{"id":42,"date":"2022-07-14T14:28:14","date_gmt":"2022-07-14T14:28:14","guid":{"rendered":"https:\/\/jrobertsonsecurity.com\/?page_id=42"},"modified":"2026-04-07T07:49:54","modified_gmt":"2026-04-07T01:49:54","slug":"services","status":"publish","type":"page","link":"https:\/\/jrobertsonsecurity.com\/?page_id=42","title":{"rendered":"Services"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"42\" class=\"elementor elementor-42\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-156a5be elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"156a5be\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b29b8eb\" data-id=\"b29b8eb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a911462 elementor-widget elementor-widget-html\" data-id=\"a911462\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<!DOCTYPE html>\n<html lang=\"en\">\n<head>\n<meta charset=\"UTF-8\">\n<meta name=\"viewport\" content=\"width=device-width, initial-scale=1.0\">\n<title>Services \u2014 JRobertson Security<\/title>\n<meta name=\"description\" content=\"Cybersecurity courses, consulting, coaching, and policy development \u2014 delivered by a 30-year practitioner. Online courses, one-on-one sessions, and enterprise security programs built for real-world results.\">\n<link rel=\"preconnect\" href=\"https:\/\/fonts.googleapis.com\">\n<link href=\"https:\/\/fonts.googleapis.com\/css2?family=Oswald:wght@300;400;500;700&family=Roboto+Condensed:ital,wght@0,300;0,400;0,700;1,300;1,400&display=swap\" rel=\"stylesheet\">\n<style>\n  :root {\n    --blue:       #00ACFF;\n    --blue-dark:  #005781;\n    --gray-light: #C0C9D1;\n    --gray-mid:   #738998;\n    --off-white:  #F0F0F0;\n    --white:      #ffffff;\n    --text:       #1a2535;\n    --text-muted: #4a5f72;\n    --border:     #D8DFE6;\n  }\n \n  *, *::before, *::after { box-sizing: border-box; margin: 0; padding: 0; }\n  html { scroll-behavior: smooth; }\n  body {\n    background: var(--white);\n    color: var(--text);\n    font-family: 'Roboto Condensed', 'Arial Narrow', Arial, sans-serif;\n    font-weight: 300;\n    line-height: 1.7;\n    font-size: 17px;\n    overflow-x: hidden;\n  }\n  h1, h2, h3, h4 { font-family: 'Oswald', sans-serif; font-weight: 700; line-height: 1.1; }\n  a { text-decoration: none; }\n  img { max-width: 100%; display: block; }\n \n  \/* \u2500\u2500 NAV \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  nav {\n    position: fixed; top: 0; left: 0; right: 0; z-index: 100;\n    display: flex; justify-content: space-between; align-items: center;\n    padding: 0 4rem; height: 68px;\n    background: var(--white);\n    border-bottom: 3px solid var(--blue);\n    box-shadow: 0 2px 12px rgba(0,0,0,0.07);\n  }\n  .nav-logo { font-family: 'Oswald', sans-serif; text-decoration: none; line-height: 1; display: flex; flex-direction: column; }\n  .nav-logo .wordmark { font-size: 1.4rem; font-weight: 700; color: var(--blue); letter-spacing: 0.01em; }\n  .nav-logo .sub { font-size: 0.62rem; font-weight: 500; letter-spacing: 0.22em; text-transform: uppercase; color: var(--blue-dark); margin-top: 1px; }\n  .nav-links { display: flex; gap: 0; list-style: none; height: 68px; align-items: center; }\n  .nav-links li { height: 100%; display: flex; align-items: center; }\n  .nav-links a {\n    color: var(--gray-mid); text-decoration: none;\n    font-family: 'Oswald', sans-serif; font-size: 0.85rem; font-weight: 500;\n    letter-spacing: 0.1em; text-transform: uppercase;\n    padding: 0 1.3rem; height: 100%; display: flex; align-items: center;\n    border-bottom: 3px solid transparent; margin-bottom: -3px;\n    transition: color 0.2s, border-color 0.2s;\n  }\n  .nav-links a:hover,\n  .nav-links a.active { color: var(--blue-dark); border-bottom-color: var(--blue); }\n  .nav-cta {\n    background: var(--blue) !important; color: var(--white) !important;\n    padding: 0.5rem 1.3rem !important; border-radius: 2px !important;\n    height: auto !important; border-bottom: none !important;\n    margin-bottom: 0 !important; margin-left: 0.5rem;\n    transition: background 0.2s !important;\n  }\n  .nav-cta:hover { background: var(--blue-dark) !important; }\n \n  \/* \u2500\u2500 PAGE HERO \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  .page-hero {\n    background: var(--blue-dark);\n    padding: 7rem 4rem 4rem;\n    position: relative; overflow: hidden;\n  }\n  .page-hero::after {\n    content: '';\n    position: absolute; right: 0; top: 0; bottom: 0; width: 40%;\n    background: linear-gradient(135deg, var(--blue-dark) 0%, #003d5c 100%);\n    clip-path: polygon(8% 0, 100% 0, 100% 100%, 0% 100%);\n    pointer-events: none;\n  }\n  .page-hero-inner { position: relative; z-index: 1; }\n  .page-hero-label {\n    font-family: 'Oswald', sans-serif; font-size: 0.78rem; font-weight: 500;\n    letter-spacing: 0.2em; text-transform: uppercase; color: var(--blue);\n    margin-bottom: 1rem; display: flex; align-items: center; gap: 0.75rem;\n  }\n  .page-hero-label::before { content: ''; display: block; width: 28px; height: 2px; background: var(--blue); }\n  .page-hero h1 {\n    font-size: clamp(2.2rem, 4.5vw, 3.8rem); font-weight: 700;\n    color: var(--white); text-transform: uppercase; letter-spacing: 0.02em;\n    margin-bottom: 0.75rem;\n  }\n  .page-hero p { color: rgba(255,255,255,0.65); font-size: 1.05rem; max-width: 560px; line-height: 1.75; }\n \n  \/* \u2500\u2500 SHARED \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  .section { padding: 5rem 4rem; }\n  .section-alt { background: var(--off-white); }\n  .section-dark { background: var(--blue-dark); }\n  .inner { max-width: 1060px; margin: 0 auto; }\n  .divider { width: 100%; height: 1px; background: var(--border); }\n \n  .section-label {\n    font-family: 'Oswald', sans-serif; font-size: 0.72rem; font-weight: 500;\n    letter-spacing: 0.2em; text-transform: uppercase; color: var(--blue);\n    margin-bottom: 0.75rem; display: flex; align-items: center; gap: 0.6rem;\n  }\n  .section-label::before { content: ''; display: block; width: 20px; height: 2px; background: var(--blue); }\n  .section-title {\n    font-size: clamp(1.8rem, 3vw, 2.6rem); font-weight: 700;\n    color: var(--blue-dark); text-transform: uppercase;\n    letter-spacing: 0.02em; margin-bottom: 1rem;\n  }\n  .section-title-light { color: var(--white); }\n  .section-body { font-size: 1.02rem; color: var(--text-muted); line-height: 1.85; max-width: 640px; }\n \n  \/* \u2500\u2500 INTRO TWO-COL \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  .intro-grid {\n    display: grid; grid-template-columns: 1fr 480px;\n    gap: 5rem; align-items: center;\n  }\n  .intro-img {\n    width: 100%; height: 520px;\n    object-fit: cover;\n    object-position: center top;\n  }\n  .intro-img-placeholder {\n    width: 100%; height: 520px;\n    background: linear-gradient(135deg, var(--blue-dark), #003d5c);\n    display: flex; align-items: center; justify-content: center;\n    color: rgba(255,255,255,0.3);\n    font-family: 'Oswald', sans-serif; font-size: 0.8rem;\n    letter-spacing: 0.1em; text-transform: uppercase; text-align: center;\n    padding: 2rem;\n  }\n  .intro-text h2 { margin-bottom: 1.2rem; }\n  .intro-text p + p { margin-top: 1rem; }\n  .intro-creds {\n    list-style: none; margin-top: 2rem;\n    display: flex; flex-direction: column; gap: 0.6rem;\n  }\n  .intro-creds li {\n    display: flex; align-items: flex-start; gap: 0.75rem;\n    font-size: 0.97rem; color: var(--text-muted);\n  }\n  .intro-creds li::before {\n    content: '\u25b8'; color: var(--blue);\n    flex-shrink: 0; margin-top: 0.15rem; font-size: 0.8rem;\n  }\n \n  \/* \u2500\u2500 SERVICES GRID \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  .services-grid {\n    display: grid; grid-template-columns: repeat(2, 1fr);\n    gap: 1.5rem; margin-top: 3rem;\n  }\n  .service-card {\n    background: var(--white);\n    border: 1px solid var(--border);\n    border-top: 4px solid var(--blue-dark);\n    padding: 2.5rem;\n    transition: box-shadow 0.2s, border-top-color 0.2s;\n  }\n  .service-card:hover {\n    box-shadow: 0 6px 24px rgba(0,87,129,0.1);\n    border-top-color: var(--blue);\n  }\n  .service-icon {\n    font-size: 2rem; margin-bottom: 1.2rem; line-height: 1;\n  }\n  .service-card h3 {\n    font-size: 1.15rem; font-weight: 700;\n    color: var(--blue-dark); text-transform: uppercase;\n    letter-spacing: 0.04em; margin-bottom: 0.5rem;\n  }\n  .service-tagline {\n    font-family: 'Oswald', sans-serif; font-size: 0.85rem;\n    font-weight: 500; color: var(--blue); letter-spacing: 0.05em;\n    text-transform: uppercase; margin-bottom: 1.2rem;\n    padding-bottom: 1rem; border-bottom: 1px solid var(--border);\n  }\n  .service-card p {\n    font-size: 0.97rem; color: var(--text-muted);\n    line-height: 1.8; margin-bottom: 1.2rem;\n  }\n  .service-list {\n    list-style: none; display: flex; flex-direction: column; gap: 0.45rem;\n    margin-bottom: 1.5rem;\n  }\n  .service-list li {\n    display: flex; align-items: flex-start; gap: 0.65rem;\n    font-size: 0.93rem; color: var(--text-muted);\n  }\n  .service-list li::before {\n    content: '\u2713'; color: var(--blue); font-weight: 700;\n    flex-shrink: 0; margin-top: 0.1rem; font-size: 0.85rem;\n  }\n  .service-audience {\n    background: var(--off-white);\n    border-left: 3px solid var(--blue-dark);\n    padding: 0.85rem 1rem;\n    font-size: 0.88rem; color: var(--text-muted); line-height: 1.6;\n  }\n  .service-audience strong {\n    font-family: 'Oswald', sans-serif; font-size: 0.72rem;\n    font-weight: 700; color: var(--blue-dark);\n    text-transform: uppercase; letter-spacing: 0.1em;\n    display: block; margin-bottom: 0.2rem;\n  }\n \n  \/* \u2500\u2500 DIFFERENTIATORS \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  .diff-grid {\n    display: grid; grid-template-columns: repeat(4, 1fr);\n    gap: 0; margin-top: 3rem;\n    border: 1px solid var(--border);\n  }\n  .diff-item {\n    padding: 2rem 1.8rem;\n    border-right: 1px solid var(--border);\n    transition: background 0.2s;\n  }\n  .diff-item:last-child { border-right: none; }\n  .diff-item:hover { background: rgba(0,172,255,0.04); }\n  .diff-num {\n    font-family: 'Oswald', sans-serif; font-size: 2.2rem;\n    font-weight: 700; color: var(--blue); line-height: 1;\n    margin-bottom: 0.75rem;\n  }\n  .diff-item h3 {\n    font-size: 0.88rem; font-weight: 700; color: var(--blue-dark);\n    text-transform: uppercase; letter-spacing: 0.08em; margin-bottom: 0.6rem;\n  }\n  .diff-item p { font-size: 0.9rem; color: var(--text-muted); line-height: 1.65; }\n \n  \/* \u2500\u2500 CTA BAND \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  .cta-band {\n    background: var(--blue-dark);\n    padding: 5rem 4rem; text-align: center;\n    