New

ICS310: ICS Cybersecurity Foundations™

  • Online
6 CPEs

The world relies on Critical Infrastructure for all aspects of daily life. All sectors within critical infrastructure have integrated ICS and OT into key operational components of the services they provide. With the movement toward these unique digital devices, there is a corresponding need for a uniquely skilled, diverse workforce with an understanding of Engineering, Operations, IT/OT, and cybersecurity skills. With many practitioners entering the field and a demand to rapidly expand capabilities and ICS maturity around the world, we have introduced a short, easily consumable, foundational ICS course for those individuals entering this space. This short course can act as the foundation for those looking to expand their understanding of operations and ICS or gain a better understanding of the cybersecurity threats they are facing, or potentially identify some immediate cybersecurity controls to pursue. The course may also serve as a great prerequisite for other ICS courses. Covering key topic areas and including hands-on labs to expose those new to the field, the ICS310 course is a great fit for the critical infrastructure workforce of the future.

What You Will Learn

Establish your foundational ICS/OT security knowledge with this 1-day course.

In this ICS course, students will begin by developing a necessary understanding of mechanical and operational systems, which is further expanded upon to better understand how asset owners and operators have automated these environments. Multiple sectors are explored to highlight the commonalities across process environments from various industries and sectors. Understanding the common building blocks and operational criteria that exist in numerous sectors will help inform defenders on the essential areas to focus risk-based prioritized cybersecurity actions that support the larger operational mission.

We’ll reference case studies from multiple sectors around the world that highlight cyber events in which a variety of adversarial tactics were employed to achieve their goals. These case studies cover IT attacks that impacted operations, attacks on operational targets based heavily on adversary manual activity, and attacks on operational targets that incorporated ICS-enabled malware. Through the analysis of these case studies, we’ll uncover lessons learned and recommendations for successful defense strategies, including defender-focused actions that can be prioritized and pursued.

Sectors in different geographies will face unique regulatory requirements and standards, while some are lacking in any guidance. Practitioners and leaders alike who are looking for appropriate security controls will learn about the five ICS critical controls that can be customized and implemented across any environment.

What Is ICS Security?

ICS Security (Industrial Control System Security) practices and programs help defenders protect critical infrastructure systems like SCADA, DCS, and PLCs from cyber threats, physical attacks, and exploitation. It involves measures like network segmentation, access control, monitoring, vulnerability management, and incident response to ensure operational safety and reliability. With the increasing targeting of ICS by cybercriminals and state sponsored actors, robust security practices are essential to safeguard infrastructure, prevent disruptions, and protect public safety.

Business Takeaways

  • Enhance Team Expertise: Equip employees with the knowledge to identify common ICS components and implement effective cybersecurity measures across your operations.
  • Learn from Real-World Threats: Prepare your workforce to counter adversarial tactics by leveraging insights from global case studies and proven defense strategies.
  • Strengthen Security Posture: Enable your team to implement customizable ICS controls that address industry-specific and regulatory challenges, improving overall resilience.

Skills Learned

  • ICS Five Critical Controls: Master the key security measures to protect industrial systems.
  • Top ICS/OT Standards: Gain insights into IEC 62443, NIST 800-82, NIS2, and NERC CIP frameworks.
  • Core ICS Concepts: Learn common industry terms, system components, and digital vs. analog operations.
  • IT/OT Trends and Basics: Understand key trends, device fundamentals, and system inputs/outputs in OT environments.
  • Real-World Applications: Analyze case studies to see how ICS principles apply to real industry challenges.

Hands-On ICS Security Training

The hands-on portion of ICS310 will utilize a course VM environment to examine an example process and the hardware, software, and protocols involved. Additional labs will examine approaches to manipulate a system to understand failure potential and misuse opportunities. The ICS310 exercises are designed to reinforce the implementation of the Five Critical Controls, Collection Management Framework, and ICS Network Analysis.

Syllabus Summary

  • Section 1: ICS310 Curriculum View
  • Section 2: ICS and Automation
  • Section 3: ICS Trends and Threats
  • Section 4: ICS Case Studies and World Events
  • Section 5: ICS Cybersecurity Standards and Guidelines
  • Section 6: ICS Five Critical Controls

Additional Free Resources

What You Will Receive

  • Printed and electronic courseware
  • Electronic Download Package containing ICS cybersecurity related posters, whitepapers, use cases, and cheat sheets
  • A virtual machine of the RELICS Platform, an open-sourced, Linux-based distribution designed for performing Research, Education, Labs for ICS.
  • Exercise workbook with detailed step-by-step instructions

What Comes Next?

Depending on your current role or future career plans, one of these courses is a great next step in your ICS journey-and you can bundle ICS310 for free with purchase of any of the following courses::

Syllabus (6 CPEs)

Download PDF
  • Overview

    The ICS310™ course has been developed as a foundational course for those new to the ICS/OT field. In this section we cover who this course is intended for, where the course fits in a broader ICS cybersecurity practitioner training program, how the course was developed across multiple author perspectives, and where we see the course as a fit for those students taking any of the other SANS ICS Security higher level courses.

    Topics
    • Meet the author team
    • Foundational Industrial Control System (ICS) course topic areas
      • ICS and automation topics
      • ICS trends and case study lessons learned
      • Guidance and approaches for system defenders
    • SANS and ICS history
    • Where does ICS 310 fit across the broader curriculum
    • Content focus areas
    • Lab and exercise
  • Overview

    In Section two, we will establish an understanding of the basic building blocks of industrial control systems, how and why they are used, as well as cover some essential concepts in the design and maintenance of these environments. We'll build on this knowledge of the foundational components that make up our ICS/OT environments, highlighting how these systems are interconnected and interdependent, creating systems of systems that necessitate careful design considerations and operational practices to ensure safe, reliable, resilient systems.

    Exercises
    • Ladder Logic Investigation
    Topics
    • Brief History of Automation
    • What are the basic building blocks of an automation system
    • Human Brain, Sensory and Muscle Reference
    • What are the main components found in ICS
    • What is digital -vs- analog
      • Types of Digital Inputs
      • Types of Digital Outputs
      • Types of Analog Inputs
      • Types of Analog Outputs
    • Product development lifecycle
    • What is a system of systems
  • Overview

    Section three layers in learning objectives that have a cybersecurity focus, along with discussions on the drivers and constraints facing both offensive and defensive teams dedicated to achieving goals and objectives throughout ICS/OT environments. This section addresses the cybersecurity-specific considerations across critical infrastructure and key resource sectors, as well as differentiation across IT and OT systems, terminology, and trends.

    Topics
    • Critical Infrastructure sectors
    • IT and OT focus areas
    • Common terms
    • IT/OT trends
  • Overview

    Some of the most meaningful learning opportunities available are those that are shared or experienced, and in section four the course will utilize case studies and world events to highlight specific lessons learned that can be implemented within your operational environments. While the case studies covered may not be specifically from within your sector of interest, there are most likely common devices, protocols, threat vectors, or response approaches that are directly applicable to you. What can be learned from real-world attacks and case studies will aid system defenders in prioritizing actions that matter.

    Exercises
    • Wireshark Analysis Basics
    Topics
    • Case Studies
    • Colonial Pipeline
    • Ukraine 2015
    • Ukraine 2016
    • World events
  • Overview

    For those working in ICS/OT environments there are often references to regulation, standards, or guidelines for a particular country, sector, or technology. Section five introduces the topic of security guidelines and standards that you will commonly encounter across industrial control systems, anywhere, any sector, in any geography. While there are full 5- and 6-day dedicated courses or a suite of courses for some of the standards that exist, this section simply highlights the different types of standards for familiarity and reference.

    Topics
    • Security Guidelines and Standards commonly encountered within the ICS / OT community
    • Top three
      • IEC62443
      • NIST 800-82
      • NERC CIP
    • European Union regulation NIS2
    • Industry approach
  • Overview

    With so many options to pursue across standards, regulations, guidelines, and industry recommendations, often organizations and leadership are looking for a clear path of what to do. Section six addresses this question and provides guidance on the ICS five critical controls. The authors of this course considered existing controls frameworks and asked, "If we wrote the critical controls (like the SANS 20 critical controls for IT) for OT, what would they be?" This section considers the prioritization, implementation, and customization of the critical controls for your organization and provides background on the selection of these controls as the minimum preventive and detective controls that are threat informed, have been identified based on attacks that have been seen, and consider the capabilities available to system defenders.

    Exercises
    • Network Visualization
    Topics
    • The Five Critical ICS Security Controls
      • ICS Incident Response
      • Defensible Architecture
      • ICS Network Visibility and Monitoring
      • Secure Remote Access
      • Risk Based Vulnerability Management
    • Leadership Role
    • Resources and contact information

Prerequisites

None. This course will help provide some prerequisite capability to other ICS Security curriculum courseware.

Laptop Requirements

Important! Bring your own system configured according to these instructions.

A properly configured system is required to fully participate in this course. If you do not carefully read and follow these instructions, you will not be able to fully participate in hands-on exercises in your course. Therefore, please arrive with a system meeting all of the specified requirements.

Back up your system before class. Better yet, use a system without any sensitive/critical data. SANS is not responsible for your system or data.

Mandatory ICS310 System Hardware Requirements
  • Wireless networking (802.11 standard) is required. There is no wired Internet access in the classroom.
  • 64-bit processor with 64-bit operating system
  • At least eight (8) GB of RAM
  • At least seventy (70) GB of free hard drive space
  • At least one USB port
Mandatory ICS310 Host Configuration And Software Requirements
  • Your host operating system must be the latest version of Windows 10, Windows 11, or macOS 10.15.x or newer.
  • Fully update your host operating system prior to the class to ensure you have the right drivers and patches installed.
  • VT or other 64-bit virtualization settings enabled in your BIOS to run 64-bit VMs
  • Access to an account with administrative permissions and the ability to disable all security software on their laptop such as Antivirus and/or firewalls if needed for the class
  • Linux hosts are not supported in the classroom due to their numerous variations. If you choose to use Linux as your host, you are responsible for configuring it to work with the course materials and/or VMs.

Your course materials include a "Setup Instructions" document that details important steps you must take before you travel to a live class event or start an online class. It may take 30 minutes or more to complete these instructions.

Your class uses an electronic workbook for its lab instructions. In this new environment, a second monitor and/or a tablet device can be useful for keeping class materials visible while you are working on your course's labs.

If you have additional questions about the laptop specifications, please contact customer service.

Author Statement

“This course represents SANS’s and our commitment to the community by providing a low-cost, fast-paced course that is perfect for introducing people to OT/ICS cybersecurity. It is our hope that people take this course to learn the fundamentals of automation and industrial environments while also gaining exposure to the latest cyber threats and security efforts. Students that take this course will be empowered to immediately apply what they learned and continue their journey to help protect our communities from the jerks that mean them harm.”

Robert M. Lee, SANS Fellow

“I believe a foundational course like ICS310 has been needed for a very long time in our community. Early on, some great introductory resources were made available to industry, and as we have seen expanding job roles and growing training needs for individuals entering the field of ICS/OT, we felt it was time to introduce a course that provided fundamental learning topics, informed by the work experiences of an author team with a diversity of perspectives on the topic of ICS/OT cybersecurity”.

Tim Conway, SANS Fellow

“You can’t be expected to defend what you don’t understand. With the right instruction, you can quickly understand the basic ICS building blocks that will serve you well as you move forward with more in-depth and complex ICS topics. It’s much like learning a language: Your foundation starts by learning the letters associated with the language. You then learn how letters form words, which lead to the creation of sentences, which are used to create paragraphs and eventually books. Just like learning a language, you shouldn’t assume you can skip the fundamentals of industrial control systems as they are applied to control mechanical and process systems and successfully secure it. Everyone wants to jump into discussions about technical controls like firewalls or how ICS protocols work without understanding how an industrial control system works. It’s where everyone should start their journey as an ICS security professional to get grounded on how industrial control systems work. Once you gain this knowledge, you’ll be standing on a solid foundation to apply security controls in an industrial environment”.

Jeffrey Shearer, SANS Certified Instructor

Register for ICS310

Learn about Group Pricing

Prices below exclude applicable taxes and shipping costs. If applicable, these will be shown on the last page of checkout.

Loading...