{"id":1012,"date":"2018-04-25T19:43:55","date_gmt":"2018-04-25T19:43:55","guid":{"rendered":"https:\/\/zed.inguardians.com\/?page_id=1012"},"modified":"2023-08-17T17:37:59","modified_gmt":"2023-08-18T00:37:59","slug":"training","status":"publish","type":"page","link":"https:\/\/zed.inguardians.com\/training\/","title":{"rendered":"Training"},"content":{"rendered":"
[et_pb_section fb_built=”1″ _builder_version=”4.16″ background_image=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2017\/03\/bg.gif” background_size=”initial” background_position=”bottom_right” background_repeat=”repeat-x” filter_contrast=”106%” z_index_tablet=”500″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_image src=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/08\/APT.png” align=”center” _builder_version=”4.16″ width=”40%” module_alignment=”left” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ global_colors_info=”{}”][et_pb_text _builder_version=”4.16″ text_font=”|700|||||||” text_text_color=”#ffffff” text_font_size=”20px” header_font=”||||||||” header_text_color=”#ffffff” header_font_size=”74px” header_font_size_tablet=”” header_font_size_phone=”41px” header_font_size_last_edited=”on|desktop” global_colors_info=”{}”]<\/p>\n
[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ _builder_version=”4.16″ background_color=”#6685a5″ background_enable_image=”off” global_colors_info=”{}”][et_pb_row _builder_version=”4.16″ global_colors_info=”{}”][et_pb_column type=”4_4″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.16″ text_text_color=”#ffffff” text_font_size=”18px” header_font=”InG Med||||||||” header_text_color=”#ffffff” header_font_size=”33px” vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ z_index_tablet=”0″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”]Training is at InGuardians\u2019 core. Our founders\u00a0have developed industry-leading courses in the areas of penetration testing, ICS and Hardware hacking, RF and Wireless hacking and incident response.<\/p>\n
While we offer some of the classes through SANS, Black Hat and various infosec conferences, all of our classes are available for private training.
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Classes Section” _builder_version=”4.16″ background_color=”#fafbfc” custom_padding=”110px|0px|110px|0px” global_colors_info=”{}”][et_pb_row column_structure=”1_3,2_3″ admin_label=”Class” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/03\/Untitled-design-23.png” align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” _builder_version=”4.16″ vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ z_index_tablet=”0″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.20.4″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_3_font=”Poppins|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ z_index_tablet=”0″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” locked=”off” global_colors_info=”{}”]<\/p>\n
Upcoming Courses\u00a0<\/a><\/p>\n This course provides a foundational set of standardized skills and knowledge for industrial cybersecurity professionals. The course is designed to ensure that the workforce involved in supporting and defending industrial control systems is trained to keep the operational environment safe, secure, and resilient against current and emerging cyber threats. Black Hat Europe – December 4-7<\/strong><\/a><\/p>\n Black Hat USA 2024 TBA<\/strong><\/p>\n This is not your traditional SCADA\/ICS\/IoT security course! How many courses send you home with your own PLC and a set of hardware\/RF hacking tools?!? This course teaches hands-on penetration testing techniques used to test individual components of a control system, including embedded electronic field devices, network protocols, RF communications, Human Machine Interfaces (HMIs), and various forms of master servers and their ICS applications. Skills you will learn in this course will apply directly to systems such as the Smart Grid, PLCs, RTUs, smart meters, building management, manufacturing, Home Area Networks (HAN), smart appliances, SCADA, substation automation, and synchrophasors. This course is structured around the formal penetration testing methodology created by UtiliSec for the United States Department of Energy.<\/p>\n [\/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Poppins|500|||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”||||||||” link_text_color=”#1bb3eb” header_font=”||||||||” header_3_font=”Poppins|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” locked=”off” global_colors_info=”{}”]Instructor:\u00a0<\/span>\u00a0<\/span>Justin Searle\u00a0<\/a>, Director of ICS Security, InGuardians
