We’ve worked and continue to work in many high-risk environments where mistakes could result in injury and loss of life. Our extensive experience in high-risk and complex environments ensures we are prepared to test your environment, regardless of the risk-level or complexity. We’ve been tested under fire.
Our experience in high-risk and complex environments uniquely qualifies us to provide cybersecurity training and services.
DEFENSE-GRADE PENETRATION TESTING
Most of our team has military and DoD (Department of Defense) cyberwarfare and information assurance experience. The DoD and military have been assessing risk, protecting data, securing environments, performing access control, etc. long before other industries. We were involved with military Red Teams on numerous offensive and defensive cyberwarfare missions. We also helped develop many of the Tactics, Techniques, and Procedures (TTPs) used in cyber operations. We developed computer network defense training ranges, simulations, exercises, content, and delivered this training, as instructors, around the globe. Several of our team members are patent-holders on cyberwarfare offense and defense platforms and technologies.
We routinely perform penetration testing, audits, and security consulting for medical device manufacturers. These devices, if exploited, could potentially kill people. We help manufacturers secure their devices and systems to reduce risk to acceptable levels. In this environment, risk has to be assessed from both a loss of life and loss of PHI (Protected Health Information) perspective.
We routinely work to secure commercial aircraft from cyberattacks. We penetration test aircraft and perform risk assessments to ensure an attacker cannot hack into critical aircraft systems during flight or while an airplane is parked at a gate. Commercial aircraft are very complex integrated systems with diverse parts from numerous suppliers.
DoD and Government
We have been on United States government Red Teams and have experience with military cyber operations – offensive and defensive. We have many years experience working in cyberwarfare environments. We understand firsthand the importance of reducing risk of attack to critical infrastructure and reducing risk of sensitive data disclosure.
ABOUT THE TRAINERS
We work to ensure you have the best possible training experience and are well-prepared for the certification exam. All of our trainers are experienced and working cybersecurity practitioners with real-world knowledge.
Our trainers actually practice on a daily-basis what they teach. This allows us to apply real-world experience to course content and tangible answers to questions in class. We use anecdotes, offer advice, and comprehensively answer questions like “how does this apply to the way we do access control at our location where we use 8 character passwords with a mix of upper/lower case, numbers, and special characters?”
If you’re like us, you’ve probably taken courses at “Learning Centers” or “Education Centers” that use full-time instructors. Although there is nothing wrong with this approach, we feel the real-world experience our trainers bring to the table greatly enhances the value of our courses. Application often differs from theory. We are practitioners. We not only help you pass a certification test, but can also help you solve a technical problem you’ve been struggling with at work.