Join the waitlist for upcoming courses
Limited Spots Available. Sign Up Now
Foundational Course
In-Person at TheLink Facility, Columbia MD / Mobile to Your Facility

Director of Research, Test, and Evaluation

Cybersecurity Curriculum and Training Expert
November 3-7, 2025 (now full)
This BoOTcamp is a foundational course introducing security professionals with the skills to identify, evaluate, and mitigate the unique cybersecurity risks inherent to Operational Technology (OT) and Industrial Control Systems (ICS), preparing you to protect the vital systems that power our world.
Upon completion of the course students will be able to identify OT systems, understand the unique security challenges they pose, and confidently execute strategies for protecting them.
The TAC will provide students with pre-configured laptops, breadboards, ESP32s, Raspberry Pis, wiring kits, and workbooks. Students will be able to take everything except the laptops home.
Although this course is designed for professionals already in cybersecurity, it can be adapted for many different skill sets.
Incoming students should be able to:
Enrollment:
6–20 students
Location
Understand what a PLC is by creating a PLC out of an ESP 32
Learn how to read and make minor modifications to Ladder Logic – one of the most common PLC programming languages
Comprehend how plants operate through readings, discussions, and setting up a miniature plant
Study the Modbus protocol by analyzing the strengths and weaknesses of Modbus
Explore the Purdue model and demonstrate understanding by creating your own network architecture
Know how to start securing OT networks by creating, sending, and detecting attacks on your plant
Research and present on the various stages of Incident Response
Showcase your new skills by attacking, defending, and operating your plant
Our OTBC curriculum directly aligns with NICE and DoD 8140 cyber work roles, ensuring every learner develops the technical depth required to protect and operate industrial environments across government and industry.
DoD 8140: 621 | NICE: OM-ENG-001 Skill Build: Hands-on PLC programming, ladder logic, HMI development, Modbus operations, OT network architecture, segmentation, and real-world OT incident response.
DoD 8140: 522 | NICE: PR-CDA-001 Skill Build: OT attack scenarios, threat identification, IoC analysis, SIEM monitoring with Elastic, OT Cyber Kill Chain, and risk-based hardening recommendations.
DoD 8140: 671 | NICE: OM-OPS-001 OTBC Skill Build: Purdue Model architecture, device identification, network segmentation & microsegmentation, and understanding communication paths across OT layers.
DoD 8140: 621 | NICE: OM-ENG-001 Skill Build: End-to-end understanding of PLCs, control logic, HMI behavior, ICS protocols, plant operations, and engineering-driven security architecture.
DoD 8140: 621/522 | NICE: OM-ANL-001 Skill Build: Device-level behavior, OT-specific risk assessment, IT/OT comparison, attack pattern analysis, and communication between PLCs, HMIs, and network layers.
The ability to describe OT devices, how they operate, communicate including PLC, HMI, LD PLC editor, ModbusTCP control and monitoring.
Unit 1: What is a PLC? Program ESP32 as PLC.
Unit 2: Ladder Logic.
Unit 3: Plant Operations (automated oven via OpenPLC on Raspberry Pi).
Unit 4: Modbus & HMI communications.
Describe how computer networks operate and identify computing/network devices on OT networks.
Unit 5: Network Architecture – Purdue Model, devices within OT network, hypothetical Pizza Plant network design.
Describe similarities and differences between personal, enterprise, and cloud service devices.
Unit 5: Network Architecture – device types across levels of the OT network.
List and give examples of threats and attacks on OT/IT network devices.
Unit 6: Attacking and Defending – OT Cyber Kill Chain, Modbus attacks, lab-based attack and monitoring stations using Elastic Agent.
Explain IT vs OT users, access control, and the importance of network segmentation and microsegmentation in OT.
Unit 5: Network Architecture – Purdue Model and Pizza Plant segmentation.
Unit 7: Incident Response – IT vs OT IR, mini IR plan for the plant.
Conduct research and intelligence gathering on threats, threat groups, IoCs, and recommend prioritized defenses for an AOR.
Unit 7: Incident Response – research on IR stages, lessons learned, and identification-focused presentations.
Differentiate traditional IT cybersecurity versus OT cybersecurity and brief on OT threats/trends and relevant assets.
Unit 7: Incident Response – IT vs OT IR comparison, OT incidents review, mini IR plan for the OT plant.
Describe OT attack vectors using the Purdue Model, identify IoCs, and brief on mission impact.
Unit 5: Network Architecture – Purdue Model & segmentation.
Unit 6: Attacking and Defending – Modbus attacks, IoC identification, Elastic monitoring.
Identify and describe means of securing/hardening IT and OT networks, including insider threat and access control based on risk.
Unit 7: Incident Response – OT IR stages and plan.
Unit 3: Plant Operations – identifying critical operating parameters.
Explain how IoCs relate to detection rules, SIEM alerts, and incident response handling plans.
Unit 6: Attacking and Defending – Elastic Agent monitoring, Wireshark traffic analysis.
Unit 7: Incident Response – IR stages and planning for the plant.
What’s included? Yours to keep:
As a nonprofit dedicated to advancing our nation’s cyber and defensive capabilities, The TAC offers discounted enterprise packages and military pricing. If you’re looking to upskill your team in integrated IT/OT cybersecurity, reach out to our team to learn how we can help, at a price that makes sense.
This BoOTcamp trains professionals to secure Operational Technology used across the 16 critical infrastructure sectors, as defined by CISA, which are vital to U.S. security, economy, and public safety. These sectors include: