{"id":17463,"date":"2025-05-30T10:21:59","date_gmt":"2025-05-30T08:21:59","guid":{"rendered":"https:\/\/acgcyberacademy.fr\/?post_type=mec-events&#038;p=17463"},"modified":"2025-11-19T15:34:58","modified_gmt":"2025-11-19T14:34:58","slug":"ec-council-ics-scada-cybersecurity","status":"publish","type":"mec-events","link":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-ics-scada-cybersecurity\/","title":{"rendered":"EC-Council ICS\/SCADA Cybersecurity"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"17463\" class=\"elementor elementor-17463\" data-elementor-post-type=\"mec-events\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6c0c232 e-flex e-con-boxed e-con e-child\" data-id=\"6c0c232\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-42f62ef3 e-flex e-con-boxed e-con e-child\" data-id=\"42f62ef3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1b4fad91 elementor-widget elementor-widget-image\" data-id=\"1b4fad91\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"793\" height=\"181\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png\" class=\"attachment-large size-large wp-image-12501\" alt=\"EC-Council Certified Acg CyberAcademy\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview.png 793w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-300x68.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2024\/09\/Ec_Council_Logo-removebg-preview-768x175.png 768w\" sizes=\"(max-width: 793px) 100vw, 793px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25867c6 elementor-widget__width-initial elementor-widget elementor-widget-spacer\" data-id=\"25867c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f68462 elementor-widget__width-initial elementor-widget elementor-widget-image\" data-id=\"2f68462\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"176\" src=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA-White-Logo-1-300x176-1.png\" class=\"attachment-large size-large wp-image-17870\" alt=\"EC-Council ICS\/SCADA Cybersecurity\" srcset=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA-White-Logo-1-300x176-1.png 300w, https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA-White-Logo-1-300x176-1-18x12.png 18w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d4b68c9 elementor-widget elementor-widget-heading\" data-id=\"4d4b68c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Description <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5b0eb856 e-flex e-con-boxed e-con e-child\" data-id=\"5b0eb856\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-57a3c7d5 elementor-widget__width-initial elementor-widget elementor-widget-text-editor\" data-id=\"57a3c7d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Due to the potential impact of an attack on the physical safety of communities, employees or\u00a0customers, <b>ICS \/SCADA s<\/b>ecurity is an even higher priority than for traditional IT systems. Cyber\u00a0criminals have already developed malware threats such as Triton\/TRISIS and Stuxnet that can\u00a0disrupt industrial Operation Technology (OT).\u00a0<\/p><p>You will learn powerful methods to analyze the risk of both the IT and\u00a0corporate network. Once your foundation has been set, you will look at\u00a0the best practices and recommendations when it comes to bridging the\u00a0air gap. You will learn a systematic process of intrusion and malware\u00a0analysis. Once you have the process for analysis mastered, you will\u00a0be introduced to the digital forensic process and how to respond to\u00a0incidents when a breach is detected.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fdbcfe6 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"fdbcfe6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Target group<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25da03fa elementor-widget elementor-widget-text-editor\" data-id=\"25da03fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"course-section course-section--hidden\" tabindex=\"0\" data-section=\"3\"><div class=\"course-section__content\"><div class=\"course-section__rtf\"><div class=\"su-column su-column-size-1-2\"><div class=\"su-column-inner su-u-clearfix su-u-trim\"><div class=\"su-list\"><p>This course is specially designed for IT professionals who are involved in managing or directing their organization\u2019s IT infrastructure and who are responsible for establishing and maintaining information security policies,\u00a0 practices and procedures. The focus in the course is on the Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) Systems.<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f9471f9 elementor-widget elementor-widget-spacer\" data-id=\"f9471f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8ae64bc elementor-widget elementor-widget-heading\" data-id=\"8ae64bc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Training Program\n\n\n\n\n\n\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eba0b78 elementor-widget elementor-widget-n-accordion\" data-id=\"eba0b78\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2470\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-2470\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 01 : Introduction to ICS\/SCADA Network Defense <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2470\" class=\"elementor-element elementor-element-fb41925 e-con-full e-flex e-con e-child\" data-id=\"fb41925\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2470\" class=\"elementor-element elementor-element-5ee57db e-flex e-con-boxed e-con e-child\" data-id=\"5ee57db\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d032181 elementor-widget elementor-widget-text-editor\" data-id=\"d032181\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objectives<\/li><li>Typical Security Model<\/li><li>Security Model Explained<\/li><li>Authorization<\/li><li>Purdue Reference Model<\/li><li>Overview of ICS\/SCADA Operations<\/li><li>Human Machine Interface (HMI)<\/li><li>ICS\/SCADA Overview<\/li><li>Microcontroller<\/li><li>LAB: Security Model<\/li><li>Selecting a Security Posture<\/li><li>Defining Risk<\/li><li>Types of Risk<\/li><li>Managing Risk<\/li><li>Security Policy<\/li><li>Allowing a Service<\/li><li>LAB: Allowing a Service<\/li><li>ICS\/SCADA generations<\/li><li>ICS\/SCADA<\/li><li>ICS\/SCADA Attacks<\/li><li>Defining \u201cVulnerability\u201d<\/li><li>Finding Targets<\/li><li>NetBios from the Internet<\/li><li>Attack Surface<\/li><li>Protocols<\/li><li>Siemens<\/li><li>Modbus<\/li><li>BACnet<\/li><li>Challenges with ICS\/SCADA Risk<\/li><li>Asset Identification and System Characterization<\/li><li>Vulnerability Identification and Threat Modelling<\/li><li>Risk Calculation and Management<\/li><li>SCADA Framework<\/li><li>IT and ICS Comparison Standards<\/li><li>LAB: Standards<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2471\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2471\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 02 : TCP\/IP 101 <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2471\" class=\"elementor-element elementor-element-50e7e08 e-con-full e-flex e-con e-child\" data-id=\"50e7e08\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2471\" class=\"elementor-element elementor-element-d9d2eb3 e-flex e-con-boxed e-con e-child\" data-id=\"d9d2eb3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b40b38 elementor-widget elementor-widget-text-editor\" data-id=\"4b40b38\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objectives<\/li><li>Network Protocols<\/li><li>Transport Protocols<\/li><li>Headers<\/li><li>Encapsulation<\/li><li>De-encapsulation<\/li><li>TCP\/IP<\/li><li>Flow of Data<\/li><li>Switch Connecting two Machines<\/li><li>Router Connecting Two<\/li><li>Networks<\/li><li>Analyzing Traffic with<\/li><li>Protocol Analyzers<\/li><li>IPv4 Header<\/li><li>UDP Header<\/li><li>TCP Header<\/li><li>TCP Header Composition<\/li><li>Viewing TCP\/IP Headers\u00a0<\/li><li>It is all in the Packet!<\/li><li>TCP Flags Under the Hood<\/li><li>What Is a Threat?<\/li><li>Know Your Adversary<\/li><li>Threat Containment<\/li><li>LAB: TCP\/IP<\/li><li>Network Protocols<\/li><li>IP<\/li><li>IP Header<\/li><li>IP Protocol Type<\/li><li>ARP: Address Resolution<\/li><li>Protocol<\/li><li>ARP on the Host<\/li><li>UDP Header<\/li><li>TFTP: Trivial File Transfer<\/li><li>Protocol<\/li><li>TCP: Transmission Control Protocol<\/li><li>TCP Connection<\/li><li>TCP Connection Close<\/li><li>TCP Connection Reset<\/li><li>TCP Data Flow<\/li><li>LAB: Protocol Analysis<\/li><li>ICS\/SCADA Protocols<\/li><li>Modbus<\/li><li>Modbus Protocol Types<\/li><li>Modbus Protocol and OSI Model<\/li><li>Modbus Recon<\/li><li>LAB: Modbus Protocol Analysis<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2472\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2472\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 