InGuardians is an independent information security consulting company providing high-value services. Our specialties include Red Team Penetration Testing, Hardware, Application Security Assessments, Threat Hunting, Security Architecture Reviews, ICS and IIoT Security,  Kubernetes and Public Cloud Security, Incident Response, Custom Training and more.


Established in 2003 by industry veterans, InGuardians brings technical experience and business acumen to your projects.  Our information security professionals have authored tools, books, testing frameworks, and training programs.  InGuardians consultants teach and mentor the community through SANS, BlackHat, RSA Conference, and private courses.

Our Team

InGuardians strives to assemble the best and the brightest minds in information security.  Our aim is to channel the collective talents of our team in providing actionable, business-focused information security consulting.  Through community mentoring, teaching and writing opportunities, InGuardians is developing the next generation of Infosec professionals.

Assessing And Exploiting Control System And IIoT

Aug 1 – Aug 4

This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications. Skills you will learn in this course will apply directly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, synchrophasors, and even IoT. This course is structured around the formal penetration testing methodology created by UtiliSec for the United States Department of Energy. 

Instructor:  Justin Searle, Director of ICS Security, InGuardians

A Purple Team View – Attacking And Defending Linux, Docker, And Kubernetes

Aug 1 – Aug 4

Learn how to attack and thoroughly lock down Linux and container-based systems including Kubernetes from Jay Beale, the creator of Bastille Linux, the Center for Internet Security’s first Linux security benchmark, and two Kubernetes tools: the Peirates attack tool and the CTF cluster Bust-a-Kube. In this fully hands-on course, you’ll get a laptop to keep, filled with capture-the-flag (CTF) virtual machines, which you will attack and defend. Every single topic in the class has an attack exercise, where you use Kali Linux to compromise a system, and a matching defense exercise, where you will use new skills to break that attack, confident that it will break other attacks. In this expanded and updated 4-day version of the well-reviewed Aikido on the Command Line class, we focus strongly on attacking Linux containers, Docker and the container orchestration system, Kubernetes!

Instructor: Jay Beale, CTO, InGuardians

“So, people hire you to break into their places to make sure no one can break into their places?” – Sneakers 1992