Join us at the Blue Team Summit! Register Here

Enterprise Security for All with Bob Hewitt and Rich Fifarek

Course Authored by and .

This course will walk the student through real-world examples, demonstrating how to prevent and defend against these threats, utilizing widely adopted frameworks, while focusing on simpler and more affordable solutions.

On-Demand $225 - $575

Course Length: 16 Hours

Includes a Certificate of Completion



Next scheduled date: Content is loading, please wait.

Description

This course will walk the student through real-world examples, demonstrating how to prevent and defend against these threats, utilizing widely adopted frameworks, while focusing on simpler and more affordable solutions.

This 16-hour Information Security training class is targeted for newly appointed or dual-roled (your primary job + security) security professionals within a Small or Medium Business (SMB) or similar sized organization.

SMBs and organizations face unique challenges in Information Security yet are often presented with solutions that may be out of reach due to cost, time, and staffing. We believe Information Security should be accessible and achievable by any organization, regardless of their size.

The course includes a virtual machine image for hands-on exercises that will contain tools that participants may utilize in their environments after the class.

 

System Requirements
  • Software/Hardware Requirements
    • Stable Internet access
    • x86 architecture CPU clocked at 2 GHz or higher that is capable of nested virtualization (Apple Silicon is currently not supported)
    • A computer with at least 8 GB of RAM. 16 GB is recommended
    • VMWare Workstation or VMWare Fusion (VirtualBox and other VM software is not supported)
    • Windows 10/11, MacOSX+, or a currently supported Linux Distribution 
    • Full Administrator/root access to your computer or laptop

FAQ

Key Takeaways
Attack trends and challenges related to SMBs
Navigating security culture
Internal assessments
Compliance and privacy obligations
User, E-mail, and Technical Controls
Hands-on exercises
Who Should Take This Course
Those beginning their Information Security journey within an SMB or similar sized organization.
Audience Skill Level
People new to information security.
What Each Student Should Bring
A computer (see "System Requirements") and a smile!
What Each Student Will Be Provided With
Slide deck and links to all the material and tools needed with instructions
VMs with all labs
Access to two Discord channels for the course

About the Instructors

Pixel splash background
Bob Hewitt
Bob Hewitt
"InfoSec Learner"
Bio

Bob Hewitt has been active in Information Security since 1994. He began his career as a Network Engineer with the United States Air Force and was first introduced into Information Security when he discovered malicious activities against the infrastructure he was managing. His following assignment was as a Systems Administrator before becoming a Lead Information Technology Instructor.

Pixel splash background
Richard Fifarek
Richard Fifarek
"Director of Information Security"
Bio

Richard Fifarek’s passion for computers began in middle school, leading him to a career in technology. Starting in tech support during his undergrad, he developed a customer-focused approach, later progressing to roles in systems and network administration, and eventually specializing in information security at various tech startups, academic institutions, and federal organizations. With a BS in Computer Science, MBA, and numerous SANS courses under his belt, Richard values lifelong learning.

On-Demand

Antisyphon's On-Demand classes give you flexible, self-paced access to the same high-quality training our live events are known for. Whether you're diving into forensics, cloud security, or offensive tooling, each course includes:

  • Full access to video recordings, slides, and downloadable resources
  • Hands-on labs and virtual machines to reinforce real-world skills
  • Cyber Range access for immersive practice (select courses)
  • Dedicated Discord support from instructors and peers
  • Certificates of participation upon completion

Start learning when it works for you!
No deadlines, no pressure. Just real, practical cybersecurity training on your schedule.

Purchase:
Content is loading, please wait.
Shopping Cart

No products in the cart.