Training

OT/ICS Cybersecurity: From Packet to Plant Floor

Short Intensive Course for Beginners

Instructor: Dr. Sulaiman Alhasawi
Founder of ICSRank.com | Host of ICS Arabia Podcast | Writer at ZeronTek
[LinkedIn Profile]


๐Ÿ—“๏ธ Duration: 3 Hours (One Day)
๐Ÿ“ Delivery: Live online (video conference) โ€“ cohort-based


๐Ÿงญ Course Overview

Industrial systems were not designed with cybersecurity in mind. As IT and OT continue to converge, vulnerabilities that were once theoretical can now have real physical impact on safety, availability, and production.

This short intensive course provides a clear, practical introduction to OT/ICS cybersecurity, designed specifically for beginners and professionals transitioning into industrial environments.

Rather than focusing on tools or complex configurations, the course uses instructor-led lab demonstrations to explain:

  • How OT/ICS environments actually work
  • Why traditional IT security assumptions fail in OT
  • How insecure industrial protocols enable unauthorized control
  • How cyber actions translate into physical process impact
  • How defenders regain visibility and control in OT networks

All demonstrations are delivered in a controlled lab environment using PLCs, HMI/SCADA systems, and monitoring tools โ€” allowing participants to see how attacks and defenses behave without needing to build or configure labs themselves.


๐ŸŽฏ Course Goal

This course is designed to:

  • Build the correct mental model of OT/ICS security
  • Help participants understand impact, not just compromise
  • Serve as a first structured step into OT cybersecurity

It is not a deep technical or penetration testing course.
It is an orientation course that prepares students for deeper learning later.


๐Ÿ“š What You Will Learn

  • How OT/ICS environments work (PLCs, HMIs, Engineering Workstations)
  • Why OT security priorities differ from IT security
  • How insecure industrial protocols allow unauthorized control
  • Live demonstration of cyber actions impacting an industrial process
  • How defenders detect threats and regain visibility in OT networks

๐Ÿงช Lab Format (Important)

  • ๐Ÿ”น Instructor-led live lab demonstrations
  • ๐Ÿ”น No participant lab access required
  • ๐Ÿ”น No software installation or setup
  • ๐Ÿ”น Focus on understanding behavior, impact, and defense

This format ensures a smooth learning experience and allows all participants to focus on concepts rather than troubleshooting.


๐Ÿ’ฌ Q&A Format

To maintain focus and complete all demonstrations:

  • Questions are collected during the course
  • Live Q&A is held at the end of the session

๐Ÿ‘ฅ Who Should Attend?

  • IT professionals transitioning into OT or industrial environments
  • OT / ICS engineers seeking cybersecurity awareness
  • Cybersecurity beginners interested in critical infrastructure
  • Anyone looking to understand OT security fundamentals clearly and safely

No prior OT or ICS experience is required.


๐ŸŽ What You Get

  • ๐Ÿ““ Concise course notes (PDF)
  • ๐ŸŽฅ Lifetime access to the course recording
  • ๐Ÿ“œ Certificate of completion
  • ๐Ÿ” Instructor-led lab walkthroughs
  • โœ” Access even if future versions of the course are updated

๐Ÿ“„ Download the full course agenda (PDF)
A detailed breakdown of modules, demonstrations, and learning outcomes.
๐Ÿ‘‰ Download Course Agenda


๐Ÿ“Œ Ready to Join?

๐Ÿง  Learn how OT security really works
๐Ÿ” Understand cyber-to-physical impact
๐ŸŽ“ Beginner-friendly, no setup required

๐Ÿ‘‰ Click here to book your seat


โ€œSee what professionals who attended my courses had to say โ€” check out their recommendations on LinkedIn.โ€