Schedule/Training Details

IT to OT Red Teaming: End-to-End Attack Paths

This hands-on training walks participants through a complete IT-to-OT red team scenario, following a realistic attack path from initial compromise of an IT environment, through Active Directory exploitation and lateral movement, and into OT networks.

Participants will interact with SCADA systems and PLCs to demonstrate real operational impact, while also examining where detection, segmentation, and security controls succeed or fail. The course places equal emphasis on offensive execution and defensive understanding.

Why Take This Course

"Most offensive security training focuses on isolated techniques within IT environments. This course is different.

Participants will work through a realistic, end-to-end attack path that shows how modern threat actors pivot from IT networks into OT environments, ultimately impacting real industrial processes.

By the end of the training, attendees will understand not only how these attacks are executed, but why common segmentation and monitoring controls fail — and what actually works in practice."

Who Should Attend

Red teamers, penetration testers, SOC analysts, OT/ICS security professionals, incident responders, and security architects.

Key Learning Objectives / Agenda

By the end of this training, participants will be able to:

  1. Understand realistic IT-to-OT attack paths used by modern threat actors
  2. Exploit common Active Directory weaknesses to achieve domain-level access
  3. Perform lateral movement and pivoting between IT and OT networks
  4. Interact with and compromise SCADA systems and PLCs in a controlled lab environment
  5. Identify detection opportunities and security control gaps across the attack chain
  6. Map offensive techniques to practical defensive controls and mitigations

Day 1: IT compromise, Active Directory exploitation, lateral movement, OT fundamentals.

Day 2: IT-to-OT pivoting, SCADA and PLC compromise, operational impact, detection and mitigation.

Prerequisites

Solid TCP/IP networking knowledge; familiarity with Windows and Active Directory fundamentals; basic offensive security concepts. OT experience helpful but not required.

Requirements

Laptop with minimum 16GB RAM (32GB recommended), virtualization support, admin privileges, stable Wi-Fi. All labs and materials provided.

Session Details

Date & Time
April 27, 2026 9:00 AM
Duration
16 hours
Format
in-person
Level
intermediate
Price
...