Overview
This hands-on training program equips participants with the critical skills needed to identify and mitigate cybersecurity risks in ICS and OT environments. Taught by experienced field professionals, the course emphasises real-world applications, from air-gap bypassing techniques to network forensics and fuzzing. With dedicated assistant instructors providing 1:1 coaching and support throughout the labs, participants can deepen their understanding through personalized guidance. This program is ideal for engineers, security practitioners, and IT teams who seek practical, immediate competencies in safeguarding industrial infrastructure.
Course Description & Learning Outcomes
As industrial systems become increasingly connected, the threat landscape facing critical infrastructure continues to expand. The ICS/OT Cybersecurity Training is a three-day immersive program designed to provide cybersecurity professionals with hands-on experience in identifying vulnerabilities of Operational Technology (OT) and Industrial Control Systems (ICS). Led by industry experts with direct field experience, this training offers unique insights into real-world attack scenarios and defense strategies. Participants will engage in practical labs on bypassing air gaps using USB, Radio Frequency, and DNS-based techniques, conduct protocol vulnerability assessments, and explore fuzzing-based discovery methods. The program also includes foundational training on PLCs, HMIs, and ICS network forensics. With assistant instructors available for 1:1 coaching during the labs, participants receive tailored support to maximize their learning outcomes.
Recommended for:
This training is ideal for professionals who are responsible for the security, safety, and reliability of industrial control systems (ICS) and operational technology (OT), including:
OT Engineers
Automation Facility Safety and Security Managers
ICS Security Managers
ICS Network/System Administrators
Security Researchers
IT Support and Infrastructure Teams
Whether you are directly involved in managing industrial networks or supporting cybersecurity initiatives in OT environments, this training will help you build essential knowledge and skills to protect critical infrastructure.
Hands-on Tools
Participants will gain practical experience using a wide range of simulation platforms, testbeds, hardware, and software tools commonly used in ICS/OT cybersecurity environments. These Hands-on Simulations and Tools are developed in-house, by the instructors.
Simulation and Hardware Tools:
RA-T Runway, RA-T Crane, RA-T SFPCS, RA-T SmartCity, HackRF, P4wnP1, Teensy
Software and Programming Tools:
VMWare Workstation, Siemens TIA Portal, Shodan, Censys, StealthMole, Python, WireShark
Recommended Prerequisites
To fully benefit from this training, participants are expected to have the following foundational knowledge:
Basic understanding of information security domains
Familiarity with Linux-based operating systems (especially Kali Linux)
Introductory knowledge of Python programming
Basic skills in network vulnerability analysis
While not required, foundational knowledge enables participants to gain maximum benefit from the hands-on exercises.
Schedule
End Date: 19 Jun 2025, Thursday
Time: 9:30am - 6:00pm
Location: 32 Carpenter Street, 059911Agenda
Day/Time | Agenda Activity/Description |
---|---|
17 June Day 1 | 9:30-11:00 Orientation 11:00-12:00 ICS/SCADA Case Studies 13:30-18:00 PLC & HMI Logics Design |
18 June Day 2 | 09:30-12:00 Bypassing the Airgap 13:30-16:30 ICS/SCADA Network Protocol Vulnerabilities 16:30-18:00 OSINT Methodology for OT Security |
19 June Day 3 | 09:30-11:30 ICS Software Vulnerability with Fuzzing 11:30-12:00 ICS Environment Protection 13:30 -18:00 Mini CTF and Summary |
Pricing

Skills Covered
PROFICIENCY LEVEL GUIDE
Beginner: Introduce the subject matter without the need to have any prerequisites.
Proficient: Requires learners to have prior knowledge of the subject.
Expert: Involves advanced and more complex understanding of the subject.
- Cybersecurity (Proficiency level: Expert)
- Control Systems (Proficiency level: Expert)
- Transmission Control Protocol/Internet Protocol (TCP/IP) (Proficiency level: Expert)
- Power and Energy System Knowledge (Proficiency level: Proficient)
- Radio frequency (RF) (Proficiency level: Expert)
- Computer Science (Proficiency level: Proficient)
Speakers
Trainer's Profile:
Hae-eun Moon, Researcher / Security Consultant, NSHC Inc
- CS Device Zero-Day Vulnerability Chief Detector/Analyst - IoT Device & Application Zero-Day Vulnerability Chief Detector/Analyst - 2019-Present | DSTA CDDC CTF Organizer - 2019-2023 | MOTIE CTF Organizer - 2018-Present | DEF CON ICS/SCADA CTF Organizer - 2016-Present | NSHC Training (ICS/SCADA, IoT Exploitation) Instructor - 2017, 2019 | STUD S3 CTF Winner - 2015, 2017 | CODE BLUE Hack2Win Winner - 2009, 2013 | DEF CON 17th, 21st CTF Finalist
Trainer's Profile:
Rana, Researcher / Security Consultant, NSHC Inc
- ICS/SCADA Security Researcher - Regional Manager (EMEA) - 2022 - Present | DEFCON RED ALERT ICS CTF Organizer - 2022 - Present | DSTA CDDC CTF Organizer - 2021 | Hack In The Box - CyberWeek - OT Security Villager - 2019 - Present | NSHC Training (ICS/SCADA) Instructor - 2019 | International Atomic Energy Agency - Instructor/SME for Protecting Computer Based Systems in Nuclear Securit
Trainer's Profile:
Sunghun Do, Researcher / Security Consultant, NSHC Inc
- PLC/HMI Testbed Engineer - 2022 - Present | Brainhack CDDC CTF Organizer - 2021 - Present | ICS/OT Security Training Instructor (PLC/HMI Basics) - 2021 | DEF CON ICS/SCADA CTF Organizer - 2020 - 2021 | MOTIE CTF Organizer - 2018 - 2020 | Manager, PLC-based Automatic Machinery Production & Installation
Partners
