EC-Council • ICS-SCADA
Validates the ability to secure industrial control systems and SCADA networks, covering ICS/SCADA network defense, vulnerability assessment, risk analysis for IT and OT environments, intrusion detection, ICS-specific standards and regulations, and incident response for critical infrastructure.
Questions
627
Duration
120 minutes
Passing Score
70%
Difficulty
SpecialtyLast Updated
Feb 2026
The EC-Council ICS/SCADA Cybersecurity certification validates a professional's ability to defend Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) networks against cyber threats. The certification covers the full spectrum of OT/IT security—from foundational TCP/IP networking and ICS-specific protocols to advanced topics such as vulnerability management, intrusion detection, digital forensics, and incident response tailored to critical infrastructure environments. Candidates learn to analyze risk across both IT corporate networks and operational technology (OT) environments, with particular focus on the unique architectural and protocol challenges that distinguish ICS/SCADA systems from traditional enterprise IT.
The certification addresses the growing threat landscape targeting critical infrastructure, including documented malware such as Stuxnet and Triton/TRISIS that can cause physical disruption to industrial processes. It bridges the security gap between IT and OT environments by providing defenders with attacker-perspective methodologies—scanning, footprinting, enumeration, and exploitation techniques—so that practitioners can better anticipate and counter adversary tactics against pipelines, energy grids, water treatment facilities, and manufacturing systems.
This certification is designed for IT and OT professionals who administer, patch, or secure ICS and SCADA systems, including System Administrators and System Engineers working in industrial environments such as oil and gas, energy, utilities, and manufacturing. Security Consultants who conduct security assessments of ICS/SCADA installations are also a primary audience, as are Business Systems Analysts who support interfaces between corporate business systems and SCADA networks.
The credential is appropriate for mid-career professionals with a networking and security background who are transitioning into or expanding responsibilities within operational technology environments. It suits those who need a foundational-to-intermediate understanding of ICS/SCADA-specific threats, standards, and defensive strategies, and who are responsible for establishing or maintaining information security policies for critical infrastructure.
There are no mandatory formal prerequisites published by EC-Council for this exam, but candidates are strongly recommended to have Linux operating system fundamentals including basic command-line usage before attempting the course or exam. A solid grasp of essential networking concepts is expected—specifically the OSI model, TCP/IP protocol architecture, networking devices, and transmission media. Familiarity with network traffic inspection tools such as Wireshark, TShark, or TCPdump is also recommended, as is conceptual knowledge of programming or scripting.
Candidates should additionally possess a working understanding of basic cybersecurity concepts including malware categories, intrusion detection systems, firewalls, and common vulnerabilities. Prior exposure to IT security operations or a general security certification (such as CompTIA Security+) would be beneficial, though not required. Minors seeking to sit the exam must provide written parental consent along with institutional documentation per EC-Council policy.
The ICS-SCADA exam consists of 75 multiple-choice questions and must be completed within a 2-hour (120-minute) time limit. The passing score is 70%. The exam is delivered through EC-Council's ECC Exam Center, which provides proctored testing in a controlled environment. Question types are multiple-choice with a single correct answer, testing both conceptual knowledge and applied understanding of ICS/SCADA security principles.
EC-Council publishes an official Exam Blueprint document (available at cert.eccouncil.org) that outlines the topic domains and their respective weightings, which candidates are advised to use as a primary study guide. There are no publicly disclosed unscored or beta questions built into the exam format at this time.
Professionals holding the EC-Council ICS/SCADA Cybersecurity certification are positioned for roles such as ICS/SCADA Security Analyst, OT Security Engineer, Critical Infrastructure Security Consultant, and Industrial Cybersecurity Specialist. These roles exist across high-demand sectors including energy and utilities, oil and gas, water and wastewater, manufacturing, and transportation—all of which face increasing regulatory pressure and threat actor attention. The ICS/SCADA security skills market remains undersupplied relative to demand, with practitioners who can bridge IT and OT security commanding premium compensation, typically in the range of $90,000–$140,000+ USD annually depending on sector and geography.
The EC-Council ICS-SCADA credential serves as a solid entry point into OT cybersecurity and complements other certifications such as GICSP (Global Industrial Cyber Security Professional by GIAC) or ISA/IEC 62443 Cybersecurity certificates. While GICSP is more widely recognized at the senior level, the EC-Council certification offers a more accessible path for professionals transitioning from general IT security into the industrial domain, and is particularly useful for those already embedded in EC-Council's certification ecosystem (CEH, CPENT, CHFI).
