ICS SCADA Security Training

2018
12 – 14 Dec, 2018 Seoul, Korea NSHC initiative
25 – 26 Nov, 2018 Dubai, UAE Conference: Hack in the Box Dubai
12 – 15 Nov, 2018 Seoul, Korea Private: Korean Government Institution
5 – 7 Sep, 2018 Seoul, Korea NSHC initiative
29 – 31 Aug, 2018 Singapore NSHC initiative
24 – 26 Jul, 2018 Indonesia Collaboration: with PT. INM
21 – 23 May, 2018 Singapore Conference: Infosec in the City
9 – 11 May, 2018 Seoul, Korea NSHC initiative
2017
12 – 14 Dec, 2017 Seoul, Korea NSHC initiative
27 – 30 Nov, 2017 Kuala Lumpur, Malaysia Collaboration: with Condition Zebra
7 – 8 Nov, 2017 Tokyo, Japan Conference: CodeBlue2017
20 – 22 Sep, 2017 Seoul, Korea KOEN
13 – 15 Sep, 2017 Tokyo, Japan Collaboration: with NHN
21 – 23 Aug, 2017 Singapore Conference: HITB GSEC Singapore
20 – 21 Jun, 2017 Chonburi, Thailand Amata B Grimm Power Plant II
15 – 16 Jun, 2017 Chonburi, Thailand Amata B Grimm Power Plant I
7- 9 Jun, 2017 Seoul, Korea NSHC initiative
22 – 25 May, 2017 Kuala Lumpur, Malaysia Collaboration: Condition Zebra
16 – 18 May, 2017 Abu Dhabi, UAE NSHC initiative
10 – 12 Apr, 2017 Amsterdam, Netherlands Conference: HITB GSEC Amsterdam
5 – 7 Apr, 2017 Macau Private: CEM
8 – 10 Feb, 2017 Seoul, Korea NSHC initiative
17 – 20 Jan, 2017 Hong Kong Private: Hong Kong Police Office
2016
30 Nov – 2 Dec, 2016 Singapore Private Client
29 – 30 Nov, 2016 Taipei, Taiwan Conference: HITCON
18 – 19 Oct, 2016 Tokyo, Japan Conference: CodeBlue2016
30 – 31 Aug, 2016 Bangkok, Thailand Private Client
11 – 12 Jul, 2016 Seoul, Korea Conference: SECUINSIDE
10 – 13 Feb, 2016 Seoul, Korea NSHC initiative
11 – 15 Feb, 2016 Singapore Private Client

ICS/SCADA system controls most of the critical infrastructures today. The system may seem safe due to its OT nature or the latest patching technology, but it is still penetrable. One should truly understand how to penetrate, in order to find out effective ways to defend.

Students will learn the components and architecture,latest threat information, and how to pen-test ICS/SCADA system. Actual field devices and ICS/SCADA simulation will be utilized to teach zero-day vulnerabilities found on ICS/SCADA related product and how to find zero day vulnerabilities.

Why Advanced ICS/SCADA Security Training?

Due increasing cyber threat
in ICS/SCADA facilities

Understand how
ICS/SCADA facilities work

Find out vulnerabilities that
exist in ICS/SCADA facilities

Imitate how hackers may
attack the facilities

Weigh the benefit and cost
of patching the facilities

Secure the IT & OT area

Unique Strengths

Hands-On Kit

Trainees are offered with hands-on kit where
they can use to hack the system and understand
offensive point of view

Customized Training

Our training can be fully customized to cater
for various needs in companies & institutions

Impact Visualization

Utilizing our very own simulation test-bed
with PLC and HMI used in real world scenario

Red Alert’s Analysis Report

Training also provides detailed report made by NSHC’s professional researchers

Who should take this training?

Security Researcher

IT Team

OT Engineer

System/Network
Administrator

Anyone

Standard Curriculum