Assessing and Protecting Industrial Control Systems

Proven Key Actions for Robust Industrial Security

Hi, I'm Marcel

Most OT security training is designed from the outside in—this one starts from the inside. I’m not just someone who studied industrial security; I’ve lived it.

As an automation engineer turned OT security consultant, I’ve spent years in the field—on international sites, inside substations, at the heart of complex production lines. I’ve debugged PLCs in the middle of the night, reverse-engineered firmware from real-world devices, and helped organizations secure their operations from the ground up.

This course distills that hands-on experience into practical, no-nonsense training that bridges the gap between theory and the real world of industrial systems. If you're ready to learn how OT systems really work—and how to secure them—you're in the right place.

What is Engineering‑Driven Industrial Cybersecurity?

This isn’t a repackaged IT course with an OT label. It’s built from the ground up by someone who’s worked inside industrial environments—designing, maintaining, and securing the systems that keep the operation running.

This course gives you the knowledge and tools to apply field-tested protection strategies to real OT systems. From asset visibility to network segmentation and onboard hardening, you’ll learn how to secure operations without disrupting them.

If you’re serious about defending industrial environments in a way that actually works on the shop floor—not just on slides—this is the course you’ve been looking for!

Learn from a Pro: Course built by a veteran automation engineer — academic theory and real‑world OT know‑how

Practical, Not Theoretical: Every technique in this course has been tested in real environments—from production lines to substations.

Realistic Lab Environments: Encounter a simulated industrial network, that reflect actual field setups.

Beginner Friendly Toolkit: Use only free, open-source tools that are proven and accessible—no expensive licenses or vendor lock-in.

Portfolio Builder: Real‑world experience you can showcase on LinkedIn or in your CV.

 Community & Support: Join our course community channel

"Well laid out high level overview of end to end cyber security assessment of Industrial Control System. With further considerations around understanding typical components found in a ICS environment. Would recommend!"

Rooman A.
⭐⭐⭐⭐⭐
APTICS Alumni

"The instructor's OT simulator provided great hands-on experience. All done at minimal cost, and the knowledge gained is priceless!"

Muhammad S.
⭐⭐⭐⭐⭐
APTICS Alumni

"Realy great course. Gives a deep understanding of basic concepts, frameworks and defence action in an OT enviorment. Thank you very much Marcel!"

Maximilian W.
⭐⭐⭐⭐⭐
APTICS Alumni

Built for Curious Professionals. No Gatekeeping. No BS.

This course was created for people who are ready to dive in and think for themselves—no matter their background. Whether you’re an IT pro, OT engineer, student, or career-switcher, if you’re motivated to learn, this is your starting point. “I don’t care where you’re from—your curiosity matters, your background doesn’t.”

👨‍💻 For IT Professionals:

You’ve mastered enterprise security. Now step into the world of OT—where uptime matters more than patch cycles and legacy systems can’t be rebooted on demand.

This course bridges your IT experience with industrial realities, helping you understand how to identify critical assets, segment industrial networks, and implement protection strategies that work without disrupting operations.

✔️ Structured learning
✔️ Real-world examples
✔️ Protection over prevention theater

🤖 For Automation Professionals and Engineers:

Your machines are safe. But are they secure?

This course shows you how to protect your PLCs, HMIs, and field devices from real-world cyber risks—without relying on buzzwords or silver bullets.

Learn how to apply proven protection techniques in actual industrial environments.

✔️ Field-approved strategies
✔️ Protocol-aware protection
✔️ Shop floor realities, not PowerPoint theory

🌱 For Complete Newcomers:

New to OT or cybersecurity? No problem.

You’ll explore simulated industrial systems, learn how modern industrial environments are structured, and discover how professionals assess and secure these environments from the inside out.

No jargon, no overwhelming theory—just guided, hands-on learning at your pace.

✔️ Beginner-friendly
✔️ Walkthroughs with context
✔️ Clear goals, real outcomes

Does This Sound Like You?

This course is for you if…

✅ You want real-world cybersecurity knowledge—not just frameworks and buzzwords

✅ You want to understand how to protect them with practical, field-proven techniques

✅ You’re tired of overpriced, locked-down courses

✅ You learn best by applying concepts —not watching endless slide decks

This course is not for you if…

❌ You expect someone to do the thinking for you

❌ You prefer passive consumption over active application

❌ You’re uncomfortable doing some setup

❌ You prefer handholding over exploration—this course challenges you to think and troubleshoot like an engineer

Get your high-vis and hardhat ready – we’re heading into the field with a protector’s mindset!

By the end of this course, you’ll:

✅ Create OT-specific threat scenarios using ATT&CK, HAZOP, and DST

✅ Build an asset inventory tailored to industrial environments

✅ Develop and apply mitigation techniques using defense-in-depth principles 

✅ Harden field devices and secure remote access configurations

✅ Reduce attack surfaces through segmentation and secure coding

✅ Communicate effectively to bridge IT/OT communication gaps 

✅ Understand OT system evolution and worker mindsets
 
🚀 Build Your Portfolio:
  1. Defense in Depth strategies
  2. Threat modeling with industry frameworks
  3. Assessment experience
  4. Cross-domain communication skills

What’s Inside the Course?

This course is a hands-on journey into the OT domain—engineered for learners who want depth, realism, and structure. This is just a high-level overview. Scroll down to preview the full curriculum with 80+ lessons on RICKCEN.

Section 1 - 3: Basics & Setup

✅ Intro to OT environments
✅ Lab setup and virtual environment  
✅ Practical refresher exercise

Section 4 - 8: Assessment  

✅ Simulate client OT environment
✅ Create inventory and network architecture
✅ Discover services with nmap
✅ Assess exposed devices

Section 9 - 10: Threats and Protection 
✅ Build threat scenarios with frameworks
✅ Implement defense in depth  

Section 11: Connecting the Worlds

✅Understand OT workforce mindset
✅Learn efficient communication techniques

⚠️ What You’ll Need to Get Started ⚠️

To make the most of the hands-on simulations in this course, ensure your system meets the following requirements:

 ✅ Windows 10 or 11 with Admin rights to install and run Oracle VirtualBox

✅ At least 8 GB RAM (16 GB recommended for optimal performance)

✅ A stable internet connection for streaming and downloads  

No industrial hardware or expensive tools needed — the entire lab runs virtually using open-source resources.

Ready to Learn OT Security the Right Way?

No fluff. No fear-mongering.
Just real-world OT cybersecurity training from an engineer who’s lived it.
Click here to go to the sales page

Full Curriculum

Ready to Get Started?

85 lessons, 3.5+ hours of content, 3.0+ hours of practical lab exercises.
Click here to go to the sales page: