Part I: Industrial Control Systems Primer
Chapter 1: Industrial Control Systems and Architecture Overview
Chapter 2: Industrial Control Systems [In]Security Landscape
Part II: Penetration Testing (Hacking) Industrial Systems
Chapter 3: Industrial Hacking / Penetration Testing Strategies
Chapter 4: Hacking Industrial Protocols
Chapter 5: Hacking Industrial Devices
Chapter 6: Hacking Industrial Applications
Chapter 7: ICS Zero Day Vulnerability Research
Part III: ICS/SCADA Malware and Advanced Persistent Threats (APT)
Chapter 8: ICS Malware Primer
Chapter 9: Anatomy of Real-World (ICS/SCADA) Infections
Chapter 10: Malware and APT Countermeasures
Part IV: Securing Industrial Control Systems
Chapter 11: Threat Intelligence
Chapter 12: Cyber Security Strategies
Chapter 13: Risk Assessment
Chapter 14: Industrial Security Standards: A Brief Overview
Chapter 15: Summary of Countermeasures
Part IV: Appendices
Appendix A: ICS/SCADA Penetration Testing Methodology Template
Appendix B: ICS/SCADA Protocols and Port Numbers
Appendix C: Common ICS/SCADA Device Default Username/Passwords