ICS.211 Certified OT Security Technical Expert TÜV® (COSTE)

Advanced training for OT Security with a technical focus
Duration: 2.5 days
Price: € 2550 plus VAT
Language: German or English
Requirements: Certified OT Security Practitioner (COSP) TÜV® recommended
Degree: COSTE-Certification by TÜV Austria
Training Format: Public and in-house training possible

Technicians and engineers in particular are increasingly required in industrial operations to make or prepare the right decisions concerning appropriate technical security measures and security technologies. This requires deeper security knowledge and a good understanding – be it of threats, current attack campaigns or the use of technical protection measures.

Content of Training

  • Introduction
    • Procurement of a secure system
    • IEC 62443 risk analysis
  • ICS/OT protocols
    • Overview Wired and Wireless Protocols
    • Industrial Protocol Details
      • Profinet and Profibus
      • Modbus
      • IEC 60870-5-104
      • IEC 61850
      • IEC 62351
      • OPC and OPC UA
      • Hart and Wireless Hart
      • Bacnet
      • DNP3
      • CANbus
      • EtherNet/IP
      • S7comm
      • MQTT
    • Wireless Protocol Details
      • Bluetooth
      • Wifi
      • Cellular network
      • ZigBee
      • SATCOM
      • LoRa (Long Range) and LoRaWAN
    • Securing industrial protocols
    • Wireshark
  • Network-based attacks
    • Denial of service attacks
    • Sniffing
    • Man in the middle attacks
    • SMB relay
    • Incident handling introduction
  • Advanced OT Network Security
    •  Network segmentation
      • Separation of IT and OT
      • Introducing a DMZ
      • Introducing zones with PERA (Purdue Enterprise Reference Architecture)
      • Implementing micro-segmentation
      • Pitfalls and benefits
    • ICS Firewall
      • Policies
      • Recommendations
      • ICS specific firewall topics
    • Honeypots
      • Examples for honeypots in OT
      • ICS honeypots and scanning
    • Concluding exercise
  • Applying security measures in OT
    • Overview of security requirements and implementation
    • User Management
    • Credential Management
    • Host Hardening
    • System Monitoring and Network Detection
    • Remote Access
    • Backup and Recovery
    • IEC 62443 certification
  • Lockpicking Challenge and Q&A

After the training the participants should

  • further consolidate and deepen existing knowledge in IT and OT security.
  • know how to technically implement security measures in the OT operation.
  • have a basic understanding of OT transmission technologies and protocols.
  • understand different network protection measures in the OT through the Purdue model.
  • know the procedure for partitioning and zoning of an architecture according to IEC 62443 including the security levels.
  • have gained insight into the use of honeypot systems against attackers.
  • understand the relationship between physical security and OT Security.

Training Dates

29. June – 01. July 2021

ICS.211 Certified OT Security Technical Expert TÜV® (COSTE)
29. June – 01. July 2021, 8.30 am – 4.30 pm
Language: German
Online, € 2550 plus VAT

Register now

13. – 15. October 2021

ICS.211 Certified OT Security Technical Expert TÜV® (COSTE)
13. – 15. October 2021, 8.30 am – 4.30 pm
Language: German
Brunn a. Gebirge / Online, € 2550 plus VAT

Register now

Self-Assessment Quesstionnaire

Our Self-Assessment Questionnaire gives you an idea of whether you are a suitable candidate for the Certified OT Security Technical Expert training. To enroll in the advanced training courses, we require proof of your experience and training in the OT Security area, regardless of the result of the questionnaire. Based on the provided documents, we will decide whether to enroll you directly in the advanced course.

1. Which of the following is not a valid PROFINET communication method?
2. Which of the following techniques is not a DoS attack type?
3. What measure is the most effective to prevent a SMB Relay attack:
4. With asymmetric encryption
5. Which of the following statements is true about honeypots?
6. Which of the following tasks is not a hardening measure?
7. Which of the following statements about keyloggers is wrong?
8. What is MITRE ATT&CK for ICS?