Early bird registration rate ends on the 30th of September
Overview
ICS/SCADA system controls most of the critical infrastructures today. The system may seem safe due to its OT nature or the latest patching technology, but it is still penetrable. One should truly understand how to penetrate, in order to find out effective ways to defend.
Students will learn the components and architecture,latest threat information, and how to pen-test ICS/SCADA system. Actual field devices and ICS/SCADA simulation will be utilized to teach zero-day vulnerabilities found on ICS/SCADA related product and how to find zero day vulnerabilities.
Who Should Attend
Security Researchers
IT Team from Infrastructure Facility
OT Engineer
System/Network Administrator
Anyone Who Interested in ICS/SCADA Security
Key Learning Objectives
Understand how ICS/SCADA facilities work
Find out vulnerabilities that exist in ICS/SCADA facilities
Imitate how hackers may attack the facilities
Weigh the benefit and cost of patching the facilities
Secure the IT & OT area
ICS/SCADA Targeted Malware & Ransomware
ICS/SCADA Targeted Hacking & APT
Scanning for HMIs and PLCs, leading to Web Hacking:
How to reveal Internet connected PLC and HMI
How to attack Internet connected control system
Vulnerabilities on ICS/SCADA Protocols
How to find 0 day vulnerability of ICS/SCADA Software
Understand the flow of ICS/SCADA targeted attack through network packet analysis