Through the end of the year, use promo code HOLIDAY30 at checkout to get 30% any of our subscriptions!

![]() |
![]() |
![]() |
||||
| $55/Month | $50/Month | $41.67/Month | ||||
| SUBSCRIBE | SUBSCRIBE | SUBSCRIBE | ||||
|
|
Not ready for the range? First learn foundational concepts of cybersecurity, industrial control systems (ICS), operational technology (OT), and the unique challenges of securing ICS.
Not sure what a term or acronym means? You’re in the right place. This glossary is your go-to guide for understanding the key terms and acronyms used in OT cybersecurity. Whether it's a protocol, standard, or security concept, we’ve broken it down to help make your training smoother and more approachable. Looking for a term we don't have? Let us know!
Through the end of the year, use promo code HOLIDAY30 at checkout to get 30% any of our subscriptions!

🚀 Our new short course on S7 and Safety PLCs is now available.

We built this course for OT engineers, cybersecurity practitioners, and anyone who wants a practical understanding of how Siemens S7 systems behave on the wire, and how attackers interact with them.
Inside the course, you’ll explore:
🔹 The foundations of the S7 protocol
🔹 How to build a simple client/server using python-snap7
🔹 Realistic reconnaissance techniques (scanning, datablock reads, device profiling)
🔹 A clear illustration of a water clarification process to ground the logic in real operations
🔹 How attackers approach safety PLC manipulation
🔹 Basic detections you can implement to start logging sensitive S7 commands
We designed it to be short, approachable, and directly useful whether you’re on the engineering side, the security side, or bridging both.

Create your own ICS security lab in VirtualBox with the open source GRFICS project to learn some of the key lessons of ICS security!

Why is it so hard to get IT and OT to work together on security? They have different priorities, strengths, and technology and can struggle to communicate their needs. Learn how to communicate with both sides in this introduction to ICS security. After completing this module, users will be able to:

This course introduces the foundational principles of Cyber-Informed Engineering (CIE), a framework that integrates cybersecurity into the engineering and design of operational technology systems. Whether you're an engineer, operator, or technical manager, you’ll learn how to reduce the consequences of cyber events by building resilience into the systems themselves. Through a combination of lecture material and hands-on lab exercises, you'll explore real-world scenarios that bring each principle to life, helping you turn “What if?” into “Even if.”
After this course, participants will be able to:
Disclaimer - This course references materials developed under contract for the U.S. Department of Energy by the Idaho National Laboratory and the National Renewable Energy Laboratory. All rights to these materials remain with their respective owners. This course is not affiliated with or endorsed by the U.S. Department of Energy or any of its contractors.

This lab-driven course trains practitioners to detect, investigate, and mitigate real-world cyber threats to port operations through a series of immersive exercises: a simulated Port of Antwerp style insider/drug-smuggling compromise, a NotPetya-style ransomware outbreak that cripples terminal logistics, targeted attacks against ship-to-shore crane control systems, and protocol-level exploitation of the Omron FINS protocol. Participants learn both offense and defense, as well as a quick overview of relevant regulations and guidelines.

The maritime transportation system (MTS) is a critical component of the world economy, with the majority of all goods transported by sea or waterways. Ports serve as essential hubs for this trade, handling millions of containers daily, ensuring the smooth flow of raw materials, energy supplies, and consumer products. However, as ports become increasingly digitalized, the potential for cyberattacks to cause massive financial damage increases, as was the case for the NotPetya ransomware.

S7 is the proprietary protocol used by older Siemens automation equipment. In this module, learn about attacks and defenses focused on the S7 protocol!

Writing "secure" PLC programs is hard, but static analysis can help. This is a practical short course designed to help engineers, PLC programmers, and security professionals improve the security and quality of their PLC programs. Participants will learn how to apply static analysis techniques to PLC programs, using an enhanced version of the open-source IEC-Checker tool to detect common coding flaws, such as missing input validation and poor coding patterns, in the IEC 61131-3 Structured Text language. The course covers both the fundamentals of static analysis and hands-on guidance for integrating these practices into existing workflows, helping teams build more robust and secure control logic. No prior experience with static analysis is required.