03 : Introduction to Hacking <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2472\" class=\"elementor-element elementor-element-735541b e-con-full e-flex e-con e-child\" data-id=\"735541b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2472\" class=\"elementor-element elementor-element-de4831a e-flex e-con-boxed e-con e-child\" data-id=\"de4831a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-29e8736 elementor-widget elementor-widget-text-editor\" data-id=\"29e8736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objective<\/li><li>Motives, Goals, and Objectives of Information Security Attacks<\/li><li>What is Hacking<\/li><li>Why Ethical Hacking<\/li><li>What is Ethical Hacking<\/li><li>Mindset of the Attacker<\/li><li>Create a Security Testing Plan<\/li><li>Testing Methodology Resources<\/li><li>Types of Testing<\/li><li>Roles of Ethical Hacking<\/li><li>Hacking Methodology First Step<\/li><li>The Steps to a Successful<\/li><li>Ethical Hack<\/li><li>Footprinting and Reconnaissance<\/li><li>Objectives of Footprinting<\/li><li>Footprinting Tasks<\/li><li>Footprinting Using Google<\/li><li>Google Hacking Database<\/li><li>Web Site Footprinting<\/li><li>Web Site Mirroring<\/li><li>Web Site Archives<\/li><li>Whois<\/li><li>LAB: Footprinting and Recon<\/li><li>Scanning<\/li><li>Live Systems<\/li><li>Ports<\/li><li>Services<\/li><li>Enumeration<\/li><li>Identify Vulnerabilities<\/li><li>Vulnerability Research<\/li><li>Manual Identification Vulnerability<\/li><li>Automatic Identification of Vulnerability<\/li><li>ICS CERT Guidance<\/li><li>Common ICS Architectures<\/li><li>Two Firewalls Architecture<\/li><li>Control System as a DMZ<\/li><li>Data DMZ<\/li><li>Modems and Wardialing<\/li><li>Vendor Support<\/li><li>IT Controlled Communication Gear<\/li><li>Corporate VPN<\/li><li>Database Links<\/li><li>Exploration<\/li><li>LAB Hacking Steps<\/li><li>Penetration Testing<\/li><li>ICS\/SCADA Testing<\/li><li>ICS\/SCADA Uniqueness<\/li><li>Information Gathering<\/li><li>BACnet Public Facing<\/li><li>DNP3 Public Facing<\/li><li>Internal Testing<\/li><li>LAB: ICS\/SCADA Initial Testing<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2473\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2473\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 04 : Vulnerability Management <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2473\" class=\"elementor-element elementor-element-6708e18 e-flex e-con-boxed e-con e-child\" data-id=\"6708e18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2473\" class=\"elementor-element elementor-element-2fe3c4d e-con-full e-flex e-con e-child\" data-id=\"2fe3c4d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cfc99cc elementor-widget elementor-widget-text-editor\" data-id=\"cfc99cc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objectives<\/li><li>Defining \u201cVulnerability\u201d<\/li><li>Vulnerability Scanners<\/li><li>Vulnerability Assessment<\/li><li>The Challenge of Vulnerability Assessment<\/li><li>Vulnerability Scanners<\/li><li>Vulnerability Assessment<\/li><li>Good and the Bad<\/li><li>Zero Day<\/li><li>Malware Ecosystem<\/li><li>Industrial Control Systems<\/li><li>Havex and Dragonfly<\/li><li>Traditional Malware Threat to ICS\/SCADA<\/li><li>Permanent Attacks<\/li><li>Vulnerability Management<\/li><li>Vulnerability Management<\/li><li>Asset Identification<\/li><li>Asset Identification Using<\/li><li>Nmap<\/li><li>Emulate the Ports<\/li><li>Conpot<\/li><li>ICS\/SCADA Scanning with Nessus<\/li><li>Modbus\/TCP Coil Access<\/li><li>LAB: Vulnerability Management<\/li><li>Metasploit and ICS\/SCADA<\/li><li>Metasploit and Modbus<\/li><li>Modbus Detect Module<\/li><li>Metasploit and Bacnet<\/li><li>Vulnerability Severity<\/li><li>Microsoft Exploitability Index<\/li><li>Common Vulnerability<\/li><li>Scoring System (CVSS)<\/li><li>Base Metrics<\/li><li>Online Calculator<\/li><li>Temporal Metrics<\/li><li>Environmental Metrics<\/li><li>CVSS Example<\/li><li>Temporal Score Impact<\/li><li>Environment Score<\/li><li>LAB: Mastering the CVSS<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2474\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2474\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 05 : Standards and Regulation for Cybersecurity <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2474\" class=\"elementor-element elementor-element-2e9bc69 e-flex e-con-boxed e-con e-child\" data-id=\"2e9bc69\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2474\" class=\"elementor-element elementor-element-cbcf1cc e-con-full e-flex e-con e-child\" data-id=\"cbcf1cc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5fa839e elementor-widget elementor-widget-text-editor\" data-id=\"5fa839e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objectives<\/li><li>Standards and Regulations<\/li><li>Iso 27001<\/li><li>NERC CIP<\/li><li>CFATS<\/li><li>ISA99<\/li><li>IEC 62443<\/li><li>IEC 62443 Sample Network<\/li><li>Security Level 1<\/li><li>Level 1<\/li><li>Level 2<\/li><li>Security Level 2<\/li><li>Level Two<\/li><li>Security Level 3<\/li><li>Level 3<\/li><li>NIST SP 800-82<\/li><li>Defense in Depth Strategy<\/li><li>Industry Best Practices for ICS<\/li><li>ICS\/SCADA Regulations Workshop<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2475\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2475\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 06 : Securing the ICS\/SCADA Network <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2475\" class=\"elementor-element elementor-element-e72a9ca e-flex e-con-boxed e-con e-child\" data-id=\"e72a9ca\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2475\" class=\"elementor-element elementor-element-b7fd46e e-con-full e-flex e-con e-child\" data-id=\"b7fd46e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e79a3d9 elementor-widget elementor-widget-text-editor\" data-id=\"e79a3d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objectives<\/li><li>Physical Security<\/li><li>Establishing policy<\/li><li>Securing the ICS Protocols<\/li><li>Server Isolation with IPsec<\/li><li>IPsec Authentication<\/li><li>Header (AH)<\/li><li>IPsec Encapsulation Security Payload (ESP) Header<\/li><li>IPsec Security Association (SA)<\/li><li>IPsec Modes<\/li><li>Transport mode<\/li><li>Tunnel mode<\/li><li>Firewall Improvements<\/li><li>Windows Firewall Snap-In IPsec Rules<\/li><li>Firewall Scripting<\/li><li>Isolating a Server<\/li><li>Group Policy Object<\/li><li>Server Isolation Steps<\/li><li>Domain Isolation<\/li><li>ICS Vulnerability<\/li><li>Assessment<\/li><li>ICS Risk Management<\/li><li>ICS Cyber Risk Assessment<\/li><li>Methodology for Industrial Networks<\/li><li>ICS Testing Priorities<\/li><li>ICS CERT Cybersecurity<\/li><li>Evaluation Tool (CSET)<\/li><li>Entry Points<\/li><li>Physical to Logical Assets<\/li><li>Threat Identification<\/li><li>Threat Vectors<\/li><li>Risk Reduction and Mitigation<\/li><li>LAB: ICS\/SCADA Security<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2476\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2476\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 07 : Bridging the Air Gap <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2476\" class=\"elementor-element elementor-element-2a79872 e-flex e-con-boxed e-con e-child\" data-id=\"2a79872\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2476\" class=\"elementor-element elementor-element-e18a9cb e-con-full e-flex e-con e-child\" data-id=\"e18a9cb\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efd556a elementor-widget elementor-widget-text-editor\" data-id=\"efd556a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objectives<\/li><li>ICS\/SCADA Connections<\/li><li>Example Connection Types<\/li><li>Data Diode<\/li><li>Guard<\/li><li>Next Generation Firewall<\/li><li>ICS Monitoring<\/li><li>Monitoring and Detection<\/li><li>Logs<\/li><li>Syslog equivalent<\/li><li>WMIC vs PowerShell<\/li><li>Get-CIMinstance<\/li><li>What to Monitor<\/li><li>Additional Context<\/li><li>Best Practices<\/li><li>Log Aggregation<\/li><li>Zone Monitoring<\/li><li>SIEM<\/li><li>Data Historians<\/li><li>Splunk<\/li><li>Monitoring Across Secure Boundaries<\/li><li>Information Management<\/li><li>Reports<\/li><li>Alerts<\/li><li>Incident Investigation and Response<\/li><li>Log Storage and Retention<\/li><li>Strong Authentication<\/li><li>Labs: ICS Monitoring<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-2477\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-2477\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> Module 08 : Introduction to Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2477\" class=\"elementor-element elementor-element-c39797e e-flex e-con-boxed e-con e-child\" data-id=\"c39797e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-2477\" class=\"elementor-element elementor-element-62dcc7e e-con-full e-flex e-con e-child\" data-id=\"62dcc7e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5e0aa88 elementor-widget elementor-widget-text-editor\" data-id=\"5e0aa88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Module Objectives<\/li><li>Why Intrusion Detection?<\/li><li>Fortress Mentality<\/li><li>De-Perimeterization<\/li><li>Intrusion Detection 101<\/li><li>What is Intrusion Detection?<\/li><li>IDS Features<\/li><li>Stealth the IDS<\/li><li>False Positives!<\/li><li>Topology Concerns<\/li><li>Recommended in Most Circles<\/li><li>Other uses of IDS<\/li><li>Under Attack<\/li><li>Stop the Attack<\/li><li>Intrusion Prevention<\/li><li>Types of IPS<\/li><li>Host-Based Intrusion\u00a0 Prevention System<\/li><li>Network Intrusion Prevention<\/li><li>Intrusion Analysis<\/li><li>ICMP<\/li><li>UDP<\/li><li>TCP<\/li><li>Identifying the OS<\/li><li>Passive Fingerprinting<\/li><li>Methodology<\/li><li>Signs of Compromise<\/li><li>LAB: Intrusion Detection<\/li><li>Log Analysis\u00a0<\/li><li>Malware<\/li><li>Server Message Block (SMB) Communication<\/li><li>Malware on the Wire<\/li><li>WannaCry<\/li><li>APT Defined<\/li><li>APT Characteristics<\/li><li>APT Command and Control (C2)<\/li><li>APT Artifacts<\/li><li>APT Methodology: The Cyber Kill Chain<\/li><li>APT Proxy Infrastructure<\/li><li>MITRE ATT&amp;CK Matrix<\/li><li>Event Correlation<\/li><li>ICS Malware<\/li><li>Dropper<\/li><li>Infection Vectors<\/li><li>ICS Specific Malware<\/li><li>LAB: ICS\/SCADA Malware<\/li><li>Module Summary<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3add2827 e-flex e-con-boxed e-con e-child\" data-id=\"3add2827\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-796b392b e-flex e-con-boxed e-con e-child\" data-id=\"796b392b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39dfad0 elementor-widget elementor-widget-heading\" data-id=\"39dfad0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Goal<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a33cab7 elementor-widget elementor-widget-text-editor\" data-id=\"2a33cab7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"wpb_column vc_column_container vc_col-sm-6\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column wpb_content_element\"><div class=\"wpb_wrapper\"><div class=\"su-list\"><p>The ICS\/SCADA Cyber Security Training Course is a hands-on training which will enable you to learn the foundation of security and defending architectures from attacks. You will look at the concept of \u201cthinking like a hacker\u201d to learn techniques to defend from the types of attacks that are commonly conducted against the oil and gas IT corporate and control network.<\/p><\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4f051be3 e-flex e-con-boxed e-con e-child\" data-id=\"4f051be3\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52b552e6 elementor-widget elementor-widget-heading\" data-id=\"52b552e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Recommended<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2cfa19f0 elementor-widget elementor-widget-text-editor\" data-id=\"2cfa19f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"flex max-w-full flex-col flex-grow\"><div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words text-start [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"27870c5c-bcd1-46a6-88c7-04a7e41e22aa\" data-message-model-slug=\"gpt-4o\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose w-full break-words dark:prose-invert light\"><p data-start=\"0\" data-end=\"215\" data-is-last-node=\"\">The course is designed for IT professionals who manage or oversee their organization\u2019s IT infrastructure and are responsible for implementing and maintaining information security policies and procedures. It focuses specifically on Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems.<\/p><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0be4f2f e-flex e-con-boxed e-con e-parent\" data-id=\"0be4f2f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-01bf140 e-con-full e-flex e-con e-child\" data-id=\"01bf140\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-20945c5 e-con-full e-flex e-con e-child\" data-id=\"20945c5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2b6f4a1 elementor-button-info elementor-align-left elementor-widget__width-initial elementor-widget elementor-widget-button\" data-id=\"2b6f4a1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA-Brochure.