ICS OT Application-Level DoS Attack
*(ISC)² Members/Associates can access this course for free by logging in above and clicking the 'My Courses' menu item.
A Denial of Service (DoS) attack can cripple your business operations or do even worse to your physical infrastructure. How will you find and stop such an attack? How will your personnel perform when the system is in a degraded state? This scenario-based lab presents just such an attack on the OT network—a DoS attack at the application layer, aimed at disrupting normal operations. The DoS attack takes place when a malicious entity generates a large number of connections to the server to block legitimate applications from connecting to the victim server. The advanced lab challenges you to find, neutralize and contain an attack aimed at bringing down the OT network. Can you find and mitigate the attack?
This course includes the following modules: 1) ICS OT Application-Level DoS Attack
Audience or Who Should Take This Course
Security practitioners, incident responders, and individuals with intermediate to advanced knowledge in networking, DoS mitigation and incident response.
An intermediate to advance knowledge and familiarity with using the Unix/Linux command line, a working understanding of networking and filtering concepts (TCP/IP, DNS, etc.), and basic web application knowledge (HTTP, URL parameters, etc.) are strongly recommended.
How This Course Works
Lab content within this course takes place within a Linux virtual machine environment. This advanced lab simulates a typical OT network and requires the learner to exercise their discovery and mitigation skills to identify, analyze, and neutralize such an attack. Learners will use their skills as an incident responder to work through the lab and neutralize the attack.
Throughout this course learners will be asked to work through and complete the following activities:
- Lab scenario that present an application-level Denial of Service (DoS) attack on an OT network.
- Final Assessment
- Course Evaluation
CPEs for (ISC)2 credentials must be self-reported by members and associates through the (ISC)2 CPE Portal accessible via www.isc2.org using your member login credentials.
CPEs earned for this course may be eligible for continuing professional education credits for non-(ISC)² certifications. Please visit the continuing education requirements established by the credentialing organization for eligibility.
For specific questions related to your CPEs or the CPE portal please contact member support - firstname.lastname@example.org