RCCE Course
Course #264

ICS Hardening Workshop

📊 Level: Intermediate
⏱️ Duration: 2 Days
🏷️ Track: OT Security
📋 Prerequisites: Foundations
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn Industrial Control System security including PLC programming security, DCS architecture protection, safety instrumented system integrity, industrial protocol analysis, and ICS-specific incident response. RCCE students will learn to assess ICS environments for cybersecurity vulnerabilities, implement defense-in-depth for industrial control networks, monitor ICS communications for unauthorized commands, detect and respond to attacks targeting programmable logic controllers and distributed control systems, maintain safety system integrity during cyber incidents, apply ICS security standards including IEC 62443 and NIST SP 800-82, and bridge the gap between IT security teams and OT operations staff. This hands-on hardening course focuses on reducing attack surface through practical configuration changes and security guardrails. Building on core knowledge, RCCE students will learn to apply hardening baselines, validate configurations, and measure the security improvement achieved. Students walk away with actionable hardening checklists and the skills to maintain hardened configurations as environments evolve.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing ICS Hardening Workshop
🧠 What You Will Learn
  • Execute hands-on tasks for fast track
  • Explain ICS Architecture Overview fundamentals
  • Execute hands-on tasks for level 5: enterprise
  • Execute hands-on tasks for level 4: business planning
  • Execute hands-on tasks for level 3: operations
  • Execute hands-on tasks for level 2: control
  • Execute hands-on tasks for level 1: basic control
  • Execute hands-on tasks for what plcs do — covering Execute ladder logic/function blocks.
  • Execute hands-on tasks for security concerns — covering Legacy firmware rarely patched.
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for protection strategies — covering Distributed controllers across zones, Segment controller networks from HMI.
📚 Course Outline
Module 01Fast Track
Module 02ICS Architecture Overview
Module 03Level 5: Enterprise
Module 04Level 4: Business Planning
Module 05Level 3: Operations
Module 06Level 2: Control
Module 07Level 1: Basic Control
Module 08What PLCs Do
Module 09Security Concerns
Module 10DCS Architecture and Protection
Module 11Protection Strategies
Module 12SIS Architecture
Module 13Hardening Steps
Module 14Testing Requirements
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice ics hardening workshop by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Execute hands-on tasks for fast track
  • Lab 2: Explain ICS Architecture Overview fundamentals
  • Lab 3: Execute hands-on tasks for level 5: enterprise
  • Lab 4: Execute hands-on tasks for level 4: business planning
  • Lab 5: Execute hands-on tasks for level 3: operations
📊 Skill Level
Intermediate
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for ICS Hardening Workshop, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI