An important aspect of cyber security for critical infrastructure protection focuses on a basic understanding and awareness of real-world threats and vulnerabilities that exist within the industrial automation and control system architectures used in most process industries and manufacturing facilities.
These issues face the Distribution Control Systems (DCS) and Supervisory Control and Data Acquisition Systems (SCADA) that comprise most industrial environments, and impact not on the common IT infrastructure like Windows-based computers and network appliances (switches, routers and firewalls), but also embedded "proprietary" equipment such as programmable logic controllers (PLC), remote terminal units (RTU), intelligent electrical device (IED), basic process controllers (BPCS, safety instrumented systems (SIS), operator panels, and ancillary systems that are the basis of most integrated ICS architectures.
Nevertheless, in this course, we are going to discuss about Penetration Testing Execution Standard Phases, Information Reconissance and Analysis, Threat or Target Modeling, Vulnerability Analysis and Exploit Development, Malware Analysis and also ICS Security and Hacking.
My name is Milad Kahsari Alhadi. I am a computer science student and a part-time Security Consultant at Kashef Banking Security Governance and Iran Oil-Petrochemical Industry.
I am a huge System Security enthusiast and I have been researching about Mathematics, Electronics, Exploit Development, Vulnerability Analysis, Embedded-PLC Systems Security and Malicious Software Synthesis-Analysis since 2008.