This site is part of the Informa Connect Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 3099067.

Assessing and Scanning Highly Sensitive Networks - BH On-Demand
Menu

Assessing and Scanning Highly Sensitive Networks (OD)

maps_home_work

Delivery Type

language

Language

location_on

On Demand Now

English

$599.00

  • location_on

    On Demand Now

    Language: English

    $599.00

This interactive training emphasizes safe, staged assessment methods that reduce the chance of disrupting fragile systems

This self-paced training teaches security professionals how to assess and test Highly Sensitive Networks (HSNs), environments such as industrial control systems (ICS), hospitals, manufacturing plants, building management systems, and other operational technology (OT) networks. These networks are highly sensitive because they often run legacy systems, cannot easily be patched or hardened, and failures can cause real-world harm (safety risks, production downtime, environmental damage).


  • Skill Level: Intermediate
  • Student Requirements:
    • Familiar with TCP/IP protocols and common IT services
    • Knowledge of general network secuirty concepts (firewalls, IDS/IPS, segmentation)
    • Basic packet analysis skills (i.e., can use Wireshark at an intermediate level)
    • Some scripting/automation knowledge (Python, PowerShell, or Bash) is a plus
  • Format: Online, Self-Paced, On-Demand.

  • Course Outline: This course contains 3 modules, each representing a different assessment type:

    • Security Architecture Reviews (no interaction with endpoints)
    • Network Capture Assessments (minimal interaction with network devices)
    • Port and Vulnerability Scanning (minimal interaction with endpoints)
  • Key Takeaways:
    • Confidently perform security architecture reviews of OT/ICS networks
    • Use network captures to build asset inventories and analyze communication flows
    • Conduct low-risk port and vulnerability scans without crashing sensitive devices
    • Communicate findings effectively with both IT security staff and OT engineers
    • Be seen as a trusted advisor capable of bridging IT security with real world operational safety

Continuing Professional Education (CPE) Credits

Black Hat provides Continuing Professional Education (CPE) credits for security professionals certified through ISC2. These credits help maintain and validate your industry certifications by recognizing your ongoing education and skill development.

CPE credits offered:

  • Penetration Testing Fundamentals – 4 CPE credits
  • Infrastructure Hacking Fundamentals – 3 CPE credits

For on-demand courses, security professionals must self-report their CPE credits within 30 days of completing the course.

CPE credits serve as a globally recognized standard unit for continuing education in the cybersecurity field. For details on certification requirements and the reporting process, please refer to ISC2’s official guidelines.

Black Hat does not maintain records of earned CPE credits. It is the responsibility of each participant to track and report their credits as required.