SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsCritical infrastructure is increasingly under attack from a variety of threat groups ranging from nation states to criminal opportunists.
About a decade ago, I started working for an electric power utility in the Pacific Northwest of the United States. I had many years of experience as an offensive security professional, and I was excited about the opportunity to help build an internal PenTest and red team program for the company that kept the lights and heat on at my Seattle home.
I knew I was doing impactful work, but it still took nearly two years for the proverbial lightbulb moment when I realized I needed to shift focus away from enterprise business systems and toward the critical infrastructure functions that comprised the company’s core mission and powered local communities and the economy. Even after realizing that our power generation, transmission, and distribution systems should be the primary focus of the offensive security program, I still made the mistake of applying traditional IT penetration testing techniques and attitudes to systems that required a unique ICS-focused approach.
I was doing IT PenTests in an OT environment.
I knew this wasn't the right approach, but at the time, I couldn't find any resources to guide or redirect me. I distinctly recall attending a Consequence-driven Cyber-informed Engineering (CCE) workshop at Idaho National Lab (INL), and when I asked the instructor where I could go to learn more about the offensive techniques we were discussing, I was told there were only a few people in the world with that knowledge and that it was too advanced to share. That frustrated me, but it also fired my dedication to figuring it out on my own.
Now, a decade later, and many PenTests and security assessments in industrial environments behind me, I am absolutely convinced that there is a right way to apply offensive security assessment techniques in industrial environments. If done with respect and awareness of the uniqueness and sensitivity of ICS systems, it can be done safely and effectively.
To be honest, I didn't end up figuring all of this out on my own. I've had mentors, colleagues, leaders, and peers who guided my growth and taught me the lessons I now get to share. ICS security is a community, and the ICS613 course demonstrates this well – the class combines the perspectives and lessons from three authors who all have unique but complementary ICS offensive security backgrounds. We each bring different perspectives to the classroom, but at the end of the day, all three of us share the same core conviction: offensive security assessments can and should be done in ICS environments; they can be done safely and effectively; and it's important to equip the ICS security community with the skills and experience to do so.
Governments and regulatory bodies are catching on, and regulatory and compliance pressures are mounting. Regulation like NERC-CIP, the TSA Pipeline Security Directive, and emerging international standards now mandate regular vulnerability assessments of critical systems.
Asset owners need assessors who understand the unique challenges of cyber-physical systems where a single mistake could trigger safety systems or disrupt essential services.
Most penetration testers excel in traditional IT environments but lack the specialized knowledge to safely and effectively assess industrial control systems.
How can an asset owner evaluate the skills and abilities of the penetration tester or assessor they hire to test their critical systems? How can they be confident the testing will be conducted safely, or that the outcomes will be accurate, actionable, tailored to enhancing operational resilience?
How do they know they're getting an ICS PenTest, not just an IT PenTest in an OT environment?
The ICS613 course bridges this gap with a methodology specifically designed for operational technology environments.
This course introduces four key differentiators that make it uniquely valuable compared to other offensive security training:
Students learn to plan and execute safe, effective, and valuable penetration tests and security assessments using both passive and active techniques. The methods prioritize safety, efficiency, and ICS relevance, ensuring that engagement outcomes are laser-focused on the asset owner's organizational and operational security objectives.
Students learn how to use existing system utilities, vendor tools, and built-in functionality to achieve assessment goals. LOTL techniques are emphasized for two reasons.
This focus ensures that assessments are not only safer and more effective but also realistic and representative of the types of threats assets owners face in the wild.
This revolutionary methodology is tailored to ICS environments and goes beyond traditional security assessments. It’s mapped to the ICS Cyber Kill Chain, ensuring an adversary- and process-centric approach.
The Top-Down focuses on how adversaries could gain access to key ICS systems and information necessary to execute an ICS-specific attack.
The Bottom-Up methodology equips students with a passive analysis framework to develop realistic ICS attack scenarios and identify effective mitigations to support operational resilience.
The course provides students with hands-on labs using actual programmable logic controllers (PLCs) and a fully functional ABB 800xA Distributed Control System (DCS) emulating a liquified natural gas (LNG) processing plant. Students get practical experience applying techniques in a safe, controlled lab environment. The labs cover:
This course begins with key concepts, assessment types, and industry frameworks. It introduces passive and active ICS vulnerability assessment techniques and guides students through a complete Top-Down/Bottom-Up engagement targeting a simulated LNG facility.
Exercises
Topics
Exercises
Topics
Exercises
Topics
Exercises
Topics
Exercises
Topics
We've been lucky enough to teach this course during two Alpha runs, each with a talented cohort representing the full spectrum of the ICS security community, including defenders, asset owners, and vendors. Their feedback has helped us refine the course, and we're incredibly grateful for their participation and insight.
Feedback has been overwhelmingly positive, but one review stood out:
"ICS613 provides realistic, practical OT assessment and PenTesting scenarios that can be safely applied in sensitive industrial environments. The emphasis on low-risk, real-world engagements—conducted in close partnership with OT stakeholders—reflects the caution and collaboration that is absolutely essential when working with cyber-physical systems. The course is industry-agnostic, making it broadly applicable across diverse OT sectors. The OT/ICS community had a clear need for this kind of training, and SANS delivered."
If you've taken the ICS515 course, you'll remember the core lesson: "defense is doable." And so is offense.
Critical infrastructure deserves a dedicated offensive security methodology and mindset. The industry and the communities that rely on it deserves true ICS assessments, not repurposed IT PenTests in OT environments.
The ICS613 course drives home the point that offensive security assessments in ICS environments can be done safely and effectively.
After attending, you will leave with the skills and knowledge to execute meaningful, safe, effective, and valuable offensive security assessments in any industrial environment you’re tasked with protecting.
We look forward to seeing you in class!
Tyler Webb contributes specialized expertise in ICS penetration testing methodologies, focusing on practical techniques that protect operational integrity while identifying critical vulnerabilities.
Read more about Tyler Webb