Learn Critical Infrastructure ICS/SCADA Cybersecurity Fundamentals
The Critical Infrastructure Cyber Range ICS/SCADA Fundamentals skill path provides you with foundational knowledge about SCADA systems and security, including protocols, access controls, physical security, cybersecurity tools and more.
Please select the Annual subscription, and or Organization/Team Subscription.
Critical Infrastructure Cyber Range subscription
$595 / Year
Starting at $54/mo with Affirm. Prequalify now
7-Day Free Trial
- 700+ courses
- 100s of hands-on labs and projects
- 80+ role-based and custom learning paths
- Skill assessments
- Custom certification practice exams
- Cloud-hosted cyber ranges
- Critical Infrastructure Cyber Range peer community support
9 courses // 43 videos // 7 hours of training
Critical Infrastructure ICS/SCADA Cybersecurity Fundamentals training
This learning path introduces the challenges related to securing industrial control systems. You’ll build your Critical Infrastructure ICS/SCADA Cybersecurity knowledge by progressing through nine courses. Then test your new skills on the cyber range across 15 hands-on labs. Upon completion, you’ll have a proven baseline of knowledge and skills required to help keep those systems safe.
SCADA Cyber Range
Cyber range | 15 labs
Gain practical experience and build real-world Supervisory Control and Data Acquisition (SCADA) skills through 15 hands-on labs in the SCADA Cyber Range.
Identification and AAA
Course | 16 minutes
Learn about one of the most important information security concepts related to access management: identification, authentication, authorization and accounting (IAAA).
Access Control Fundamentals
Course | 21 minutes
Explore the essential concepts of access control in this four-video course covering access control models, implementation, concepts and enforcement.
Resiliency and Automation
Course | 9 minutes
Learn important terminology and concepts related to information security resiliency and automation in this brief overview course.
Physical Security
Course | 9 minutes
Discover how common physical and environment security controls relate to information security in this brief overview course.
Introduction to Security Controls
Course | 17 minutes
Get an overview of common security control categories and types, and learn about important concepts such as data sanitation and data sensitivity
Threats and Threat Actors
Course | 1 hour
Build your knowledge of popular threats, including malware and social engineering as well as application, wireless and cryptographic attacks.
Security Technologies and Tools
Course | 1 hour
Explore the uses of common information security technology and tools as you progress through this nine-video introductory course.
Introduction to SCADA Security
Course | 9 minutes
Get an introduction to SCADA security, including ICS types, ICS components, process control and safety systems, and strengths and weaknesses.
ICS Protocols
Course | 37 minutes
Explore common Industrial Control System (ICS) protocols and their security features as you progress through this 11-video course.
SCADA Cyber Range
This cyber range helps you develop your knowledge of SCADA and Industrial Control System (ICS) security by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of SCADA security topics, including reconnaissance, scanning, honeypots, attacks and exploits. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new SCADA security skills.
SCADA Cyber Range
Modbus PLC Introduction
Lab | 14 steps
Get an introduction to Modbus and gain hands-on experience via the SCADA Cyber Range.
SNMP Reconnaissance
Lab | 17 steps
Learn about abusing SNMP as you practice in the SCADA Cyber Range.
Datasheet Analysis
Lab | 4 steps
Explore getting valuable information from user manuals as you practice in the SCADA Cyber Range.
CTF 1
Lab | 4 steps
Test your reconnaissance skills as you practice in the SCADA Cyber Range.
Scanning ICS/SCADA Networks
Lab | 17 steps
Learn about scanning SCADA networks as you practice in the SCADA Cyber Range.
Attacking the Infrastructure
Lab | 23 steps
Learn about compromising a system as you practice in the SCADA Cyber Range.
Firewall Rules for SCADA
Lab | 17 steps
Get insight into SCADA firewall rules as you practice in the SCADA Cyber Range.
Exploiting OS-Level Vulnerabilities
Lab | 22 steps
Learn about Shellshock exploitation on a host system as you practice in the SCADA Cyber Range.
Extracting Network Keys
Lab | 13 steps
Test your skills with exploiting ZigBee and encryption cracking as you practice in the SCADA Cyber Range.
Wi-Fi Password Cracking
Lab | 4 steps
Learn about cracking Wi-Fi passwords as you practice in the SCADA Cyber Range.
Manipulating Protocol Data
Lab | 17 steps
Learn about manipulating protocol data as you practice in the SCADA Cyber Range.
SCADA Honeypot
Lab | 15 steps
Explore the SCADA honeypot Conpot as you practice in the SCADA Cyber Range.
Snort SCADA Rules
Lab | 19 steps
Learn about Snort SCADA rules as you practice in the SCADA Cyber Range.
CTF 2
Lab | 4 steps
Test your sniffing skills as you practice in the SCADA Cyber Range.
CTF 3
Lab | 4 steps
Test your SCADA defense skills as you practice in the SCADA Cyber Range.