved the pace that Jeremy Martin taught at, wealth of knowledge and was an awesome presenter! Thank you!"

What is SCADA/ICS?

"Industrial control system (ICS) is a general term that encompasses several types of control systems and associated instrumentation used for industrial process control.

Such systems can range from a few modular panel-mounted controllers to large interconnected and interactive distributed control systems with many thousands of field connections. All systems receive data received from remote sensors measuring process variables (PVs), compare these with desired set points (SPs) and derive command functions which are used to control a process through the final control elements (FCEs), such as control valves.

The larger systems are usually implemented by Supervisory Control and Data Acquisition (SCADA) systems, or distributed control systems (DCS), and programmable logic controllers (PLCs), though SCADA and PLC systems are scalable down to small systems with few control loops. Such systems are extensively used in industries such as chemical processing, pulp and paper manufacture, power generation, oil and gas processing and telecommunications. - Wikipedia"

Information Warfare Center Services

SCADA/ICS Security Domains:

  • Footprinting and Reconnaissance
  • Scanning SCADA Networks
  • Safer Device Enumeration
  • Vulnerability Analysis
  • Attacking SCADA Protocols
  • Malware Threats
  • Communications Security
  • Encryption
  • Cyber Asset Defense
  • Policies, Standards, and Procedures
  • Risk Management

Other courses we offer:

  • ECSA/LPT Prep
  • Certified Network Defender (CND)
  • Certified Hacking Forensic Investigator (CHFI)
  • Certified Chief Information Security Officer (CCISO)
  • Certified Threat Intelligence Analyst (CTIA)
  • Certified Information System Security Professional (CISSP)
  • CompTIA Network+
  • CompTIA Security+
  • CompTIA Linux+
  • CompTIA Pentester+

Regional offering: Colorado based information security certification boot-camps in Colorado Springs, Denver,and Fort Collins area. Ask about the Colorado Discount!

International offering: We have taught courses on six continents. Our instruction is in English, but we do work with translators when needed.

Contact us for course availability!

EC-Council ATC Best Newcomer Pearson Vue Authorized Test Center

Extra InfoSec Resources: Cyber Secrets

Information Warfare Center Cyber Live Fire Range

Build-a-Lab: Cyber Live Fire Range

Do you want to learn how to conduct vulnerability assessments or penetration tests but don’t know where to start? Are you getting into computer forensics and want some more hands on practice with more tools and environments? Well, we have something that might just save you some time and money.

Information Warfare Center not only offers ethical hacking, penetration testing, and digital forensics training, we now have a standalone lab environment prebuilt for both training and operational use. This mobile lab has been designed to boot off of a USB drive and works with almost any PC. This e-book walks you though how to build one yourself. It is a step by step guide to building your own Portable, encrypted, Kali based lab.