What’s Covered in the Resources:
1. Books:
o Practical Industrial Cybersecurity: ICS, Industry 4.0,
and IIoT by Charles J. Brooks and Philip A. Craig: This book
should provide a solid foundation in the critical cybersecurity
concepts in the ICS/OT space, including Industry 4.0 and the
Industrial Internet of Things (IIoT).
o Industrial Automation and Control System Security
Principles by Ronald L. Krutz: This will give you a more
focused view on the security aspects of automation and
control systems, which is critical for the GICSP.
o Industrial Network Security by Eric D. Knapp: This book is
great for understanding the security concerns of critical
infrastructure networks like SCADA and smart grids.
2. Training Resources:
o Free ICS/OT Cybersecurity Masterclasses (Day 1 & 2):
These are great to build foundational knowledge without any
cost, though you may need to supplement them with more in-
depth, paid courses for deeper learning.
o Udemy Courses (e.g., by Sourabh Suman): These are good
for structured learning and moving from fundamental to
advanced ICS/OT cybersecurity topics. They’ll help you focus
on practical skills and tools used in the field.
o PLC Training: Since ICS/OT systems heavily rely on PLCs,
knowing how to configure and secure these devices is
essential. The PLC courses will give you valuable hands-on
knowledge.
3. Exam Preparation Tips:
o “How I Passed My GICSP Exam” and other resources like
“Better GIAC Testing with Pancakes” provide useful feedback
and tips directly from people who’ve taken the exam. These
can be very insightful for understanding how to approach the
exam itself.
o Practice Exams: The importance of practice exams can’t be
overstated. Even though GICSP is an open-book exam, being
familiar with the material and having efficient access to key
resources is crucial.
4. Books to Understand ICS/OT Systems:
o These will help fill gaps if you’re coming from a non-OT
background. Titles like “A Guide to the Automation Body
of Knowledge” and “Overview of Industrial Process
Automation” will give you a strong understanding of how
industrial systems are designed, implemented, and
automated.
Yes, there are several virtual labs and platforms that offer simulated
ICS/OT environments to help you build practical experience. Here are
some solid options for virtual ICS labs:
1. SANS Cyber Ranges (ICS410 Labs)
What it is: The SANS ICS410 course includes hands-on labs as
part of the training, offering a controlled environment where you can
simulate attacks and defend ICS/OT systems. Although the full
course comes with a significant price tag, it’s one of the most
comprehensive and industry-recognized platforms for ICS security.
Why it’s good: The labs focus on real-world ICS security scenarios
and allow you to practice with SCADA systems, PLCs, and other OT
devices.
Link: SANS ICS410
2. TryHackMe (OT Cybersecurity Rooms)
What it is: TryHackMe offers several rooms focused on OT/ICS
cybersecurity. Their rooms are designed for hands-on learning and
cover a wide range of cybersecurity topics, including industrial
control systems.
Why it’s good: It's beginner-friendly, affordable, and offers guided
walkthroughs, making it a great option for those new to ICS/OT.
There are also specific rooms simulating SCADA vulnerabilities and
attacks.
Link: TryHackMe - ICS Cybersecurity
3. Hack the Box (Industrial Control Systems Challenges)
What it is: Hack the Box offers a range of cybersecurity
challenges, including some related to industrial control systems.
While it’s not strictly ICS-focused, they occasionally provide ICS-
related challenges in their "Pro Labs" or challenge rooms.
Why it’s good: Hack the Box is known for its challenging
environments, which can give you a taste of penetration testing and
vulnerability exploitation in various system types, including ICS.
Link: Hack the Box
4. OT Cyber Range (by Cyberbit)
What it is: The Cyberbit OT Cyber Range is a sophisticated
virtual ICS lab environment for training cybersecurity professionals
in the defense of critical infrastructure. It simulates complex OT
systems and provides hands-on training for defending against real-
world cyberattacks.
Why it’s good: It’s an industry-leading training platform used by
organizations worldwide to train their staff in industrial
cybersecurity. It covers everything from basic OT security to
advanced attack detection and response.
Link: Cyberbit OT Cyber Range
5. Pluralsight (ICS/OT Security Courses and Labs)
What it is: Pluralsight offers a few courses on ICS/OT security,
with a focus on both the theory and practice of securing these
environments. Some of these include practical exercises you can
follow along with, and they occasionally provide lab environments.
Why it’s good: It’s well-structured and covers critical topics like
securing SCADA systems, OT network architecture, and common ICS
vulnerabilities.
Link: Pluralsight - ICS Security
6. Bosch IoT Academy – OT Security Labs
What it is: The Bosch IoT Academy offers some free resources
and labs focused on IoT and OT security, covering key
vulnerabilities and mitigation techniques in industrial environments.
Why it’s good: It’s a great resource to understand how IoT devices
and OT systems work together, and provides hands-on experience
with securing these types of systems.
Link: Bosch IoT Academy
7. Virtual ICS Environment (via GitHub Projects)
What it is: Some community-driven projects on GitHub create and
share virtual ICS lab environments that you can set up and
experiment with at home. These might involve creating your own
virtual machines or using open-source ICS software to simulate
vulnerabilities and attacks.
Why it’s good: If you have the time and expertise to set it up, this
is a cost-effective option. It provides hands-on access to real ICS
components in a virtualized environment.
Link: GitHub ICS Lab Projects
Hands-On Training
Programming a PLC
Programming an HMI
Architecting a Secure DCS
Finding Passwords in Embedded Devices
Exploring Fieldbus Protocols
Network Capture Analysis
Enumerating Modbus TCP
Network Forensics of an Attack
Bypassing Auth with SQL Injection
Password Fuzzing
Baselining with PowerShell
Configuring Host-Based Firewalls
Windows Event Logs
Finding Remote Access
Incident Response Tabletop Exercise