Industrial
Security
Professional (ISP)
Gain skills to assume entry-level positions in Cyber Security Operations!
Learn everything to get started
Industrial Security Professional
- What you get
- Who Should Attend
- 30 Days Access to Cyber Range Virtual Labs
- Access to e-learning videos
- Clean Exit Professional Ethics Certification
- Profile in the National Security Database
- Security Researchers
- Students and Professionals keen in bug bounty programs
- Candidates participating in Hackathons
- Teams participating in Security Competitions
- Aspiring security professionals
- Military and police personnel
The Cyberverse Advantange
Live Attacks
Instructor-Support
30 Days Cyber Range Virtual Labs
100% Practical Course
Empanelment at Falcon Level in NSD
Get Recorded Class Lectures
Exam Fee Included
Certificate Included
PROGRAM
Features & Benefits
ISAC ID Card
- Get the exclusive ISAC ID Card
- Enhance your profile credibility globally
- Eligible for NSD Empanelment
30 Days Access to Cyberange Virtual Labs
- Exclusive labs on bug bounty
- Real-world scenarios for practice
- Cloud-based labs with new challenges added every month!
VALUE ADDITION : PROFESSIONAL ETHICS AT WORKPLACE TRAINING AND CERTIFICATION
Our Batches
07/08/22
07/08/22
Upcoming Events:
You will get weekly assignments and research work to enhance your course understanding.Â
Application Deadline :
One day before the start date of class every month
Examination
24 Hours Lab Exam under the Information Sharing and Analysis Center
Program Modules
Introduction to ICS/SCADA Network Defense
- IT Security Model
- ICS/SCADA Security Model
- Security Posture
- Risk Management in ICS/SCADA
- Risk Assessment
- Defining Types of Risk
- Security Policy
TCP/IP
- Introduction and Overview
- Introducing TCP/IP Networks
- Internet RFCs and STDs
- TCP/IP Protocol Architecture
- Protocol Layering Concepts
- TCP/IP Layering
- Components of TCP/IP Networks
- ICS/SCADA Protocols
 Introduction to Hacking ICS/SCADA
- Review of the Hacking Process
- Hacking Methodology
- Intelligence Gathering
- Footprinting
- Scanning
- Enumeration
- Identify Vulnerabilities
- Exploitation
- Covering Tracks
- Hacking ICS/SCADA Networks Protocols
- How ICS/SCADA Are Targeted
- Study of ICS/SCADA Attacks
- ICS/SCADA as a High–Value Target
- Attack Methodologies In ICS
Vulnerability Management
- Challenges of Vulnerability Assessment
- System Vulnerabilities
- Desktop Vulnerabilities
- ICS/SCADA Vulnerabilities
- Interpreting Advisory Notices
- CVE
- ICS/SCADA Vulnerability Sites
- Life Cycle of a Vulnerability and Exploit
- Challenges of Zero-Day Vulnerability
- Exploitation of a Vulnerability
- Vulnerability Scanners
- ICS/SCADA Vulnerability Uniqueness
- Challenges of Vulnerability Management Within ICS/SCADA
- Prioritizing Vulnerabilities
- CVSS
- OVAL
Standards and Regulations for Cybersecurity
- ISO 27001
- ICS/SCADA
- NERC CIP
- CFATS
- ISA99
- IEC 62443
- NIST SP 800-82
Securing the ICS Network
- Physical Security
- Establishing Policy – ISO Roadmap
- Securing the Protocols Unique to the ICS
- Performing a Vulnerability Assessment
- Selecting and Applying Controls to Mitigate Risk
- Monitoring
- Mitigating the Risk of Legacy Machines
 Bridging the Air Gap
- Do You Really Want to Do This?
- Advantages and Disadvantages
- Guard
- Data Diode
- Next Generation Firewalls
Introduction to IDS
- What IDS Can and Cannot Do
- Types IDS
- Network
- Host
- Network Node
- Advantages of IDS
- Limitations of IDS
- Stealthing the IDS
- Detecting Intrusions
Hands-on Red-teaming for ICS/SCADA
- Introduction
- Attack Surface
- Simulate Attack
- Lateral Movement
- Exploitation
- Post Exploitation
- Conclusion
30 Days Access to Cyber Range Virtual Labs
The ISAC Industrial Security Professional is a fully hands-on program! You get access to Cyber Range Virtual Labs for 30 days. Gain practical knowledge and fundamental skills with multiple vulnerable applications and Kali OS Distribution on the cloud exclusively for you.