Services

We can provide the services below, either individually, or as a discounted bundle:

Name Description Monthly Price
Computer Privacy This service provides consulting, selection, and hardening configurations for new and existing computers. This service will also enable and monitor proactive controls as well as disabling intrusive vendor telemetry. $15
Mobile Device Privacy This service provides consulting, selection, and hardening configurations for new and existing mobile devices (e.g. smartphones, tablets). This service will also enable and monitor proactive controls as well as disabling intrusive vendor telemetry. $15
Digital Life Mitigations This service provides consulting and hardening configurations for extreme privacy and security on the internet. This includes passwords, multi-factor authentication, web browsers, email, and file sharing. $15
Home Network Protections This service provides virtual private network (VPN) configurations, home network assessment, hardening, and monitoring capabilities. Home network security and privacy controls are continually evaluated. $25
Online Target Reconnaissance This service provides continual intelligence from publicly available information on sources of interest. $20
$75 Monthly for Bundle Pricing!
Email to get started!

Training

We have the following custom live training classes that provide a rewarding hands-on lab experience for students. Classes can be taught either remote or on-site.

Name Description Student Price
Ethical Hacking This course provides students with the tools and resources needed to develop an understanding of ethical hacking. Students are taken through an interactive environment where they are shown how to scan, test, hack, and secure information systems. $325
Wireless Security This course provides students with the conceptual knowledge and hands-on skills needed to secure wireless technology. Topics include network security design models, managed wireless endpoints, WLAN discovery, intrusion, and attack techniques. It also details 802.11 protocol analysis, wireless intrusion prevention systems (WIPS) implementation, and Layer 2 and Layer 3 VPNs. $450
Penetration Testing This course covers a broad base of topics in advanced penetration testing and information security analysis. Students are exposed to techniques and tools to perform a thorough penetration test along with legal requirements, rules of engagement, how to plan and schedule a test, how to perform vulnerability analysis, external and internal penetration testing, and techniques to produce a professional report from the engagement. $450
Cyber Crime and Terrorism This course begins with a broad introduction to the field of computer crime, discussing the history of computer crime, basic criminal techniques, and the relevant laws. It walks students through forensics, litigation, depositions, expert reports, trials, and how to select an appropriate expert witness. This class also covers specific techniques and tricks that hackers use and how to defend against such attacks. $300
Big Data Analysis The course provides a comprehensive view on computing architectures in data analytics and data mining. Topics include big data characteristics and algorithms, analyzing tools, data mining techniques, massive databases processing, implementation of machine learning algorithms, and analytics environments. Students learn to conceptualize an analytic environment that is suited to the challenges of today's analytics demands. $250
Data Visualization This course introduces a data analytics tool used to prepare and analyze data for effective visualizations. Students learn theory and concepts of data analytics and how to display and share data in a meaningful way. Students also learn the principles of preparing, analyzing, and processing data to create desired data visualizations. $250
Email for Bundle Pricing!

Managed Products

typewriter

We offer the following managed products for individuals and enterprises to use in assessing and responding to risks:

Name Description
Sauron_HSM Protects and manages digital keys and performs secure cryptographic functions.
Acute Prioritizes security remediation efforts using dynamic optimization.
Guild Provides tailored online cybersecurity technical training.
Lumen Manages system risk using a dynamic image heat map.

Poise Uses machine learning to secure endpoints and minimize organizational risk.
Jadis_DLP Prevents sensitive information from leaving an organization.
Email for pricing on these managed products.

Contact

Due to our global presence, and to ensure privacy best practices, please contact directly the team you are working with if at all possible.

For general inquiries or support questions, please contact us:

For escalations or emergencies, please contact us:

Elements

Text

This is bold and this is strong. This is italic and this is emphasized. This is superscript text and this is subscript text. This is underlined and this is code: for (;;) { ... }. Finally, this is a link.


Heading Level 2

Heading Level 3

Heading Level 4

Heading Level 5
Heading Level 6

Blockquote

Fringilla nisl. Donec accumsan interdum nisi, quis tincidunt felis sagittis eget tempus euismod. Vestibulum ante ipsum primis in faucibus vestibulum. Blandit adipiscing eu felis iaculis volutpat ac adipiscing accumsan faucibus. Vestibulum ante ipsum primis in faucibus lorem ipsum dolor sit amet nullam adipiscing eu felis.

Preformatted

i = 0;

while (!deck.isInOrder()) {
    print 'Iteration ' + i;
    deck.shuffle();
    i++;
}

print 'It took ' + i + ' iterations to sort the deck.';

Lists

Unordered

  • Dolor pulvinar etiam.
  • Sagittis adipiscing.
  • Felis enim feugiat.

Alternate

  • Dolor pulvinar etiam.
  • Sagittis adipiscing.
  • Felis enim feugiat.

Ordered

  1. Dolor pulvinar etiam.
  2. Etiam vel felis viverra.
  3. Felis enim feugiat.
  4. Dolor pulvinar etiam.
  5. Etiam vel felis lorem.
  6. Felis enim et feugiat.

Icons

Actions

Table

Default

Name Description Price
Item One Ante turpis integer aliquet porttitor. 29.99
Item Two Vis ac commodo adipiscing arcu aliquet. 19.99
Item Three Morbi faucibus arcu accumsan lorem. 29.99
Item Four Vitae integer tempus condimentum. 19.99
Item Five Ante turpis integer aliquet porttitor. 29.99
100.00

Alternate

Name Description Price
Item One Ante turpis integer aliquet porttitor. 29.99
Item Two Vis ac commodo adipiscing arcu aliquet. 19.99
Item Three Morbi faucibus arcu accumsan lorem. 29.99
Item Four Vitae integer tempus condimentum. 19.99
Item Five Ante turpis integer aliquet porttitor. 29.99
100.00

Buttons

  • Disabled
  • Disabled

Form