border-top: 4px solid var(--blue);\n  }\n  .cta-band h2 {\n    font-size: clamp(1.8rem, 3vw, 2.6rem); font-weight: 700;\n    text-transform: uppercase; letter-spacing: 0.02em;\n    color: var(--white); margin-bottom: 1rem;\n  }\n  .cta-band p {\n    color: rgba(255,255,255,0.65); max-width: 520px;\n    margin: 0 auto 2.5rem; font-size: 1rem; line-height: 1.75;\n  }\n  .btn-group { display: flex; justify-content: center; flex-wrap: wrap; gap: 1rem; }\n  .btn-primary {\n    background: var(--blue); color: var(--white);\n    padding: 0.9rem 2.2rem; border-radius: 2px;\n    font-family: 'Oswald', sans-serif; font-size: 0.9rem;\n    font-weight: 500; letter-spacing: 0.1em; text-transform: uppercase;\n    transition: background 0.2s; display: inline-block;\n  }\n  .btn-primary:hover { background: #0098e0; color: var(--white); }\n  .btn-outline {\n    border: 2px solid rgba(255,255,255,0.35); color: var(--white);\n    padding: 0.9rem 2.2rem; border-radius: 2px;\n    font-family: 'Oswald', sans-serif; font-size: 0.9rem;\n    font-weight: 500; letter-spacing: 0.1em; text-transform: uppercase;\n    transition: border-color 0.2s, color 0.2s; display: inline-block;\n  }\n  .btn-outline:hover { border-color: var(--blue); color: var(--blue); }\n \n  \/* \u2500\u2500 FOOTER \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  footer {\n    background: var(--text); padding: 2rem 4rem;\n    display: flex; justify-content: space-between; align-items: center;\n    flex-wrap: wrap; gap: 1rem;\n  }\n  footer p { font-size: 0.82rem; color: var(--gray-mid); }\n  .footer-links { display: flex; gap: 2rem; }\n  .footer-links a {\n    font-family: 'Oswald', sans-serif; font-size: 0.82rem;\n    font-weight: 400; letter-spacing: 0.08em; text-transform: uppercase;\n    color: var(--gray-mid); text-decoration: none; transition: color 0.2s;\n  }\n  .footer-links a:hover { color: var(--blue); }\n \n  \/* \u2500\u2500 RESPONSIVE \u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500\u2500 *\/\n  @media (max-width: 1024px) {\n    .intro-grid { grid-template-columns: 1fr; gap: 3rem; }\n    .intro-img, .intro-img-placeholder { height: 380px; }\n    .diff-grid { grid-template-columns: repeat(2, 1fr); }\n    .diff-item:nth-child(2) { border-right: none; }\n    .diff-item:nth-child(1),\n    .diff-item:nth-child(2) { border-bottom: 1px solid var(--border); }\n  }\n  @media (max-width: 768px) {\n    nav { padding: 0 1.5rem; }\n    .nav-links { display: none; }\n    .page-hero { padding: 6rem 1.5rem 3rem; }\n    .page-hero::after { display: none; }\n    .section { padding: 3.5rem 1.5rem; }\n    .services-grid { grid-template-columns: 1fr; }\n    .diff-grid { grid-template-columns: 1fr; }\n    .diff-item { border-right: none; border-bottom: 1px solid var(--border); }\n    .diff-item:last-child { border-bottom: none; }\n    .cta-band { padding: 3.5rem 1.5rem; }\n    footer { padding: 2rem 1.5rem; flex-direction: column; align-items: flex-start; }\n  }\n<\/style>\n<\/head>\n<body>\n \n<!-- NAV -->\n<nav>\n  <a href=\"\/\" class=\"nav-logo\">\n    <span class=\"wordmark\">JRobertson<\/span>\n    <span class=\"sub\">Security<\/span>\n  <\/a>\n  <ul class=\"nav-links\">\n    <li><a href=\"\/about\">About<\/a><\/li>\n    <li><a href=\"\/services\" class=\"active\">Services<\/a><\/li>\n    <li><a href=\"\/blog\">Blog<\/a><\/li>\n    <li><a href=\"\/contact\">Contact<\/a><\/li>\n    <li><a href=\"#\" class=\"nav-cta\">Browse Courses<\/a><\/li>\n  <\/ul>\n<\/nav>\n \n<!