Critical Infrastructure Cyber Range

Learn Critical Infrastructure ICS/SCADA Cybersecurity Fundamentals

The Critical Infrastructure Cyber Range ICS/SCADA Fundamentals skill path provides you with foundational knowledge about SCADA systems and security, including protocols, access controls, physical security, cybersecurity tools and more.

Please select the Annual subscription, and or Organization/Team Subscription.

Critical Infrastructure Cyber Range subscription

$595 / Year

Starting at $54/mo with . Prequalify now

7-Day Free Trial

  • 700+ courses
  • 100s of hands-on labs and projects
  • 80+ role-based and custom learning paths
  • Skill assessments
  • Custom certification practice exams
  • Cloud-hosted cyber ranges
  • Critical Infrastructure Cyber Range peer community support

9 courses // 43 videos // 7 hours of training

Critical Infrastructure ICS/SCADA Cybersecurity Fundamentals training


This learning path introduces the challenges related to securing industrial control systems. You’ll build your Critical Infrastructure ICS/SCADA Cybersecurity knowledge by progressing through nine courses. Then test your new skills on the cyber range across 15 hands-on labs. Upon completion, you’ll have a proven baseline of knowledge and skills required to help keep those systems safe.

 

SCADA Cyber Range

Cyber range | 15 labs

Gain practical experience and build real-world Supervisory Control and Data Acquisition (SCADA) skills through 15 hands-on labs in the SCADA Cyber Range.

Identification and AAA

Course | 16 minutes

Learn about one of the most important information security concepts related to access management: identification, authentication, authorization and accounting (IAAA).

Access Control Fundamentals

Course | 21 minutes

Explore the essential concepts of access control in this four-video course covering access control models, implementation, concepts and enforcement.

Resiliency and Automation

Course | 9 minutes

Learn important terminology and concepts related to information security resiliency and automation in this brief overview course.

Physical Security

Course | 9 minutes

Discover how common physical and environment security controls relate to information security in this brief overview course.

Introduction to Security Controls

Course | 17 minutes

Get an overview of common security control categories and types, and learn about important concepts such as data sanitation and data sensitivity

Threats and Threat Actors

Course | 1 hour

Build your knowledge of popular threats, including malware and social engineering as well as application, wireless and cryptographic attacks.

Security Technologies and Tools

Course | 1 hour

Explore the uses of common information security technology and tools as you progress through this nine-video introductory course.

Introduction to SCADA Security

Course | 9 minutes

Get an introduction to SCADA security, including ICS types, ICS components, process control and safety systems, and strengths and weaknesses.

ICS Protocols

Course | 37 minutes

Explore common Industrial Control System (ICS) protocols and their security features as you progress through this 11-video course.

SCADA Cyber Range

This cyber range helps you develop your knowledge of SCADA and Industrial Control System (ICS) security by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of SCADA security topics, including reconnaissance, scanning, honeypots, attacks and exploits. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new SCADA security skills.

 

SCADA Cyber Range

Modbus PLC Introduction

Lab | 14 steps

Get an introduction to Modbus and gain hands-on experience via the SCADA Cyber Range.

SNMP Reconnaissance

Lab | 17 steps

Learn about abusing SNMP as you practice in the SCADA Cyber Range.

Datasheet Analysis

Lab | 4 steps

Explore getting valuable information from user manuals as you practice in the SCADA Cyber Range.

CTF 1

Lab | 4 steps

Test your reconnaissance skills as you practice in the SCADA Cyber Range.

Scanning ICS/SCADA Networks

Lab | 17 steps

Learn about scanning SCADA networks as you practice in the SCADA Cyber Range.

Attacking the Infrastructure

Lab | 23 steps

Learn about compromising a system as you practice in the SCADA Cyber Range.

Firewall Rules for SCADA

Lab | 17 steps

Get insight into SCADA firewall rules as you practice in the SCADA Cyber Range.

Exploiting OS-Level Vulnerabilities

Lab | 22 steps

Learn about Shellshock exploitation on a host system as you practice in the SCADA Cyber Range.

Extracting Network Keys

Lab | 13 steps

Test your skills with exploiting ZigBee and encryption cracking as you practice in the SCADA Cyber Range.

Wi-Fi Password Cracking

Lab | 4 steps

Learn about cracking Wi-Fi passwords as you practice in the SCADA Cyber Range.

Manipulating Protocol Data

Lab | 17 steps

Learn about manipulating protocol data as you practice in the SCADA Cyber Range.

SCADA Honeypot

Lab | 15 steps

Explore the SCADA honeypot Conpot as you practice in the SCADA Cyber Range.

Snort SCADA Rules

Lab | 19 steps

Learn about Snort SCADA rules as you practice in the SCADA Cyber Range.

CTF 2

Lab | 4 steps

Test your sniffing skills as you practice in the SCADA Cyber Range.

CTF 3

Lab | 4 steps

Test your SCADA defense skills as you practice in the SCADA Cyber Range.