Training
Get a free hour of SANS training

Experience SANS training through course previews.

Learn More
Learning Paths
Can't find what you are looking for?

Let us help.

Contact us
Resources
Join the SANS Community

Become a member for instant access to our free resources.

Sign Up
For Organizations
Interested in developing a training plan to fit your organization’s needs?

We're here to help.

Contact Us
Talk with an expert

ICS515: ICS Visibility, Detection, and Response

ICS515Industrial Control Systems Security
  • 6 Days (Instructor-Led)
  • 36 Hours (Self-Paced)
Course created by:
Robert M. Lee
Robert M. Lee
ICS515: ICS Visibility, Detection, and Response
Course created by:
Robert M. Lee
Robert M. Lee
  • GIAC Response and Industrial Defense (GRID)
  • 36 CPEs

    Apply your credits to renew your certifications

  • In-Person, Virtual or Self-Paced

    Attend a live, instructor-led class at a location near you or remotely, or train on your time over 4 months

  • Intermediate Skill Level

    Course material is geared for cyber security professionals with hands-on experience

  • 25 Hands-On Lab(s)

    Apply what you learn with hands-on exercises and labs

Acquire critical visibility, detection, and response capabilities to protect ICS/OT environments against sophisticated threats while ensuring the safety and reliability of operations.

Course Overview

This ICS incident response course equips security professionals with practical skills to secure industrial environments. Through hands-on exercises using real industrial equipment, you'll learn to gain network visibility, identify assets, detect threats, and respond to incidents in critical infrastructure and other environments that rely on ICS/OT systems. The curriculum covers advanced defensive techniques against sophisticated threats like STUXNET, HAVEX, BLACKENERGY2, CRASHOVERRIDE, TRISIS/TRITON, FROSTYGOOP, EKANS, and PIPEDREAM. You'll work with a real programmable logic controller (PLC) kit, sector simulation board, and virtual machines that you keep post-course to continue skill development. Leveraging industry frameworks , you'll develop repeatable methodologies to secure industrial environments.

What You'll Learn

  • Implement ICS-specific threat detection strategies
  • Apply network security monitoring for OT environments
  • Perform incident response in operational technology
  • Extract intelligence from ICS threat analysis
  • Build effective cybersecurity for industrial systems

Business Takeaways

  • Improve visibility into ICS/OT asset inventories
  • Reduce risk of operational disruption from cyber threats
  • Enhance detection capabilities for ICS-specific attacks
  • Develop effective OT incident response procedures
  • Increase resilience against targeted industrial threats
  • Bridge security gaps between IT and OT environments
  • Apply intelligence-driven approaches to ICS security

Course Syllabus

Explore the course syllabus below to view the full range of topics covered in ICS515: ICS Visibility, Detection, and Response.

Section 1ICS Cyber Threat Intelligence

Learn to leverage threat intelligence to analyze threats, extract indicators of compromise, document tactics, techniques, and procedures, and guide security teams to protect industrial environments.

Topics covered

  • Case Study: STUXNET
  • Introduction to ICS Active Defense
  • Cyber Threat Intelligence Primer
  • ICS Cyber Kill Chain
  • Threat Intelligence Consumption

Labs

  • Building a Programmable Logic Controller
  • Structured Analytical Techniques
  • Analysis of Intelligence Reports
  • ICS Information Attack Space
  • Maltego and Shodan Heatmap

Section 2Visibility and Asset Identification

Understand the networked environment to build comprehensive asset inventories and develop effective collection strategies for both industrial operations and security operations.

Topics covered

  • Case Study: Bhopal Disaster
  • Asset Inventories
  • Collection Management Frameworks
  • ICS Network Visibility
  • IT Discovery Protocols

Labs

  • Operating the Process
  • ICS Traffic Analysis
  • ICS Protocol Analysis
  • ICS Network Mapping

Section 3ICS Threat Detection

Develop detection strategies to remain resilient against targeted and untargeted threats, with focus on safely conducting threat hunting and analyzing attack patterns in industrial environments.

Topics covered

  • Case Study: German Steelworks Attack
  • ICS Threat Hunting
  • Threat Detection Strategies
  • Case Study: SANDWORM
  • ICS Network Security Monitoring

Labs

  • Detecting Stage 1 Intrusions
  • Investigating Stage 2 Compromises
  • Traffic Analysis of Control Manipulation
  • Validating System Logic Changes
  • Logic Manipulation of Control Elements

Section 4Incident Response

Learn to safely perform ICS incident response with focus on acquiring digital evidence while scoping threats and their operational impact, using forensic techniques tailored for industrial environments.

