Breadcrumb
  1. Training
  2. Education & Training Catalog
  3. CDW
  4. EC-Council ICS SCADA Cybersecurity

EC-Council ICS SCADA Cybersecurity

The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network architectures from attacks. Students will learn to think like a malicious hacker to defend their organizations. ICS/SCADA teaches powerful methods to analyze risks possessed by network infrastructure in IT and corporate spaces. Once your foundation or basic concepts are clear, you will learn a systematic process of intrusion and malware analysis. After this, you will learn about digital forensic process and incident response techniques upon detecting a breach. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.

Course Overview

Overall Proficiency Level
2 - Intermediate
Course Prerequisites
  • Linux operating system fundamentals, including basic command line usage.
  • Conceptual knowledge of programming/scripting.
  • Solid grasp of essential networking concepts (OSI model, TCP/IP, networking, devices, and transmission media).
  • Understanding of basic security concepts (e.g., malware, intrusion detection, systems, firewalls, and vulnerabilities).
  • Familiarity with network traffic inspection tools (Wireshark, TShark, or TCPdump) is highly recommended.
Training Purpose
Management Development
Skill Development
Specific Audience
All
Delivery Method
Classroom
Online, Instructor-Led
Course Locations

8890 McGaw Road
Suite 200
Columbia, MD 21045

625 W Adams Street
Chicago, IL 60661

5908 Headquarters Drive
Suite 400
Plano, TX 75024

201 N Franklin St
Floor 37
Tampa, FL 33602

40 E. Rio Salado Parkway
Suite 200
Tempe, AZ 85281

Course Location Map
  • Your Location
  • Providers
  • Courses
  • Course and Provider Quantity
  • Classroom
  • Online, Instructor-Led

Learning Objectives

  • Demonstrate the foundations of security and how to defend network architectures from attacks
  • Analyze risks to network infrastructure in IT and corporate spaces
  • Analyze intrusions and malware using a systemic process
  • Understand the digital forensic process and respond to incidents after a breach is detected
  • Think like a hacker and use techniques to defend against common attacks
  • Implement best practices

Framework Connections

Feedback

If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.

Last Published Date: