Course curriculum

    1. 1 Introduction

    2. 2 Reconnaissance with SHODAN

    3. 3 Reading PLC Values on LIVE Systems

    4. 4 Modifying Values on LIVE Systems

    5. 5 Advanced Protocols Part I

    6. 6 Reconnaissance with Censys

    7. 7 Gathering Information on LIVE Systems

    8. 8 Advanced Reconnaissance

    9. 9 Advanced Protocols Part II

    10. 10 Advanced Protocols Part III

    11. 11 Advanced Protocols Part IV

    12. 12 Zero-Day in SCADA Systems Part I

    13. 13 Zero-Day in SCADA Systems Part II

    14. 14 Advanced Protection Strategies

    15. 15 Real Cases Analysis

    16. 16 IEC-104 on Metasploit

    17. 17 Hands-On Lab Part I

    18. 18 Hands-On Lab Part II

    19. 19 Hands-On Lab Part III

    20. 20 SCADA Honeypot Part I

    21. 21 SCADA Honeypot Part II

    22. 22 SCADA Honeypot Part III

    23. 23 Physical Security in SCADA Systems

    1. 1 Introduction to Advanced SCADA ICS OT Part II

    2. 2 Purdue Model

    3. 3 Finding ICS Devices Online Part I

    4. 4 Finding ICS Devices Online Part II

    5. 5 Advanced Protocols Profinet

    6. 6 Profinet Lab Analysis

    7. 7 Hacking Lab Targeting to Profinet

    8. 8 Hacking SCHNEIDER ELECTRIC

    9. 9 Advanced Protocols DNP3

    10. 10 DNP3 Lab Analysis

    11. 11 Hacking Lab Targeting DNP3

    12. 12 Advanced Protocols OPC Analysis

    13. 13 Hacking Lab Targeting to OPC

    14. 14 Advanced Protocols HART

    15. 15 HART Lab Analysis

    16. 16 Hacking Lab Targeting HART

    17. 17 Advanced Protocols MQTT

    18. 18 OWASP IoT and IIoT

    19. 19 Hacking Into a Natural Gas Power Generation Plant Part I

    20. 20 Hacking Into a Natural Gas Power Generation Plant Part II

    21. 21 Hacking Into a Natural Gas Power Generation Plant Part III

    22. 22 Recent SCADA Vulnerabilities Part I

    23. 23 Recent SCADA Vulnerabilities Part II

    24. 24 Recent SCADA Vulnerabilities Part III

About this course

  • $299.00
  • 47 lessons
  • 14.5 hours of video content

Pricing options

Explain how different pricing options might be valuable to different segments of your audience.

Reviews

5 star rating

Amazing!

Simion Timis

It's the best course I've ever taken so far! The content is priceless and the insights you gather from this? A must have.

It's the best course I've ever taken so far! The content is priceless and the insights you gather from this? A must have.

Read Less

Details

Here are some of the key highlights you will discover when you enroll in the course.

  • Explore in-depth protocols such as Profinet, DNP3, OPC, S7comm, and more.

  • Understand how ZeroDay Exploits works.

  • Analyze in depth how the most advanced attacks work in the real world.

  • Work with real-life scenarios and realistic labs for hands-on experience.

  • Physical Security and more.