Industrial Control System Exploitation develops advanced operator capability to analyze, enumerate, and exploit live industrial control system (ICS) environments using real hardware platforms. The course focuses on programmable logic controllers (PLCs), human–machine interfaces (HMIs), industrial communication protocols, and sector-specific control technologies, including maritime and vehicle systems. Students progress from foundational OT architecture and device programming to live protocol analysis, system enumeration, and controlled exploitation of industrial processes. Instruction emphasizes protocol fluency, safety-aware exploitation, and realistic attacker workflows rather than indiscriminate disruption. Hands-on labs are delivered using custom-built live training kits, requiring students to adapt techniques to physical constraints, timing dependencies, and operational risk.
Intended Audience: Advanced cyber operators, red team personnel, and ICS/OT security practitioners who require hands-on experience assessing and exploiting live industrial control systems. Students should have prior experience with networking, Linux systems, and basic exploitation concepts. Familiarity with industrial or embedded systems is beneficial but not required.