SCADA Intrusion Fundamentals

Target Audience: Beginner OT Pentesters, TSCM Personnel, Network Defenders

Instructor: Josiah Bryan (https://halcyonic.net/)

Where: Huntsville, AL
When: You Pick the Date

Prerequisites: None

Maximum Number of Class Slots: 15
Minimum Needed for a Class: 3

Price per Student Slot: $5,695.00

Please Contact Us for purchasing information or if you have any questions.

SKU: C0007 Categories: , Tags: ,

dThe Skinny Research and Development SCADA Intrusion Fundamentals (SIF) class tackles a new era of computing that encompasses Cyber-Physical systems, including Supervisory Control and Data Acquisition (SCADA) and Industrial Control Systems (ICS). To keep up with the increasing demand for high-speed service and the efficient delivery of household essentials, the critical infrastructure of modern society depends on computing to manage, automate, and protect assets such as power grids, food production, water treatment, sewage, traffic lights, oil and gas, and many more critical infrastructure sectors.

Attacks on critical infrastructure are becoming increasingly common with the rise of computer automation and high-speed internet connectivity. In comparison with traditional cyber attacks, attacks on SCADA systems pose a physical risk to human lives and the surrounding environment.

Students will gain the technical and procedural skills required to efficiently assess the cybersecurity posture of SCADA systems, and take advantage of these flaws to induce physical effects. The SCADA Intrusion Fundamentals class is hands-on focused and will provide students with the unique opportunity to manipulate physical systems using advanced cyber tactics. By the end of the course, students will walk away with a selection of tools, software, and procedures to ensure they can replicate methodologies and continue developing their skills using their own personal SCADA test range.

Students will receive:

LoRa Radio Microcontroller

USB Rubber Ducky

Unipi 1.1 Board

Raspberry Pi

Mervis Software License

16 GB MicroSD Memory Card


Day 1 Day 2 Day 3 Day 4 Day 5
SCADA Systems
Internet SCADA Systems
Finding Credentials
Nmap/Netcat Exercise
Acessing the HMI
Phishing Campaigns
Sniffing Traffic
Finding Devices
Attacking SCADA Devices Exercises
Attacking SCADA Devices Exercises
Packet Analysis
SCADA & Metasploit
LoRA for Distance
Intercepting LoRa
Transmitting with LoRA
LoRa Manipulation
USB Attacks
Known Vulnerabilities
Capture the Flag Event
Continuous Learning Materials