-- PAGE HERO -->\n<div class=\"page-hero\">\n  <div class=\"page-hero-inner\">\n    <p class=\"page-hero-label\">What I Offer<\/p>\n    <h1>Services<\/h1>\n    <p>Online courses, consulting, coaching, and policy development \u2014 all built around how cybersecurity actually works in the real world.<\/p>\n  <\/div>\n<\/div>\n \n<!-- INTRO WITH IMAGE -->\n<section class=\"section\">\n  <div class=\"inner\">\n    <div class=\"intro-grid\">\n \n      <div class=\"intro-text\">\n        <p class=\"section-label\">The Approach<\/p>\n        <h2 class=\"section-title\">Practitioner-Led.<br>No Filler. No Corp Speak.<\/h2>\n        <p class=\"section-body\">Most cybersecurity training leaves you with frameworks you can't apply and jargon you can't explain. That's not how I teach, consult, or coach.<\/p>\n        <p class=\"section-body\" style=\"margin-top:1rem;\">With over 30 years of hands-on experience leading enterprise security programs, I focus on how cybersecurity actually operates inside real organizations \u2014 the decisions, tradeoffs, and thinking that make the difference between a strong security posture and a paper one.<\/p>\n        <ul class=\"intro-creds\">\n          <li>30+ years in IT and cybersecurity<\/li>\n          <li>Former Director of Information Security and Compliance<\/li>\n          <li>Cybersecurity Instructor \u2014 Saint Louis University & UMSL<\/li>\n          <li>Expert in risk, frameworks, policy, and security program development<\/li>\n        <\/ul>\n      <\/div>\n \n      <!--\n        IMAGE INSTRUCTIONS:\n        1. Go to WordPress Dashboard \u2192 Media Library\n        2. Find the image named \"standing-at-whiteboard\" (or similar)\n        3. Click it \u2192 copy the File URL\n        4. Replace the src below with that URL\n        5. Remove the \"intro-img-placeholder\" div entirely\n      -->\n      <img decoding=\"async\" src=\"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2026\/04\/Standing-at-whiteboard.png\" alt=\"Jeff Robertson at whiteboard\" class=\"intro-img\">\n \n    <\/div>\n  <\/div>\n<\/section>\n \n<div class=\"divider\"><\/div>\n \n<!-- SERVICES -->\n<section class=\"section section-alt\">\n  <div class=\"inner\">\n    <p class=\"section-label\">What I Offer<\/p>\n    <h2 class=\"section-title\">Four Ways to Work Together.<\/h2>\n    <p class=\"section-body\">Whether you need structured learning, strategic guidance, or hands-on policy work \u2014 there's a format that fits where you are and where you're going.<\/p>\n \n    <div class=\"services-grid\">\n \n      <!-- COURSES -->\n      <div class=\"service-card\">\n        <div class=\"service-icon\">\ud83c\udf93<\/div>\n        <h3>Online Cybersecurity Courses<\/h3>\n        <p class=\"service-tagline\">Self-Paced \u00b7 Practitioner-Taught \u00b7 Lifetime Access<\/p>\n        <p>Learn cybersecurity the right way \u2014 with depth, clarity, and real-world application. Every course is structured to build conceptual understanding first, then practical insight, so you can actually apply what you learn.<\/p>\n        <ul class=\"service-list\">\n          <li>Cybersecurity Fundamentals<\/li>\n          <li>Vulnerability Management<\/li>\n          <li>Risk Assessment &amp; Management<\/li>\n          <li>Incident Response<\/li>\n          <li>Identity &amp; Access Management<\/li>\n          <li>Monitoring, Logging &amp; Auditing<\/li>\n          <li>Security Frameworks \u2014 NIST, ISO, SOC<\/li>\n        <\/ul>\n        <div class=\"service-audience\">\n          <strong>Who It's For<\/strong>\n          Individuals new to cybersecurity, IT professionals expanding into security, certification students, and anyone who wants real understanding \u2014 not surface-level overviews.