ICS Overview-Processes & Roles,Controllers and Field Devices,SCADA,Exercise: Programming a PLC & HMI. IT & ICS Differences-ICS Life Cycle Challenges,Architectures and Field Devices-ICS Attack Surface,Secure ICS Network Architectures,Exercise-Identifying External Attack Surfaces,Architecting a Secure ICS Site,Communications and Protocols-Ethernet and TCP/IP,Enforcement Zone Devices,Basic Cryptography,Wireless Technologies,Wireless Attacks and Defenses,Exercise,Enumerating Modbus TCP ,Supervisory Systems,Supervisory Servers & Attacks,User Interfaces & Attacks,Defending Services,Exercise: Bypassing Auth with SQL Injection,Fuzzing,ICS Security Governance,Defending Unix and Linux,Endpoint Protection,Measuring Cyber Security Risk,Incident Response,Exercise-Hardening Linux,Event Logs,Risk Approaches and Calculations