Cyber Intelligence for Critical Infrastructure

Instructor-led training course

At a glance

As tens of millions of people are dependent on critical infrastructure services, it also is a prime target for an adversary. Having a thorough understanding of risks in critical infrastructure, the types of attacks that are more likely to be seen, and the development and use of cyber-Intel to increase security is foundational to success. The value of this discipline stretches across industries and impacts many companies and employees.

This course equips participants with the knowledge and skills to identify, assess, and mitigate cyber threats to critical infrastructure. It covers the threat landscape, relevant standards and best practices, and the role of cyber intelligence in strengthening security and resilience. Participants will gain insights into attack tools and pathways, threat modeling techniques, and incident response strategies specific to industrial control systems (ICS) and operational technology (OT) environments.

Prerequisites: Students should have a working understanding of basic information security principles, general understanding of threat intelligence, and exposure to industrial control systems and operational technology.

Course goals

After completing this course, learners should:

  • Understand ICS/OT security history, today’s trends, and threat landscape
  • Understand the evolving attack surface of critical infrastructure, ICS/OT, and cloud based Industrial Internet of Things (IIoT) connectivity 
  • Learn about the inherent vulnerabilities present in OT systems and common attack paths into critical infrastructure
  • Apply MITRE ATT&CK ® for ICS and map historical OT compromises through lab exercises
  • Leverage cyber threat intelligence to proactively identify and mitigate risks to critical infrastructure
  • Understand value of intelligence sharing organizations and collaboration across sectors to protect critical infrastructure

Who this course helps

Information technology staff, cyber intelligence analysts, cyber threat analysts, security analysts and others who support organizations with operational technology, industrial control systems, and critical infrastructure.

How it works

Delivery methods

In-classroom or virtual instructor-led training.

Duration

  • Two days (in-person delivery)
  • Three days (virtual delivery)

What to bring

Participants will need a laptop and stable internet connection.

Take the next step

Contact Mandiant Academy to learn more and schedule your course today.

Google Cloud
  • ‪English‬
  • ‪Deutsch‬
  • ‪Español‬
  • ‪Español (Latinoamérica)‬
  • ‪Français‬
  • ‪Indonesia‬
  • ‪Italiano‬
  • ‪Português (Brasil)‬
  • ‪简体中文‬
  • ‪繁體中文‬
  • ‪日本語‬
  • ‪한국어‬
Console
Google Cloud