Topics covered

  • Case Study: SANDWORM - Ukraine 2015
  • ICS Digital Forensics
  • Preparing an ICS Incident Response Team
  • Case Study: ELECTRUM and CRASHOVERRIDE
  • Initial Compromise Vectors

Labs

  • Acquisition in an Operational Environment
  • PLC Logic and Protocol Root Cause Analysis
  • Analyzing Phishing Emails
  • HMI Memory Forensics
  • Process Triage

Section 5Threat and Environment Manipulation

Extract information from threats through malware analysis to reduce the effectiveness of threats and create shareable threat intelligence for improved defensive posture.

Topics covered

  • Case Study: XENOTIME - TRISIS
  • ICS Threat Manipulation Goals
  • Environment Manipulation Considerations
  • Threat Analysis and Malware Triaging
  • YARA

Labs

  • Logic Analysis for Root Cause Analysis

Section 6Capstone Day, Under Attack!

A full-day technical challenge where students apply all learned skills to analyze packet captures, logic, memory images, and more from compromised ICS ranges and equipment, simulating real-world scenarios.

Things You Need To Know

Relevant Job Roles

Threat Hunter

Digital Forensics and Incident Response

This expert applies new threat intelligence against existing evidence to identify attackers that have slipped through real-time detection mechanisms. The practice of threat hunting requires several skill sets, including threat intelligence, system and network forensics, and investigative development processes. This role transitions incident response from a purely reactive investigative process to a proactive one, uncovering adversaries or their footprints based on developing intelligence.

Explore learning path

All-Source Analyst (DCWF 111)

DoD 8140: Intelligence (Cyberspace)

Analyzes data from multiple sources to prepare environments, respond to information requests, and support intelligence planning and collection requirements.

Explore learning path

Cyber Defense Infrastructure Support Specialist (DCWF 521)

DoD 8140: Cybersecurity

Deploys, configures, maintains infrastructure software and hardware to support secure and effective IT operations across organizational systems.

Explore learning path

Control Systems Security Specialist (DCWF 462)

DoD 8140: Cybersecurity

Oversees cybersecurity configuration and daily security operations of control systems, ensuring mission support and stakeholder coordination.

Explore learning path

Cyber Defense Incident Responder (DCWF 531)

DoD 8140: Cybersecurity

Responds to and investigates network cyber incidents, performing analysis to mitigate threats and maintain cybersecurity in enclave environments.

Explore learning path

Incident Response (OPM 531)

NICE: Protection and Defense

Responsible for investigating, analyzing, and responding to network cybersecurity incidents.

Explore learning path

ICS Security Incident Responder

Industrial Control Systems

Executes specific industrial incident response for incidents that threaten or impact control system networks and assets, while maintaining the safety and reliability of operations.

Explore learning path

ICS Security Analyst

Industrial Control Systems

Acquires and manages resources, supports, and performs key industrial security protection while adhering to safety and engineering goals.

Explore learning path

Course Schedule & Pricing

Looking for Group Purchase Options?Contact Us
Filter by:
  • Location & instructor

    Virtual (OnDemand)

    Instructed by Robert M. Lee
    Date & Time
    OnDemand (Anytime)Self-Paced, 4 months access
    Course price
    $9,230 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    London, GB & Virtual (live)

    Instructed by Kai Thomsen
    Date & Time
    Fetching schedule..View event details
    Course price
    £7,505 GBP*Prices exclude applicable taxes | EUR price available during checkout
    Enrollment options
  • Location & instructor

    Washington, DC, US & Virtual (live)

    Instructed by Dean Parsons
    Date & Time
    Fetching schedule..View event details
    Course price
    $9,230 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Huntsville, AL, US & Virtual (live)

    Instructed by Mark Bristow
    Date & Time
    Fetching schedule..View event details
    Course price
    $9,230 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Amsterdam, NL & Virtual (live)

    Instructed by Kai Thomsen
    Date & Time
    Fetching schedule..View event details
    Course price
    €8,630 EUR*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Singapore, SG & Virtual (live)

    Instructed by Peter Jackson
    Date & Time
    Fetching schedule..View event details
    Course price
    $9,365 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Las Vegas, NV, US & Virtual (live)

    Instructed by Dean Parsons
    Date & Time
    Fetching schedule..View event details
    Course price
    $9,230 USD*Prices exclude applicable local taxes
    Enrollment options
  • Location & instructor

    Muscat, OM & Virtual (live)

    Instructed by Jason Dely
    Date & Time
    Fetching schedule..View event details
    Course price
    $9,365 USD*Prices exclude applicable local taxes
    Enrollment options
Showing 8 of 22

Benefits of Learning with SANS

Instructor teaching class with code in the background

Get feedback from the world’s best cybersecurity experts and instructors

Learning via laptop

Choose how you want to learn - online, on demand, or at our live in-person training events

Learning via laptop

Get access to our range of industry-leading courses and resources