Description
3 days
€ 3.350,- plus VAT
(incl. certification exam)
8 persons
ICS.205 Certified OT Security Practitioner (COSP) or an equivalent course or at least 6 months of relevant professional experience averaging at least 20 hours per week.
Completion: Attendance confirmation; in case of successful participation in the certification exam COSTE-personal certification by TÜV Austria GmbH
What you can expect from the
ICS.211 Certified OT Security Technical Expert (COSTE)
Persons certification available
After completing the 2.5-day OT security training course focusing on the key areas, participants can take a persons certification exam administered by TÜV AUSTRIA Academy – ideal for industry professionals who want to gain proof of their security expertise.
Practical learning
All training courses that offer persons certification include a significant practical component, featuring hands-on labs, realistic simulations, and a personalized exercise handbook to promote effective, practical learning.
Always at the cutting edge
Our training courses are revised at least once a year – current findings, new threat scenarios, and real incidents are continuously incorporated into the content.
What you will learn during this training course
Day 1
Introduction
- OT treat landscape
- Procurement of a secure system
- Risk analysis according to IEC 62443-3-2
OT protocols
- Common wired and wireless OT protocols
- Understanding OT protocols at a technical level
- Wireless protocols in OT environments
- Securing industrial protocols
- Network and protocol analysis with Wireshark
Day 2
Network-based attacks
- MAC adress spoofing
- Denial of service attacks
- Network sniffing
- Protocol spoofing
- Man-in-the-middle attacks
Improving OT network security
- Network segmentation
- Using firewalls in OT networks
Day 3
Applying security measures in OT
- Security requirements and implementation
- User management
- Credential management
- Host hardening
- System monitoring and network detection
- Anomaly and threat detection
- Remote Access
- Backup and recovery
- OT security market guide
- OT security trends
Final Challenge
After the training, the participants have
- consolidated and deepened their existing knowledge of IT and OT security.
- have a basic understanding of OT data transmission technologies and specific protocols.
- have understood the different network protection measures of OT based on common attacks.
- have become familiar with a structured methodology for partitioning and zoning of an architecture.
- have gained insights into the use of monitoring systems against attackers.
- have learned how security measures can be technically implemented in OT operations.
What others say
Is the Technical Expert Training suitable for you?
Find out in just a few minutes – with our short COSTE Questionnaire for self-assessment.
Training highlights of the
ICS.211 Certified OT Security Technical Expert (COSTE)
In the training ICS.211 Certified OT Security Technical Expert (COSTE) you can expect a special highlight: a comprehensive Exercise Handbook that guides you step by step through a variety of practical exercises – ideal for directly applying and deepening your knowledge.
In our training environment, you will work with realistic OT simulations and professional tools – alone or in a team. You will experience first-hand how attacks on industrial control systems can be detected, analyzed and defended against.
You can look forward to a wide variety of task formats – from hands-on labs to tabletop simulations:
- Manipulating Modbus & MQTT – understanding and securing protocols
- Analyze network traffic – with Wireshark and real PCAP files
- DoS attacks on S7 PLCs – recognizing vulnerabilities and discussing countermeasures
- Planning network segmentation – designing secure OT architectures
- Threat modeling & impact analyses – systematically assessing risks
The course concludes with a final challenge in which you put all your knowledge to the test – an exciting combination of forensic analysis, cryptography and practical attack detection.
Get your TÜV® persons certificate now!
Our OT security training courses not only provide knowledge, but also official proof of your competence.
Get to know our
trainers

Kerstin Reisinger
is an Offensive Security Certified Professional and trainer for Industrial Security. As a long-standing, experienced project manager in complex OT security projects, she supports industrial companies and energy suppliers with a great deal of technical knowledge. She likes to incorporate this experience into her classes as war stories.

Lucas Brandstätter
supports companies in the introduction of management systems with his vast knowledge in the ISMS (ISO 27000) and OSMS (IEC 62443) area. In risk analyses and penetration tests, he checks systems for untapped potential for improvement. In training courses he emphasizes interactive feedback from participants.

Thomas Brandstetter
is our „broad-spectrum antibiotic“ against security ignorance. As a Stuxnet Incident Handler and former head of Siemens ProductCERT, he knows industrial security from all life-cycle phases. He is Professor of IT and OT Security at the University of Applied Sciences St. Pölten and is certified for CISSP, GSEC, GICSP and GRID.

Peter Panholzer
is veteran of the first hour for industrial security and secure software development. He is a certified ISO 27001 auditor, member of the OVE working group on IEC 62443, hacker and for over ten years trainer for secure coding. He loves to give the participants tricky tasks and to assist them with the right security tips.

Sixtus Leonhardsberger
is an OT Security Specialist with a focus on penetration testing of OT environments and embedded devices/IoT devices. In addition to his passion for technical OT security topics, he also shares his experience from consulting projects on securing networks and architectures with the training participants.





