Information Sharing and Analysis Center

Information Sharing and Analysis Center

An international non-profit, solving large problems impacting the connected, digital world on cyber security.

NSD Empaneled ISAC Certified

IOT Security Professional (ICIP)


The 36 hours program is intended to provide a first hand experience in understanding a cyber attack on IoT and SCADA systems. It will also provide an insight as to how various IT infrastructures are setup and the possible loopholes or vulnerabilities in each system can be tested.

Program available on GeM.

Unlock Lifetime Access to ISAC Certifications with Complimentary Training and Free of cost Online Internship: pay only for certification and lab costs.​

Our advanced technical training program is available on demand for groups of at least 10 participants. For further details, please contact us.

This exclusive training covers scenarios that are related to cyber threats observed across infrastructures in various critical IT and Industrial Sectors.

The approach of this training would be in the manner of Offensive testing, so as to understand better, of ways to deal with a hack/malware attack. This approach would make sure that the right defense mechanisms are thought and applied.

Program Outline

  • Cyberange Simulation
  • Industrial Sector Digitization
  • Security Challenges
  • Trojans
    1. Infection Mechanism
    2. Trojan Activities
    3. Defending from trojans
  • Social Engg. Attacks
    1. Spear Phishing
    2. Impersonation
  • DDoS
    1. Bandwidth Attacks
    2. Software / Hardware DoS
    3. Defending DoS Attacks
  • Ransomware
    1. Infection Mechanism
    2. Ransomware Activities
    3. Defending ransomware
  • Scanning for Devices
  • Weak Authentication
  • Attacking and Accessing devices.
  • IoT vulnerabilities
  • Prevention Mechanisms
  • Smart Device Vulnerabilities
  • App Vulnerabilities
  • Protecting Data mediums
  • Propagation and effects
  • Preparing for future attacks
  • Controlling SCADA Systems
  • Overriding Controls
  • SCADA Security
  • DoS on Sensors
  • DDoS on Data Acquisition Boards
  • Effect of losing Sensor data.
  • Wanna Cry Malware
  • Crash Override Malware
  • Threat Intelligence
  • Endpoint Protection
  • Employee training
  • Other Security Software’s
  • VAPT

Program Outcome

Learn about key attack types like Trojans, ransomware, DDoS, and social engineering, including infection mechanisms and defenses.

Explore real-world scenarios that demonstrate vulnerabilities in IoT, SCADA systems, and smart devices, and strategies for protecting them.

Gain skills in threat intelligence, endpoint protection, and vulnerability assessment to prepare and defend against complex cyber threats.

The course is best suited for:

  • Security Researchers
  • Students and Professionals keen in Forensics Investigations
  • Security Teams
  • Law Enforcement Agencies
  • Military and police personnel

What You Get

Live instructor led sessions
The live interactive sessions are conducted by the industry experts
Access to e-learning videos

Get 60 days access to course videos on the ISAC e-learning portal, updated regularly!

Access to Cyberange Virtual Labs

60 Day access to Cyberange Virtual Labs (ID/Password will be sent via email)

ISAC Certified IoT Security Professional Certification

Eligible to be empaneled in National Security Database

Get listed in the National Security Database program at the Falcon level by completing the program.

Complimentary attempts to pass

The Examination includes two free attempts, allowing candidates a second chance to improve their scores or deepen their understanding without additional costs. This benefit supports candidates in achieving certification with confidence and flexibility.

Complimentary access to the ISAC Members ICBIS community

Enjoy complimentary access to the exclusive ISAC Members ICBIS community, connecting you with industry experts and peers. Engage in valuable discussions, share insights, and stay updated on the latest in Cyber Security.

PROGRAM

Features & Benefits

ISAC Community

Get access to the exclusive ISAC Community. Enhance your profile credibility globally. 

Know More

60 Days Access to Cyberange Virtual Labs

Help the victims of cybercrimes. Be a part of a global community and Get Recognition.

Know More

Hands- On with Cyberange Virtual Labs

Get 60 Days access to Cyberange Virtual Labs for hands-on practice:
  • Penetration Testing Labs
  • Social Engineering Labs
  • Malware Labs
  • Cyber Forensic Labs
  • Password Cracking Labs
  • Bug Bounty Labs
Learn cyber security basics practically with your Instructor with our cloud labs!