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">View the brochure for this training<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c36580 e-con-full e-flex e-con e-child\" data-id=\"0c36580\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b2bbef elementor-button-info elementor-align-center elementor-widget elementor-widget-button\" data-id=\"5b2bbef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA-CYBER-SECURITY-Course-Outline.pdf\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Explore the Course Outline<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Description Due to the potential impact of an attack on the physical safety of communities, employees or\u00a0customers, ICS \/SCADA security is an even higher priority than for traditional IT systems. Cyber\u00a0criminals have already developed malware threats such as Triton\/TRISIS and Stuxnet that can\u00a0disrupt industrial Operation Technology (OT).\u00a0 You will learn powerful methods to analyze the [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":17465,"comment_status":"closed","ping_status":"closed","template":"","tags":[],"accesibilite":[145],"certification":[87],"duree":[],"examen":[146],"langue":[164],"niveau":[85],"formateur":[176],"cpf":[],"organismes":[],"organisme":[],"mec_category":[78],"class_list":["post-17463","mec-events","type-mec-events","status-publish","has-post-thumbnail","hentry","accesibilite-oui","certification-oui","examen-oui","langue-anglais","niveau-avance","formateur-ec-council","mec_category-cybersecurite"],"acf":{"taux_davis_etoile":4.9,"taux_de_reussite":4.9,"formation_populaire":false,"lien_guide_dexamen":"","liste_importance_formations":2},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>EC-Council ICS\/SCADA Cybersecurity - ACG CyberAcademy<\/title>\n<meta name=\"description\" content=\"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\/SCADA Cybersecurity\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-ics-scada-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"EC-Council ICS\/SCADA Cybersecurity - ACG CyberAcademy\" \/>\n<meta property=\"og:description\" content=\"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\/SCADA Cybersecurity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-ics-scada-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"ACG CyberAcademy\" \/>\n<meta property=\"article:modified_time\" content=\"2025-11-19T14:34:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/\",\"name\":\"EC-Council ICS\\\/SCADA Cybersecurity - ACG CyberAcademy\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ICS-SCADA.jpg\",\"datePublished\":\"2025-05-30T08:21:59+00:00\",\"dateModified\":\"2025-11-19T14:34:58+00:00\",\"description\":\"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\\\/SCADA Cybersecurity\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ICS-SCADA.jpg\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/ICS-SCADA.jpg\",\"width\":800,\"height\":800,\"caption\":\"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\\\/SCADA Cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/ec-council-ics-scada-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Formations\",\"item\":\"https:\\\/\\\/acgcyberacademy.fr\\\/events\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"EC-Council ICS\\\/SCADA Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#website\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"name\":\"ACG Cyber Academy\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/acgcyberacademy.fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#organization\",\"name\":\"ACG Cyber Academy\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"contentUrl\":\"https:\\\/\\\/acgcyberacademy.fr\\\/wp-content\\\/uploads\\\/2025\\\/10\\\/Untitled-15-2.png\",\"width\":1080,\"height\":1080,\"caption\":\"ACG Cyber Academy\"},\"image\":{\"@id\":\"https:\\\/\\\/acgcyberacademy.fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/fr.linkedin.com\\\/company\\\/acg-cybersecurity\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"EC-Council ICS\/SCADA Cybersecurity - ACG CyberAcademy","description":"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\/SCADA Cybersecurity","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-ics-scada-cybersecurity\/","og_locale":"en_GB","og_type":"article","og_title":"EC-Council ICS\/SCADA Cybersecurity - ACG CyberAcademy","og_description":"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\/SCADA Cybersecurity","og_url":"https:\/\/acgcyberacademy.fr\/en\/events\/ec-council-ics-scada-cybersecurity\/","og_site_name":"ACG CyberAcademy","article_modified_time":"2025-11-19T14:34:58+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/","url":"https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/","name":"EC-Council ICS\/SCADA Cybersecurity - ACG CyberAcademy","isPartOf":{"@id":"https:\/\/acgcyberacademy.fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA.jpg","datePublished":"2025-05-30T08:21:59+00:00","dateModified":"2025-11-19T14:34:58+00:00","description":"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\/SCADA Cybersecurity","breadcrumb":{"@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/#primaryimage","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA.jpg","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/05\/ICS-SCADA.jpg","width":800,"height":800,"caption":"Learn to secure industrial OT systems, analyze risks, respond to incidents, and master intrusion and forensic techniques with EC-Council ICS\/SCADA Cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/acgcyberacademy.fr\/events\/ec-council-ics-scada-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/acgcyberacademy.fr\/"},{"@type":"ListItem","position":2,"name":"Formations","item":"https:\/\/acgcyberacademy.fr\/events\/"},{"@type":"ListItem","position":3,"name":"EC-Council ICS\/SCADA Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/acgcyberacademy.fr\/#website","url":"https:\/\/acgcyberacademy.fr\/","name":"ACG Cyber Academy","description":"","publisher":{"@id":"https:\/\/acgcyberacademy.fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/acgcyberacademy.fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/acgcyberacademy.fr\/#organization","name":"ACG Cyber Academy","url":"https:\/\/acgcyberacademy.fr\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/","url":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","contentUrl":"https:\/\/acgcyberacademy.fr\/wp-content\/uploads\/2025\/10\/Untitled-15-2.png","width":1080,"height":1080,"caption":"ACG Cyber Academy"},"image":{"@id":"https:\/\/acgcyberacademy.fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/fr.linkedin.com\/company\/acg-cybersecurity"]}]}},"_links":{"self":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17463","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events"}],"about":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/types\/mec-events"}],"author":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/comments?post=17463"}],"version-history":[{"count":34,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17463\/revisions"}],"predecessor-version":[{"id":21858,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec-events\/17463\/revisions\/21858"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media\/17465"}],"wp:attachment":[{"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/media?parent=17463"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/tags?post=17463"},{"taxonomy":"accesibilite","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/accesibilite?post=17463"},{"taxonomy":"certification","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/certification?post=17463"},{"taxonomy":"duree","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/duree?post=17463"},{"taxonomy":"examen","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/examen?post=17463"},{"taxonomy":"langue","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/langue?post=17463"},{"taxonomy":"niveau","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/niveau?post=17463"},{"taxonomy":"formateur","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/formateur?post=17463"},{"taxonomy":"cpf","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/cpf?post=17463"},{"taxonomy":"organismes","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organismes?post=17463"},{"taxonomy":"organisme","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/organisme?post=17463"},{"taxonomy":"mec_category","embeddable":true,"href":"https:\/\/acgcyberacademy.fr\/en\/wp-json\/wp\/v2\/mec_category?post=17463"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}