Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Specialized Attacks: OT and ICS

This course will teach you how to perform reconnaissance, analyze network protocols, and conduct attacks against Operational Technology. This will show how weak cyber security in OT environments can significantly disrupt manufacturing operations.

Intermediate
1h 12m
(15)

Created by Matthew Lloyd Davies

Last Updated Apr 14, 2022

Course Thumbnail
  • Course

Specialized Attacks: OT and ICS

This course will teach you how to perform reconnaissance, analyze network protocols, and conduct attacks against Operational Technology. This will show how weak cyber security in OT environments can significantly disrupt manufacturing operations.

Intermediate
1h 12m
(15)

Created by Matthew Lloyd Davies

Last Updated Apr 14, 2022

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Attacks against Industrial Control Systems (ICS) can cause manufacturing downtime, disrupt electricity generation or water supplies, and stop public services such as transport and telecommunication systems. In this course, Specialized Attacks: OT and ICS, you’ll learn to identify vulnerable systems, exploit inherent weaknesses, and perform actions that could disrupt operational technologies. First, you’ll explore how to identify internet facing operational technology, including control systems. Next, you’ll discover how to analyze the communications between industrial control systems. Finally, you’ll learn how to interact with those systems to perform unintended operations and disrupt operations. When you’re finished with this course, you’ll understand how to assess ICS environments, identify weaknesses and describe the potential consequences of an attack. This will enable you to make the case for continued investment in cyber security and reduce the likelihood of operational downtime.

Specialized Attacks: OT and ICS
Intermediate
1h 12m
(15)
Table of contents

About the author
Matthew Lloyd Davies - Pluralsight course - Specialized Attacks: OT and ICS
Matthew Lloyd Davies
41 courses 4.7 author rating 47 ratings

Matt has a degree in Chemical engineering and a PhD in mathematical chemistry. He is also a GIAC certified incident handler and penetration tester and has regulated cyber security in the UK civil nuclear sector for many years.

Get started with Pluralsight