(Lab) Take on the role of an attacker in the DMZ network of a power plant, learning how to exploit the common vulnerabilities there and pivot deeper into the ICS network. After completing this chapter, users will be able to:
• Use basic Linux commands and tools (whoami, pwd, ls, mkdir, nano, cd, mv, cp, rm, man)
• Run basic network scans with nmap
• Understand the function of historians in ICS networks
• Test for SQL injection vulnerabilities
• Perform man-in-the-middle (MITM) attacks using ARP spoofing
• Explore ICS protocols using Wireshark
• Run password cracking tools against remote access protocols (SSH)
• Check for weak passwords by running a cracking tool against password files

(Lab) After pivoting into the ICS network, continue your exploration of common ICS protocol and software vulnerabilities to reprogram a PLC and cause a power outage in the simulated power plant. After completing this chapter, users will be able to:
• Run advanced network scanning to enumerate ICS devices
• Run password cracking tools against remote access protocols (RDP)
• Understand the function of HMIs in ICS networks
• Perform man-in-the-middle (MITM) attacks using ARP spoofing
• Explore ICS protocols using Wireshark
• Understand how PLCs are programmed

(Lab) Using lessons learned from successfully attacking the power plant in Chapters 1 and 2, learn how to harden and secure ICS assets using various endpoint defenses. After completing this chapter, users will be able to:
• Validate operator inputs on HMIs
• Add safety checks to PLC programs
• Scan for malware using Yara
• Investigate Windows event logs, and set up audit policies
• Use the Windows powershell command line (ps, select-string, netstat)
• Use intermediate level Linux commands (ps, grep, netstat)
• Investigate Linux logs
• Write basic Linux host firewall rules

(Lab) Using lessons learned from successfully attacking the power plant, learn how to harden the ICS network with firewalls, monitoring systems, and intrusion detection systems.. After completing this chapter, users will be able to:
• Monitor network flows
• Install and monitor an inline network intrusion detection system
• Investigate DNS exfiltration traffic
• Use Fortiphyd Logic's LogicWatch product to monitor the ICS network
• Write basic network firewall rules

(Lab) In this advanced level module, take a deep dive into the Modbus traffic of a simulated chemical plant to understand how to attack and harden one of the most common ICS protocols in use. After completing this chapter you will be able to

(Lab) The Industrial IoT promises to make ICS more efficient than ever before, but with great technology comes great responsibility to secure it. In this course, exploit and mitigate common IIoT vulnerabilities in a simulated power plant. After completing this chapter you will be able to:

(Lab) In this advanced level module, get hands on experience with the BACnet protocol in a simulated server room cooling system to understand how to attack and harden one of the most common building automation system (BAS) protocols in use. After completing this chapter you will be able to

(Lab) DNP3 is one of the most popular protocols used in SCADA networks like the power grid, water utilities, and train systems. In this hands-on lab course, learn some of the biggest ways attackers can abuse DNP3 and what you can do to prevent and detect their attacks.

After completing this module, users will be able to:

After completing this module, users will be able to:

After completing this module, users will be able to:

After completing this module users will be able to:

After completing this module users will be able to:
After completing this module users will be able to:
After completing this module users will be able to:
After completing this module users will be able to
After this course, users will be able to:

(Lab) So much attention is paid to securing industrial control systems at various levels in the network, but what can controls engineers do to help secure the PLCs that are actually translating digital commands into physical actions?
In this 4-part series learn how the "Top 20 Secure PLC Coding Practices" provides PLC programmers with the first ever industry guidelines for adding basic security to the PLC programming itself. Practice the various guidelines in simulated ICS networks including power generation, power distribution, and building automation networks.
Part 4 of the 4-part series covers:

(Lab) So much attention is paid to securing industrial control systems at various levels in the network, but what can controls engineers do to help secure the PLCs that are actually translating digital commands into physical actions?
In this 4-part series learn how the "Top 20 Secure PLC Coding Practices" provides PLC programmers with the first ever industry guidelines for adding basic security to the PLC programming itself. Practice the various guidelines in simulated ICS networks including power generation, power distribution, and building automation networks.
Part 3 of the 4-part series covers:

(Lab) So much attention is paid to securing industrial control systems at various levels in the network, but what can controls engineers do to help secure the PLCs that are actually translating digital commands into physical actions?
In this 4-part series learn how the "Top 20 Secure PLC Coding Practices" provides PLC programmers with the first ever industry guidelines for adding basic security to the PLC programming itself. Practice the various guidelines in simulated ICS networks including power generation, power distribution, and building automation networks. Part 2 of the 4-part series covers:

(Lab) So much attention is paid to securing industrial control systems at various levels in the network, but what can controls engineers do to help secure the PLCs that are actually translating digital commands into physical actions?
In this 4-part series learn how the "Top 20 Secure PLC Coding Practices" provides PLC programmers with the first ever industry guidelines for adding basic security to the PLC programming itself. Practice the various guidelines in simulated ICS networks including power generation, power distribution, and building automation networks. Part 1 of the 4-part series covers: