Contact Sales
Contact Sales
NEW

ICS613: ICS/OT Penetration Testing & Assessments

ICS613Industrial Control Systems Security
  • 5 Days (Instructor-Led)
  • 30 Hours
Course authored by:
Jason DelyTyler WebbDon C. Weber
Jason Dely, Tyler Webb & Don C. Weber
Course authored by:
Jason DelyTyler WebbDon C. Weber
Jason Dely, Tyler Webb & Don C. Weber
  • 30 CPEs

    Apply your credits to renew your certifications

  • In-Person or Virtual

    Attend a live, instructor-led class from a location near you or virtually from anywhere

  • Advanced Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 27 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Security professionals gain critical skills to conduct safe, effective penetration tests and assessments in ICS/OT environments without compromising operational integrity.

Course Overview

Industrial Control Systems (ICS) and Operational Technology (OT) are increasingly targeted by adversaries, yet traditional penetration testing approaches often focus on the wrong outcomes and can cause unintended disruptions with severe consequences – including production outages, injury to personnel, loss of life, and environmental hazards.

ICS613: ICS/OT Penetration Testing & Assessments trains engineering, operations, and security professionals with the mindset, methodologies, and techniques to safely and appropriately conduct ICS penetration tests and security assessments, identify practical mitigations, and effectively communicate results to stakeholders and leadership to improve the operational resilience of ICS environments. As a specialized ICS pentesting course, ICS613 equips students to approach assessments with precision and safety in mind.

What You'll Learn

  • Plan and execute safe, effective, and valuable penetration tests and security assessments, using both passive and active techniques to assess ICS operational resilience
  • Tailor ICS penetration tests and security assessments to organizational and operational security objectives
  • Identify realistic ICS attack scenarios targeting Crown Jewel Assets (CJA)
  • Communicate with stakeholders to define expectations, goals, and outcomes for ICS security assessments, and deliver accurate, actionable reports that support these outcomes
  • Understand the benefits of a top-down/bottom-up approach to active testing, and align penetration test methodologies to the ICS Cyber Kill chain
  • Evaluate tools and techniques for effectiveness and safety before applying them to ICS devices and networks
  • Identify relevant targets and select applicable adversary TTPs for developing effective attack scenarios in ICS penetration tests and security assessments, regardless of industry sector

Business Takeaways

  • Reduce risk of unplanned outages during security testing
  • Enhance protection of operational crown jewel assets
  • Improve communication between IT security and OT teams
  • Demonstrate compliance with sector-specific regulations
  • Gain practical risk mitigation strategies for industrial systems
  • Increase operational resilience against cyber threats
  • Implement cost-effective security recommendations

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in ICS613: ICS Penetration Testing and Assessments.

Section 1Bench and Lab Testing

This section introduces the types of ICS/OT assessments, the risks and the three tenets of ICS/OT assessments. The section also introduces the three types of bench and lab testing for ICS/OT assessments, covering a high-level process of devices bench testing including hardware, firmware, administration and communication analysis.

Topics covered

  • Types of ICS/OT assessments
  • Introduction to the bench testing assessment
  • Bench and lab testing case studies, methodology and tool preparation
  • Analyze device functionality, configuration and interfaces
  • Hardware and firmware analysis including tools

Labs

  • Build and program student kit
  • Custom tool development
  • Firmware analysis
  • Analyze unknown protocols

Section 2Preparing for ICS/OT Assessments

This section introduces passive and active security assessments for ICS/OT environments, covering how to define goals, choose an approach, apply threat intelligence and prepares students to plan, execute, and deliver safe and effective ICS/OT security assessments while emphasizing stakeholder collaboration.

Topics covered

  • Define assessment goals and outcomes and testing terminology
  • Align with ICS/OT Cyber Kill Chain, Crown Jewel Analysis and threat intelligence
  • Outline phased assessment methodology
  • Collaborate with stakeholders
  • Structure actionable test reports and balance mitigation options

Labs

  • Understand the operation of ICS613 student kit LNG process
  • Understand the preparation for ICS/OT assessment through the Crown Jewel Analysis process

Section 3Top-Down Active Methodology

This section introduces a top-down penetration methodology aligned with the ICS/OT Cyber Kill Chain. Students learn to execute engagement objectives in simulated production environments using "living off the land" techniques while focusing on privilege escalation and OT boundary pivoting.

Topics covered

  • Follow assumed breach scenarios
  • Master process enumeration
  • Identify effective targets

Labs

  • Exploit certificate services
  • Abuse credential reuse
  • Transfer tools using native binaries
  • Hijack operator sessions
  • Bypass endpoint hardening controls

Section 4Security and Vulnerability Assessment

This section introduces passive security assessments for ICS/OT environments, covering nonintrusive techniques to collect and analyze the environment that align with industry standards. Students will learn ICS/OT specific knowledge and skills to analyze perimeters, network communications, hosts and active directory.

Topics covered

  • ICS/OT standard and frameworks alignment
  • Common perimeter architectures and exploitable vectors
  • ICS/OT vulnerability discovery and management
  • Network analysis techniques
  • Server and workstation analysis

Labs

  • Exploit operator workstation services
  • Advance ICS/OT network analysis
  • Validate tools and techniques

Section 5Bottom-Up Operations Assessment and Capstone

This section covers a bottom-up approach to ICS/OT attack identification aligned with the ICS/OT Cyber Kill Chain. Students learn to develop realistic attack scenarios with expected physical consequences, and demonstrate attacks in controlled environments, while emphasizing stakeholder collaboration.

Topics covered

  • Various control system models and architectures
  • Assess realistic attack scenarios and operational impacts
  • Consequences and impacts to physical equipment
  • Apply adversarial methods on targeting and TTPs
  • Evaluate weaknesses and readiness of attack

Labs

  • Enumeration EWS and DCS architectures
  • Identify and exploit operational vulnerabilities
  • Develop and execute adversarial attack scenarios and methods
  • Capstone

Things You Need To Know

Relevant Job Roles

Industrial Control Systems and Operational Technologies

SCyWF: Industrial Control Systems And Operational Technologies

This role conducts cybersecurity tasks for Industrial Control Systems and Operational Technologies (ICS/OT). Find the SANS courses that map to the Industrial Control Systems and Operational Technologies SCyWF Work Role.

Explore learning path

ICS/OT Security Pen Tester

Industrial Control Systems

Discovers system vulnerabilities and works with asset owners and operators to mitigate discoveries and prevent exploitation from adversaries.

Explore learning path

ICS Security Analyst Training, Salary, and Career Path

Industrial Control Systems

Acquires and manages resources, supports, and performs key industrial security protection while adhering to safety and engineering goals.

Explore learning path

Course Schedule and Pricing

Looking for Group Purchasing Options?Contact Us
Showing 9 of 9

Benefits of Learning with SANS

Bryan Simon: Teacher Standing Next to Smartboard and Explaining Concept

Get feedback from the world’s best cybersecurity experts and instructors

OnDemand Mobile App

Choose how you want to learn - online, on demand, or at our live in-person training events

Close Up of Woman Holding a Pen and Documents

Get access to our range of industry-leading courses and resources