
Singapore-Industrial Control Systems Cybersecurity 301 (SG-ICS 301)
Tegasus is glad to announce that our Singapore-Industrial Control Systems Cybersecurity 301 (SG-ICS 301) training course has been granted the funding from the SkillsFuture Singapore (SSG) under SUTD Academy.
This course provides hands-on training for understanding, protecting and securing Industrial Control Systems (ICS) from cyber-attacks and includes a red team versus blue team exercise conducted within an actual Control Systems environment. Attendees will also use their cyber skills along with tools covered in the 301 Virtual (301V) to solve a series of hands-on exercises.
Day 1
-
IT versus OT network
-
Wireless technologies, attacks, and defences
-
ICS Architecture
-
Defence 1 – Corporate IT
-
Network Discovery
Day 2
-
Defence 2 – IDS / Firewall
-
Cyber Defence 1
-
Cyber Defence 2
-
Attacker Perspective 1
-
iTrust testbed tour
Day 3
-
Attacker Perspective 2
-
Can you hack it?
-
Red and Blue Team Strategy discussion
-
In-class Open-ended/MCQ assessment
Day 4
-
Cyber Exercise
1
2025 registration is open now
Duration:
-
4 days, 9am - 6pm
Course dates:
-
20, 21, 22, and 24 July 2026.
Location:
-
ASEAN-Singapore Cybersecurity Centre of Excellence (ASCCE)
Registration
-
Registration Closing Date: 29 June 2026
2
Who Should Attend?
Information Technology (IT) cybersecurity specialist, Industrial Control Systems (ICS) assistant engineer, Industrial Control Systems (ICS) engineer, Industrial Control Systems (ICS) plant manager
3
Minimum Entry Requirements
-
Successful completion of the virtual ICS300 course and passed the assessment test with an 80% or better.
-
Minimum 3 years of practical knowledge and experience with Industrial Control Systems (ICS) networks, software and components. They should have a practical understanding of IT network basics, such as User Datagram Protocol (UDP) and Transmission Control Protocol (TCP), as well as media access control (MAC) and Internet Protocol (IP) addressing.
-
Minimum 3 years of experience/exposure with network security management and troubleshooting at the junior to mid-level technical staff range.
4
Learning Objectives
-
Learn how to defend IT/OT connected systems, include maintaining an oversight on the cybersecurity architecture
-
Learn about common cyber vulnerabilities and the importance of understanding the environment they are tasked to protect so as to improve and maintain Information Technology/Operational Technology/(IT/OT) cybersecurity posture
-
Learn the strengths and weaknesses of systems to identify mitigation strategies, policies, programs and security technologies that will provide the defence-in-depth needed to ensure a more secure Operational Technology(OT) environment and its integration
-
Enhance cyber skills through hands-on exercise where participants are either attacking (Red Team) or defending (Blue Team) Information Technology/Operational Technology/(IT/OT) networks
-
Build an understanding on best practices to better protect our critical information infrastructure

