InfoSec, Cyber, and Physical Security: Our Subject Matter Experts have a wide range of skills ranging from Cyber/Physical penetration testing to complete digital forensics to the entire Certification and Accreditation (C&A) process. With backgrounds in both commercial and government sectors, we have the right experience to help minimize your residual risks and can even help after an event has occurred
We have developed CSI Linux (csilinux.com) as a Cyber Investigations tool that covers all aspects of cyber investigations starting with OSINT to the data analysis. We believe that having the right tools to do the job is critical for forensic investigators. That’s why we have created a multi-purpose, all inclusive, investigation environment starting with online investigations (OSINT, social media, domain recon, and dark web) to offline Digital Forensics Incident Response to Malware Analysis and more. This is an ideal environment for both training and real world investigations.
As an EC-Council Accredited Training Center (ATC) partner and a Pearson Vue testing center, we can offer security related training and certification testing for boot-camps such as CISSP, ISSAP, ISSMP, CISM, CEH, CHFI, LPT, Security+, Linux+, and more... We also offer more specialized courses like Advanced Hacking, Incident Response, Forensic Data Recovery, Reverse Engineering, and SCADA/ICS/IIoT Security.
Due to the recent COVID-19 pandemic, we do have some courses for online students at the IWC Academy: academy.informationwarfarecenter.com . For active duty and retired military, contact us for a special promotion. We have Ethical Hacking/Red Teaming, Cyber Defence, and Secure Coding coruses ready to take today. The certification tracks include: Security+, CySA+, Pentest+, CEH, CAP, and ISSEP
Cyber Secrets is a set of video series that cover Computer Forensics, Hacking, Coding, and other security related topics. The series includes the classic Cyber Secrets, Just the Tip, and Quick Tip along with web casts covering specialized topics that security professionals need.
IWC also releases several written publications including the Cyber Intelligence Report
Keep up to date with our publications covering threat intelligence, walkthroughs and more - Here!
Focusing on all aspects of Digital Warfare, we offer both services and training ranging from the attack to the investigation. This gives us a special perspective into the spectrum of the Risk Management Process. We have helped develop both Computer Forensics and Red Teams around the world.
At Information Warfare Center, our mission is to provide premier security solutions that empower our clients with the latest cyber security knowledge and capability. We specialize in advanced information security and have extensive expertise in all levels of Information Assurance. Our SMEs and Consultants have expertise in commercial, health care, financial, SCADA/ICS, governmental and military applications and environments. We also offer support with Certification and Accreditation in the DoD, DOE, and other federal agencies using DIACAP, NIST, NIACAP and other Certification and Accreditation processes along with certification training to support DoD8570.1m.Frequently Asked Questions
Regional offering: Colorado based information security certification boot-camps in Colorado Springs, Denver,and Fort Collins area. Ask about the Colorado Discount!
International offering: We have taught courses on six continents. Our instruction is in English, but we do work with translators when needed.
Online Self-Paced offering: We now have an online option for you to either supliment an instructor lead course or use as a self-paced option. The IWC Academy!
Contact us for course availabilityContact Us
Do you want to learn how to conduct vulnerability assessments or penetration tests but don’t know where to start? Are you getting into computer forensics and want some more hands on practice with more tools and environments? Well, we have something that might just save you some time and money.
Information Warfare Center not only offers ethical hacking, penetration testing, and digital forensics training, we now have a standalone lab environment prebuilt for both training and operational use. This mobile lab has been designed to boot off of a USB drive and works with almost any PC. This e-book walks you though how to build one yourself. It is a step by step guide to building your own Portable, encrypted, Kali based lab.