Experience. Leadership. Knowledge.

As trusted security advisors to over three hundred companies, we have built a solid reputation for dependable and reliable work. 

InGuardians experts have contributed to research that has reshaped the way the world perceives and adopts technology, as well as pioneered technical accomplishments that set new benchmarks and made international news.

InGuardians engineers pioneered methods for reading data and testing hardware, IoT devices, and applications. Our Smart Grid experts helped shape the NIST guideline for penetration testing smart grid implementations.

The procedures InGuardians codified are considered the definitive standard for comprehensive testing, as we have trained over 10,000 students in the arts of exploitation and security analysis at such industry events as BlackHat, DefCon, RSA, and at the SANS Institute.

Want custom InGuardians training for your team?

Training is at InGuardians’ core. Our founders have developed industry-leading courses in the areas of penetration testing, ICS and Hardware hacking, RF and Wireless hacking  and incident response.

While we offer some of the classes through SANS and various infosec conferences, all of our classes are available for private training.

Let's talk!

Current Scheduled Classes

Wireless Penetration Testing and Ethical Hacking

 

This course is designed for professionals seeking a comprehensive technical ability to understand, analyze, and defend the various wireless technologies that have become ubiquitous in our environments and, increasingly, key entrance points for attackers.

Instructor: Larry Pesce 

 

ICS/SCADA Security Essentials

This course provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.

Instructor: Justin Searle

Advanced Web App Penetration Testing, Ethical Hacking, and Exploitation Techniques

This course is designed to expand past the methodology and the ‘how’ when we are presented with the challenges of web penetration testing, and dig into the more esoteric ‘why’ these techniques and tools work, so that you can adapt as needed in your assessments.

Instructor: Justin Searle

AIKIDO ON THE COMMAND LINE - LINUX LOCKDOWN AND PROACTIVE SECURITY

 

This course begins with core system lockdown, then moves on to application defense, where we create least-privilege and well-confined configurations that break exploits. Using defense-in-depth, students will not only create jails but also tune the server programs within them to keep exploits from reaching their vulnerable code. For example, students will jail the a web server with SELinux, AppArmor and a Linux container, configure the server for increased resilience, and deactivate modules to remove vulnerable code. Then we’ll use remote code execution exploits and compare before/after, seeing how our defense broke the attack. Once we’ve accomplished all of this best practice work, we’ll get deeper protection from applying the latest security technology to better deflect attacks.

Instructor: Jay Beale 

 

ASSESSING AND EXPLOITING CONTROL SYSTEMS AND IOT

 

This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications. Skills you will learn in this course will apply directly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, synchrophasors, and even IoT. This course is structured around the formal penetration testing methodology created by UtiliSec for the United States Department of Energy.

Instructor: Justin Searle