ICS.211 Certified OT Security Technical Expert (COSTE)

 3.350,00

The training „Certified OT Security Technical Expert (COSTE)“ aims to deepen the existing knowledge of people with relevant professional experience in IT and OT security. The technical focus of this training provides the necessary understanding of protocols and components used as well as in-depth security knowledge of threats, current attack campaigns and the use of technical defensive controls. The training enables the participants to make or prepare the right decisions regarding relevant technical security controls and technologies, thus enabling them to increase the security level of plant networks using proven methods and technologies.

Description

Duration

3 days

Costs/participants
€ 3.350,- plus VAT

(incl. certification exam)

Minimum number of participants
8 persons
Prerequisite & Completion

ICS.205 Certified OT Security Practitioner (COSP) or an equivalent course or at least 6 months of relevant professional experience averaging at least 20 hours per week.

Completion: Attendance confirmation; in case of successful participation in the certification exam COSTE-personal certification by TÜV Austria GmbH

What you can expect from the
ICS.211 Certified OT Security Technical Expert (COSTE)

Persons certification available

After completing the 2.5-day OT security training course focusing on the key areas, participants can take a persons certification exam administered by TÜV AUSTRIA Academy – ideal for industry professionals who want to gain proof of their security expertise.

Practical learning

All training courses that offer persons certification include a significant practical component, featuring hands-on labs, realistic simulations, and a personalized exercise handbook to promote effective, practical learning.

Always at the cutting edge

Our training courses are revised at least once a year – current findings, new threat scenarios, and real incidents are continuously incorporated into the content.

What you will learn during this training course

Day 1

Introduction

  • OT treat landscape
  • Procurement of a secure system
  • Risk analysis according to IEC 62443-3-2

OT protocols

  • Common wired and wireless OT protocols
  • Understanding OT protocols at a technical level
  • Wireless protocols in OT environments
  • Securing industrial protocols
  • Network and protocol analysis with Wireshark

Day 2

Network-based attacks

  • MAC adress spoofing
  • Denial of service attacks
  • Network sniffing
  • Protocol spoofing
  • Man-in-the-middle attacks

Improving OT network security

  • Network segmentation
  • Using firewalls in OT networks

Day 3

Applying security measures in OT

  • Security requirements and implementation
  • User management
  • Credential management
  • Host hardening
  • System monitoring and network detection
  • Anomaly and threat detection
  • Remote Access
  • Backup and recovery
  • OT security market guide
  • OT security trends

Final Challenge

After the training, the participants have

  • consolidated and deepened their existing knowledge of IT and OT security.
  • have a basic understanding of OT data transmission technologies and specific protocols.
  • have understood the different network protection measures of OT based on common attacks.
  • have become familiar with a structured methodology for partitioning and zoning of an architecture.
  • have gained insights into the use of monitoring systems against attackers.
  • have learned how security measures can be technically implemented in OT operations.

What others say

Varied training and clearly presented. Pleasant atmosphere and helpful documents.

Awareness & Compliance Training

Relaxed atmosphere in the seminar and high competence of the trainers. Participants were well involved, which led to active discussions. The hands-on exercises worked smoothly and were well described. I will recommend Limes to others.

OT-Security Training

Topic was mega interesting and very informative. The presentation, overview, outline, lecture and speaker were very good and gave me a lot of insight into the topic. Clear delimitation of the topics and not focused on everything.

Product Security Training

Great presentation and speaker who conveyed the topic in a way that was easy to understand. The connection between MR/NIS2/CRA/IEC62443 is now clear to me. For me the walk through of IEC62443 was helpful so I don't have to read it myself but know which bullet points to look at. Good time management.

Product Security Training

The practical part included helpful case studies. Pleasant lecture style, good for following and listening as well as collaborating.

Awareness & Compliance Training

Sympathetic trainers who were helpful with questions, explained a lot using practical examples and gave pleasant explanations.

OT-Security Training

Overview of security requirements according to IEC 62443 was informative and the list of tools to find vulnerabilities in products with Ethernet interfaces was helpful. Good presentation of the topics and many questions were answered quickly.

Product Security Training

Is the Technical Expert Training suitable for you?

Find out in just a few minutes – with our short COSTE Questionnaire for self-assessment.

Training highlights of the
ICS.211 Certified OT Security Technical Expert (COSTE)

In the training ICS.211 Certified OT Security Technical Expert (COSTE) you can expect a special highlight: a comprehensive Exercise Handbook that guides you step by step through a variety of practical exercises – ideal for directly applying and deepening your knowledge.

In our training environment, you will work with realistic OT simulations and professional tools – alone or in a team. You will experience first-hand how attacks on industrial control systems can be detected, analyzed and defended against.

You can look forward to a wide variety of task formats – from hands-on labs to tabletop simulations:

  • Manipulating Modbus & MQTT – understanding and securing protocols
  • Analyze network traffic – with Wireshark and real PCAP files
  • DoS attacks on S7 PLCs – recognizing vulnerabilities and discussing countermeasures
  • Planning network segmentation – designing secure OT architectures
  • Threat modeling & impact analyses – systematically assessing risks

The course concludes with a final challenge in which you put all your knowledge to the test – an exciting combination of forensic analysis, cryptography and practical attack detection.

Get your TÜV® persons certificate now!

Our OT security training courses not only provide knowledge, but also official proof of your competence.

Get to know our
trainers

Share