Advanced SCADA Hacking and Security

Course Outline

1. Recent Security Issues in SCADA Security

2. The DNP3 Protocol

3. The Profibus/Profinet Protocol

4. The OPC Protocol

5. Other Protocols

6. Reconnaissance of these Other Protocols

7. Exploitation of these Other Protocols

8. Vulnerability Assessment Methodologies

9. Zero-Day Exploit Development in SCADA ICS

10. Developing and Implementing Snort Rules for SCADA