Study any time, from any device.

Learn ICS/SCADA Security Fundamentals

The ICS/SCADA Security Fundamentals skill path provides you with foundational knowledge about SCADA systems and security, including protocols, access controls, physical security, cybersecurity tools and more.

9 courses  //   43 videos  //   7 hours of training

ICS/SCADA Security Fundamentals training

This learning path introduces the challenges related to securing industrial control systems. You’ll build your ICS/SCADA knowledge by progressing through nine courses. Then test your new skills on the cyber range across 15 hands-on labs. Upon completion, you’ll have a proven baseline of knowledge and skills required to help keep those systems safe.

Learning path components

SCADA Cyber Range
Cyber Range
SCADA Cyber Range

SCADA Cyber Range

Gain practical experience and build real-world Supervisory Control and Data Acquisition (SCADA) skills through 15 hands-on labs in the SCADA Cyber Range.

15 labs
3 hours of training

Identification and AAA
Course
Identification and AAA

Identification and AAA

Learn about one of the most important information security concepts related to access management: identification, authentication, authorization and accounting (IAAA).

4 videos
16 minutes of training

Access Control Fundamentals
Course
Access Control Fundamentals

Access Control Fundamentals

Explore the essential concepts of access control in this four-video course covering access control models, implementation, concepts and enforcement.

4 videos
22 minutes of training

Resiliency and Automation
Course
Resiliency and Automation

Resiliency and Automation

Learn important terminology and concepts related to information security resiliency and automation in this brief overview course.

1 video
9 minutes of training

Physical Security
Course
Physical Security

Physical Security

Discover how common physical and environment security controls relate to information security in this brief overview course.

1 video
10 minutes of training

Introduction to Security Controls
Course
Introduction to Security Controls

Introduction to Security Controls

Get an overview of common security control categories and types, and learn about important concepts such as data sanitation and data sensitivity.

3 videos
17 minutes of training

Threats and Threat Actors
Course
Threats and Threat Actors

Threats and Threat Actors

Build your knowledge of popular threats, including malware and social engineering as well as application, wireless and cryptographic attacks.

6 videos
61 minutes of training

Security Technologies and Tools
Course
Security Technologies and Tools

Security Technologies and Tools

Explore the uses of common information security technology and tools as you progress through this nine-video introductory course.

9 videos
59 minutes of training

Introduction to SCADA Security
Course
Introduction to SCADA Security

Introduction to SCADA Security

Get an introduction to SCADA security, including ICS types, ICS components, process control and safety systems, and strengths and weaknesses.

4 videos
9 minutes of training

ICS Protocols
Course
ICS Protocols

ICS Protocols

Explore common Industrial Control System (ICS) protocols and their security features as you progress through this 11-video course.

11 videos
37 minutes of training

 

What you’ll learn.

  • Security and access controls fundamentals
  • Identification, authentication, authorization and accounting (IAAA)
  • Common cyber threats
  • Popular security tools
  • SCADA security basics
  • Process control networks (PCN) overview
  • ICS protocol features

Who is this for?

A basic understanding of how Supervisory Control and Data Acquisition (SCADA) systems work is recommended. This skill path is designed for:

  • SCADA supervisors
  • SCADA system administrators
  • SCADA analysts
  • SCADA vendors
  • Anyone with a desire to learn how to protect critical infrastructure!

SCADA Cyber Range

This cyber range helps you develop your knowledge of SCADA and Industrial Control System (ICS) security by practicing on cloud-hosted virtual machines. You’ll build and reinforce your skills as you progress through labs covering a wide range of SCADA security topics, including reconnaissance, scanning, honeypots, attacks and exploits. You’ll also perform several Capture the Flag (CTF) exercises designed to validate your new SCADA security skills.

 

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer