Watch the video below to learn why CambiOS Academy's courses are trusted by thousands of OT/ICS experts for the most current cybersecurity training and skills-building.

Write your awesome label here.
Advance Your Career

Sign up for a Free Preview of our OT/ICS Fundamentals Cybersecurity Online Training Course.

Learn at your own pace and master OT cybersecurity with expert-led courses focused on real-world industrial and operational threats.
Sign up now and get instant access to the first module for free. No credit card required.

Trusted by the OT/ICS Industry

OT/ICS Fundamentals Cybersecurity Training

This introductory course is perfect for individuals or teams looking to improve their OT/ICS cybersecurity skills. Expand your fundamental knowledge of Operational Technology (OT) and Industrial Control Systems (ICS) cybersecurity with training that enables you to apply your Business- and IT-centric skills to build secure, resilient environments.

The CambiOS Difference

Gain OT Cybersecurity Skills that Benefit Your Organization and Take Your Career to the Next Level

Cambios Academy’s training equips you to become a resilient and competitive leader with tailored, hands-on OT security courses that ensure compliance and measurable skill growth at any level. Unlike IT best practices, OT environments require distinct approaches—this course highlights key differences and explains why IT solutions can be ineffective or even harmful in OT/ICS settings.

Experienced
Faculty

Learn from industry-leading instructors with hands-on experience building and securing assets.

Defend Your Infrastructure

Build essential knowledge of threats to infrastructure and effective defense strategies.

Gain Practical OT/ICS Skills

Acquire valuable OT/ICS skills to spot vulnerabilities and improve security immediately.

Confident OT/ICS Navigation

Develop confidence to effectively handle cybersecurity challenges in OT/ICS environments.

Why So Many OT/ICS Industry Leaders Came Together To Create CambiOS Academy

Over 20 Faculty members with hundreds of years of experience in OT/ICS cybersecurity came together to create CambIOS Academy's online training courses.

Don't just take our word for it

Witness it first hand, directly from our loyal students.
"My Master’s program in cybersecurity provides almost no coverage of OT cybersecurity, so the ICS/OT Fundamentals course at CambiOS Academy has been invaluable. It gave me structured, detailed insights into how industrial systems actually work and the unique security challenges they face. This course has taught me more about OT in a short time than my graduate program has altogether."

Rylen Owens

Master's Student in Cybersecurity & High School Teacher
"Engaging presenters! Each module is brief, and the frequent graphic transitions help maintain the attention of the easily distracted. SQUIRREL . . . SQUIRREL!! I also appreciated the short quizzes between every section."

Brad W.

OT Security Infrastructure Architect; Global Logistics Company
"The simplicity of the explanations and real-life examples is the course's biggest strength."

Leanne W

Change Management; Postal and Shipping Company

Try OT/ICS Fundamentals For Free Today!

Meet Just A Few Of Our Faculty

#industry experts | #engaging content | #breaking down learning barriers | #learn at your own pace | #decades of experience

Empty space, drag to resize
JONATHAN POLLET
25 years of experience
MIKE HOLCOMB
24 years of experience 
MARTY EDWARDS
30 years of experience 
Andrew ginter
42 years of experience 
Bryan Singer
 27 years of experience
Marc Visser
 22 years of experience

Course Details
Select a topic to learn more

Course Description & Structure

This comprehensive course offers comprehensive training in Operational Technology (OT) and Industrial Control Systems (ICS) from the ground up. Students build their own ICS HMI applications, capture and analyze ICS protocols, configure OPC servers, and develop complete ICS systems from the I/O level through to the HMI interface. The course covers SCADA components, PLCs, DCS controllers, protocol analysis (including Modbus), and the complete architecture of industrial control systems. Through extensive hands-on exercises using structured virtual machine environments, participants gain practical experience with real industrial control systems.

This course provides the students with a flexible approach to online modules with live, instructor-led sessions and a modular online format that lets you focus on content most relevant to your specific role. 

Course Certificate & Continuing Education Credits

Graduates receive an industry-recognized certificate of completion that demonstrates their foundational knowledge of OT/ICS systems. Completing this course will, in most cases, qualify you for Continuing Education credits.  Your certificate will be available upon completion and ready to submit.

Requirements & Eligibility

Students should possess foundational knowledge of IT or cybersecurity. No prior OT experience is needed - the course is specifically designed to bridge the IT/OT knowledge gap for professionals who already understand IT concepts but need to learn how industrial systems work differently.

Who Benefits From This Training Course

This course is designed for technical professionals who want to apply their existing skills to OT environments without becoming OT experts. IT and cybersecurity professionals working in industrial environments, including consultants, SOC analysts, auditors, risk managers, and career changers moving into OT roles stand to benefit the most from taking this course.

Step-by-Step Enrollment Process

To enroll in the free preview course, sign up below or sign in if you already have an account.  Once you have signed in, you will receive access to the preview module. After completing the module, you will be able to continue your training with the full course (which will require a credit card to access). 

Paying for Your Course

This is a free preview.  To sign up for the full 8-hour course (which will require payment), click here. If you are a paid Global Member of (CS)2AI (Control System Cybersecurity Association International) you are eligible for a discount. Inquire with them for a code.

We Offer Group Rates & Custom Training Modules

We offer custom enterprise packages designed to help organizations cross-train their IT workforce for OT environments, expediting training for new hires working with industrial systems, and cementing knowledge for existing team members.
Advance your career

Sign-up and receive a  FREE preview of OT/ICS Fundamentals course.

Completing this form creates your free CambiOS Academy Account enabling you to preview of our OT/ICS Fundamentals course at no charge.

After you complete the course preview, you may explore our complete catalogue of operational and industrial cybersecurity training that can help you build your skills and advance your career.

Frequently asked questions

ICS (Industrial Control Systems)

What is it: Computer-based systems that monitor and control industrial processes including manufacturing, power generation, water treatment, and transportation systems.

Key components: PLCs (Programmable Logic Controllers), HMIs (Human Machine Interfaces), SCADA systems, RTUs (Remote Terminal Units), and field devices.

Stuxnet Attack

What it was: Sophisticated malware discovered in 2010 that targeted Siemens industrial control systems, specifically uranium enrichment centrifuges, demonstrating the first widely-documented cyber weapon designed for physical destruction.

Key details: Exploited three Windows vulnerabilities plus Siemens Step 7 software, infected millions of machines but only activated on specific configurations, used man-in-the-middle techniques to hide physical damage from operators.

IEC 62443 Standard - The OT Security Framework

What is its: International standard framework defining cybersecurity requirements for industrial automation and control systems, organized in four foundational categories with multiple parts.

Key details: Provides security lifecycle approach with levels 0-4 representing different zones from field devices to enterprise networks.

Purdue Model - Network Architecture

What is it: Hierarchical framework describing industrial control system network architecture across five levels, from field devices
(Level 0) to enterprise systems (Level 4), with DMZ connections between levels.

Key concept: Each level represents increasing abstraction from physical processes, with security controls designed to protect lower levels from higher-level threats.

OT Penetration Testing vs. Vulnerability Assessment

Key difference: Penetration testing involves actively attempting to exploit vulnerabilities, whereas vulnerability assessments employ passive techniques to identify and rank security weaknesses without disrupting operations.

Critical consideration:  Active penetration testing should only be conducted in Phase 4 of security maturity, after basic controls are implemented and tested environments are available.