\n[\/et_pb_text][et_pb_text _builder_version=”4.16″ text_font=”Poppins|500|||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”||||||||” link_text_color=”#1bb3eb” header_font=”||||||||” header_3_font=”Poppins|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” locked=”off” global_colors_info=”{}”]Instructor:\u00a0<\/span>\u00a0<\/span>Justin Searle\u00a0<\/a>, Director of ICS Security, InGuardians
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,2_3″ admin_label=”Class” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2019\/03\/Untitled-design-23.png” align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” _builder_version=”4.16″ vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ z_index_tablet=”0″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.22.0″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_3_font=”Poppins|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ hover_enabled=”0″ z_index_tablet=”0″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” locked=”off” global_colors_info=”{}” sticky_enabled=”0″]<\/p>\nAssessing and Exploiting Control Systems<\/a><\/h3>\n
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=”1_3,2_3″ admin_label=”Class” _builder_version=”4.16″ background_color=”#ffffff” custom_margin=”||60px|” custom_padding=”|40px||40px” animation_style=”fade” border_radii=”on|6px|6px|6px|6px” box_shadow_style=”preset1″ box_shadow_vertical=”10px” box_shadow_blur=”24px” box_shadow_spread=”6px” box_shadow_color=”rgba(0,0,0,0.06)” global_colors_info=”{}”][et_pb_column type=”1_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/zed.inguardians.com\/wp-content\/uploads\/2021\/03\/Untitled-design-47.png” alt=”Jay Beale, InGuardians” title_text=”Jay Beale” align=”center” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” _builder_version=”4.16″ vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ z_index_tablet=”0″ box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” global_colors_info=”{}”][\/et_pb_image][\/et_pb_column][et_pb_column type=”2_3″ _builder_version=”4.16″ custom_padding=”|||” global_colors_info=”{}” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.22.0″ text_font=”Open Sans||||||||” text_text_color=”#486066″ text_font_size=”15px” text_line_height=”1.8em” link_font=”Arial||||||||” link_text_color=”#0c71c3″ header_3_font=”Poppins|600|||||||” header_3_text_color=”#486066″ header_3_font_size=”18px” header_3_line_height=”1.4em” vertical_offset_tablet=”0″ horizontal_offset_tablet=”0″ hover_enabled=”0″ z_index_tablet=”0″ text_text_shadow_horizontal_length_tablet=”0px” text_text_shadow_vertical_length_tablet=”0px” text_text_shadow_blur_strength_tablet=”1px” link_text_shadow_horizontal_length_tablet=”0px” link_text_shadow_vertical_length_tablet=”0px” link_text_shadow_blur_strength_tablet=”1px” ul_text_shadow_horizontal_length_tablet=”0px” ul_text_shadow_vertical_length_tablet=”0px” ul_text_shadow_blur_strength_tablet=”1px” ol_text_shadow_horizontal_length_tablet=”0px” ol_text_shadow_vertical_length_tablet=”0px” ol_text_shadow_blur_strength_tablet=”1px” quote_text_shadow_horizontal_length_tablet=”0px” quote_text_shadow_vertical_length_tablet=”0px” quote_text_shadow_blur_strength_tablet=”1px” header_text_shadow_horizontal_length_tablet=”0px” header_text_shadow_vertical_length_tablet=”0px” header_text_shadow_blur_strength_tablet=”1px” header_2_text_shadow_horizontal_length_tablet=”0px” header_2_text_shadow_vertical_length_tablet=”0px” header_2_text_shadow_blur_strength_tablet=”1px” header_3_text_shadow_horizontal_length_tablet=”0px” header_3_text_shadow_vertical_length_tablet=”0px” header_3_text_shadow_blur_strength_tablet=”1px” header_4_text_shadow_horizontal_length_tablet=”0px” header_4_text_shadow_vertical_length_tablet=”0px” header_4_text_shadow_blur_strength_tablet=”1px” header_5_text_shadow_horizontal_length_tablet=”0px” header_5_text_shadow_vertical_length_tablet=”0px” header_5_text_shadow_blur_strength_tablet=”1px” header_6_text_shadow_horizontal_length_tablet=”0px” header_6_text_shadow_vertical_length_tablet=”0px” header_6_text_shadow_blur_strength_tablet=”1px” box_shadow_horizontal_tablet=”0px” box_shadow_vertical_tablet=”0px” box_shadow_blur_tablet=”40px” box_shadow_spread_tablet=”0px” locked=”off” global_colors_info=”{}” sticky_enabled=”0″]<\/p>\nAbusing and Protecting Kubernetes, Linux, and Containers<\/a><\/h3>\n