5 sample questions with correct answers and explanations. Start a practice session to test yourself across all 627 questions.
1. A security analyst reviewing IEC 62443-3-3 system requirements needs to explain the seven foundational requirements to operations staff. The organization's primary concern is preventing unauthorized users from accessing HMI systems and engineering workstations. Which foundational requirement directly addresses this concern? (Select one!)
Explanation
FR1 Identification and Authentication Control directly addresses preventing unauthorized access by requiring user identification and authentication before granting system access. This foundational requirement ensures only authenticated users can access HMI systems and engineering workstations. FR3 System Integrity focuses on protecting systems from unauthorized modification. FR5 Restricted Data Flow controls network segmentation and communication paths. FR6 Timely Response to Events addresses security event detection and response capabilities.
2. A manufacturing facility security analyst examines Wireshark captures and needs to identify potentially malicious Modbus TCP traffic. Which Wireshark display filter identifies dangerous Modbus write operations that could modify PLC configurations or control outputs? (Select one!)
Explanation
Modbus function codes 5 through 16 represent write operations that modify PLC state. FC05 (Write Single Coil), FC06 (Write Single Register), FC15 (Write Multiple Coils), and FC16 (Write Multiple Registers) are potentially dangerous commands that alter outputs or configuration. Monitoring for these function codes helps identify unauthorized control attempts. Function codes 1 and 2 are read operations (Read Coils and Read Discrete Inputs) which are passive and do not modify PLC state. Filtering on TCP port 502 with unit ID 0 captures Modbus traffic but does not specifically identify write operations. Function codes 3 and 4 are read operations (Read Holding Registers and Read Input Registers) which are informational only.
3. A SCADA engineer implements IPsec VPN connectivity between a control center and remote RTUs at pump stations. The security policy requires encryption of all SCADA data in transit while preserving the ability to route traffic through NAT devices at remote sites. The original IP headers must remain visible for network troubleshooting. Which IPsec configuration should be implemented? (Select one!)
Explanation
Transport mode with ESP is correct because it encrypts the payload while leaving the original IP header visible for routing and troubleshooting, and ESP is compatible with NAT unlike AH. Transport mode protects only the payload, preserving original IP headers for visibility. ESP provides both encryption and authentication, meeting the encryption requirement. Transport mode with AH provides authentication without encryption, failing the encryption requirement, and AH is incompatible with NAT because it includes IP headers in authentication calculations. Tunnel mode encapsulates the entire original packet including IP headers in a new packet, hiding original headers and preventing troubleshooting visibility. Tunnel mode is typically used for gateway-to-gateway VPNs rather than host-to-host connections.
4. A power utility implements zone-based security architecture following IEC 62443 standards. Zone A contains SCADA servers requiring SL-T 2 for all foundational requirements. Zone B contains corporate IT systems. A conduit must connect these zones for data historian access. The security team must determine the conduit security level. Which security level should be applied to the conduit? (Select one!)
Explanation
IEC 62443 requires conduits to meet the minimum SL-T (Security Level Target) of the connected zones. Since Zone A requires SL-T 2, the conduit must achieve SL-T 2 to prevent the conduit from being the weakest link. SL-C (Security Level Capability) refers to component inherent capability, not the applied conduit level. SL-A (Security Level Achieved) is measured after implementation, not specified during design. Using the lower zone level would create a security gap allowing easier compromise of the higher-security zone. Conduits define security requirements for the communication channel between zones and cannot have sub-conduits.
5. A transportation authority implements HART (Highway Addressable Remote Transducer) protocol for smart field instrumentation in control systems. The network engineer must understand HART's physical layer characteristics. Which statement accurately describes HART communication? (Select one!)
Explanation
HART protocol superimposes digital communication on existing 4-20mA analog current loops using Frequency Shift Keying (FSK) at 1200 bits per second. Logic 1 is represented by 1200 Hz and logic 0 by 2200 Hz. The digital signal averages to zero, not interfering with the 4-20mA analog measurement. This allows simultaneous analog control signal and digital configuration/diagnostic data. HART does not use dedicated Ethernet cables. HART does not replace analog signaling but coexists with it. HART does not use RS-485 or Modbus RTU protocols.
One-time access to this exam