Announced June 3, 2020, the ThreatGEN Red vs. Blue Academy OT security educational video series is part of our educational offering centered around our ThreatGEN® Red vs. Blue “gamulation” (our training solution that combines gamification and simulation), ThreatGEN’s free video series explores different OT security tools, techniques, and strategies that will eventually be integrated into its professional and higher education versions of Red vs. Blue Academy’s offerings.
OT/ICS Cybersecurity Kill Chain
Posted July 2, 2020
Pascal Ackerman demonstrates an OT/ICS cybersecurity attack on a control system, from start to finish, through the entire ICS Cybersecurity Kill Chain. While this is an in-depth technical demo, no technical experience or knowledge is required to understand it.
You will be able to follow along with all the steps and techniques involved with compromising an ICS environment, from the Enterprise network down, leveraging a initial foothold by sending a booby-trapped word document that ultimately allows the attacker to manipulate the production process and accomplish the ultimate goal of the ICS cyber attack, disruption of a critical control system.
The Security Onion
Posted June 3, 2020
Pascal Ackerman walks through the process of installing, configuring and updating a Security Onion Appliance. Security Onion is a free and open source Linux distribution for threat hunting, enterprise security monitoring, and log management. It includes Elasticsearch, Logstash, Kibana, Snort, Suricata, Zeek (formerly known as Bro), Wazuh, Sguil, Squert, CyberChef, NetworkMiner, and many other security tools.
Following the a step by step deployment guide is a teaser section on some of the functionality of security onion. This video lays the foundation for other training videos in the ICS pentesting series.