Join us at the Blue Team Summit! Register Here

Security Compliance and Leadership with Chris Brenton

Course Authored by .

This course provides you with the tool and knowledge to help you build an effective security team in as little time as possible.

On-Demand $575.00

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This course provides you with the tool and knowledge to help you build an effective security team in as little time as possible.

In this course, we will cover all of the steps needed to stand up and lead a security team within an organization. We start with a clean slate so that every aspect gets covered. If you are in an environment that already has a security team, this can help fill in the gaps. This course will have a heavy focus on how to integrate the security team with the rest of the business units. We’ll look at strategies for increasing funding, as well as converting “security risks” into “business risks” so they are better understood by the organization’s leadership. The course includes a lot of collateral like a full set of pre-written security policies. The goal is to help you build an effective security team in as little time as possible.

System Requirements
  • Student Requirements
    • Capable of participating in the video session
    • Stable Internet connection with sufficient speeds for video conferencing
    • Software capable of reading standard documents (MS Office, Google Drive, LibreOffice, etc.)

FAQ

Who Should Take This Course
Security managers that are struggling for budget
Security managers that face challenges when communicating with “C” level roles
Individual contributors looking to move to security management
Existing security managers looking to improve their execution
Individuals that are struggling to stand up a full security program
Audience Skill Level
Students should have a basic understanding of multiple security disciplines. You need to be able to bring a holistic view of how different security technologies fit together. For example, you don’t need to be a seasoned pentester, but you should understand the value a pentest can provide and how it fits into a layered security model.
What Each Student Will Be Provided With
A full set of example security policies
A full security awareness training program
Example questionnaire for validating vendor security
Course slides and additional collateral
Much more!
What Each Student Should Bring
An open mind, a positive attitude, and a curiosity to improve their skills.

About the Instructor

Pixel splash background
Chris Brenton
Chris Brenton
"Network threat hunting advocate"
Bio

Chris has been a leader in the IT and security industry for over 25 years. He’s a published author of multiple security books and was the primary author of the Cloud Security Alliance’s original online training courses. As a Fellow Instructor, Chris developed and delivered multiple courses for the SANS Institute and now teaches multiple courses through Antisyphon Training.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.