The ‘how’ is no longer a question in today’s advanced persistent threat (APT) as exploits’ availability becomes rampant from both shallow and the dark web, but ‘when’ where every industrial control system’s security and incident responders are still not ready.
1: Gain understanding of cyber-kinetic attack vectors through demos.
2: Learn how to attack and defend ICS/SCADA (applicable to red and blue teamers).
3: Understand threat modeling that can be used to formulate effective security posture.
ICS/SCADA, digital forensics, malware analysis, incident response.
Hackers & Threats
Share With Your Community