Custom Training

Training is at InGuardians’ core. Our founders have developed industry-leading courses in the areas of penetration testing, ICS and Hardware hacking, RF and Wireless hacking and incident response.

While we offer some of the classes through SANS, Black Hat and various infosec conferences, all of our classes are available for private training.

ICS410: ICS/SCADA Security Essentials

This course provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats.

Instructor:  Justin Searle , Director of ICS Security, InGuardians

SEC617: Wireless Penetration Testing and Ethical Hacking

This course is designed for professionals seeking a comprehensive technical ability to understand, analyze, and defend the various wireless technologies that have become ubiquitous in our environments and, increasingly, key entrance points for attackers.  This class also covers other wireless technologies, and is regularly updated and tested.

Instructor:  Larry Pesce Technical Operations Manager & Director of Research

Assessing And Exploiting Control Systems And IIoT

This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications. Skills you will learn in this course will apply directly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, synchrophasors, and even IoT. This course is structured around the formal penetration testing methodology created by UtiliSec for the United States Department of Energy. 

Instructor:  Justin Searle, Director of ICS Security, InGuardians

A Purple Team View – Attacking And Defending Linux, Docker And Kubernetes

Learn how to attack and thoroughly lock down Linux and container-based systems including Kubernetes from Jay Beale, the creator of Bastille Linux, the Center for Internet Security’s first Linux security benchmark, and two Kubernetes tools: the Peirates attack tool and the CTF cluster Bust-a-Kube. In this fully hands-on course, you’ll get a laptop to keep, filled with capture-the-flag (CTF) virtual machines, which you will attack and defend. Every single topic in the class has an attack exercise, where you use Kali Linux to compromise a system, and a matching defense exercise, where you will use new skills to break that attack, confident that it will break other attacks. In this expanded and updated 4-day version of the well-reviewed Aikido on the Command Line class, we focus strongly on attacking Linux containers, Docker and the container orchestration system, Kubernetes!

Instructor: Jay Beale, CTO, InGuardians

Want custom InGuardians training for your team?

Training is at InGuardians’ core. Our founders have developed industry-leading courses in the areas of penetration testing, ICS and Hardware hacking, RF and Wireless hacking  and incident response.

While we offer some of the classes through SANS and various infosec conferences, all of our classes are available for private training.