Introduction to Industrial Control System Malware
Learn about ICS-specific threats and how to protect your organization from them.
Recognize the difference between traditional malware and malware tailored for industrial control systems
Understand why malware that targets industrial control systems is so dangerous
Be acquainted with how ICS-specific malware is introduced into an industrial network
Be able to explain specific defensive measures that can be used to defend industrial networks against specific threats
Be prepared to provide stakeholders with concrete examples of how malware could be used to impact your industrial assets
1.1. What is Havex?
1.2. How to Defend against Havex | Spear Phishing Attacks
1.3. How to Defend against Havex | Watering Hole Attacks
2.1. What is BlackEnergy?
2.2. Attack Vector
2.3. Functionality and Target
2.5. Defending Industrial Networks Against BlackEnergy | Part 1
2.6. Defending Industrial Networks Against BlackEnergy | Part 2
2.7. Defending Industrial Networks Against BlackEnergy | Part 3
3.1. What is Industroyer/CRASHOVERRIDE?
3.2. Industroyer Functionality
3.3. Industroyer Attack Vector and Targets
3.4. Industroyer Malware Detection
3.5. Defending Against Industroyer | Part 1
3.6. Defending Against Industroyer | Part 2
3.7. Defending Against Industroyer | Part 3
3.8. Defending Against Industroyer | Part 4
3.9. Defending Against Industroyer | Part 5
3.10. Defending Against Industroyer | Part 6
3.11. Defending Against Industroyer | Part 7
You have a background in industrial control systems, and want to pursue a career in cybersecurity
You are familiar with basic cybersecurity concepts, but are new to cybersecurity for industrial control systems
You have a need to defend your industrial networks
You need to know how to communicate business risk posed by insecure configurations or poor security architecture to stakeholders
we’ll help you get the skills you need to stand out and get hired!
You can immediately apply learnings and improve your results.
You'll get access to this course and ultimate access to the rest of the courses in the library.
Yes. RealPars will issue a Certificate of Completion (certified by RealPars) when you complete the course.
Industrial Control System Malware is a type of malicious software that specifically targets industrial control systems, which are used to manage and control critical infrastructure such as power grids, water treatment plants, and manufacturing facilities.
This course is ideal for security professionals who want to learn more about ICS-specific threats and how to protect their organizations from them. It's also beneficial for anyone who wants to gain a better understanding of cybersecurity threats in the industrial sector.
In this course, you'll learn about the different types of Industrial Control System Malware and how they work, as well as how to identify and respond to potential threats. You'll also learn about the importance of defense-in-depth strategies and best practices for securing industrial control systems.
Yes, this course is designed for anyone who wants to learn about Industrial Control System Malware, regardless of their technical background or experience.
There won't be any specific hardware or software required for completing this course.
Yes. Most people enroll individually, and then submit their receipt to their employer for reimbursement. However, if your employer has a tuition budget and wants to train 5 people or more, you can send us an email at [email protected] and we will help you with bulk signup.
Of course. All of our course content is pre-recorded, so you can work and study on your own time.
Nope! All our courses are offered online, so you can take them from anywhere in the world. All you need is a high-speed internet connection and the applicable software for your course.