\n        <\/div>\n      <\/div>\n \n      <!-- CONSULTING -->\n      <div class=\"service-card\">\n        <div class=\"service-icon\">\ud83c\udfe2<\/div>\n        <h3>Consulting<\/h3>\n        <p class=\"service-tagline\">Strategic Cybersecurity Guidance for Organizations<\/p>\n        <p>For organizations that need experienced, senior-level cybersecurity thinking without the full-time overhead. I bring a practitioner's perspective \u2014 not a theory-heavy playbook \u2014 to every engagement. I take on a limited number of consulting clients at a time to ensure every organization gets my full attention.<\/p>\n        <ul class=\"service-list\">\n          <li>Information security program development<\/li>\n          <li>Risk management strategy<\/li>\n          <li>Security posture assessment<\/li>\n          <li>Compliance and framework alignment<\/li>\n        <\/ul>\n        <div class=\"service-audience\">\n          <strong>Who It's For<\/strong>\n          Organizations of all sizes looking for experienced, independent cybersecurity expertise without the overhead of a full-time hire.\n        <\/div>\n      <\/div>\n \n      <!-- POLICY & FRAMEWORK -->\n      <div class=\"service-card\">\n        <div class=\"service-icon\">\ud83d\udccb<\/div>\n        <h3>Policy, Procedure &amp; Framework Development<\/h3>\n        <p class=\"service-tagline\">Build the Foundation Your Security Program Needs<\/p>\n        <p>Most organizations know they need policies and frameworks \u2014 few know how to build them well. I guide you through developing documentation that's practical, defensible, and actually used by the people it's meant to govern. You'll leave with a framework your team can own and operate \u2014 not a binder that collects dust.<\/p>\n        <ul class=\"service-list\">\n          <li>Security policy development<\/li>\n          <li>Procedure writing and documentation<\/li>\n          <li>Framework implementation \u2014 NIST, ISO, and others<\/li>\n          <li>Vulnerability management program development<\/li>\n        <\/ul>\n        <div class=\"service-audience\">\n          <strong>Who It's For<\/strong>\n          Small businesses and enterprise teams building or maturing their security programs from the ground up.\n        <\/div>\n      <\/div>\n \n      <!-- COACHING -->\n      <div class=\"service-card\">\n        <div class=\"service-icon\">\ud83d\udcac<\/div>\n        <h3>Individual Coaching &amp; Q&amp;A Sessions<\/h3>\n        <p class=\"service-tagline\">Direct Access to Deep Expertise \u2014 On Your Terms<\/p>\n        <p>Sometimes you don't need a full course \u2014 you need an expert you can talk to. One-on-one sessions give you focused, direct access to 30+ years of cybersecurity knowledge applied to your specific situation, challenge, or question.<\/p>\n        <ul class=\"service-list\">\n          <li>Career guidance for cybersecurity professionals<\/li>\n          <li>Targeted Q&amp;A on specific security topics<\/li>\n          <li>Certification exam prep and concept clarification<\/li>\n          <li>Real-world application of frameworks and principles<\/li>\n        <\/ul>\n        <div class=\"service-audience\">\n          <strong>Who It's For<\/strong>\n          Individuals studying for certifications, professionals solving specific security challenges, or anyone who wants focused expert time on their schedule.\n        <\/div>\n      <\/div>\n \n    <\/div>\n  <\/div>\n<\/section>\n \n<div class=\"divider\"><\/div>\n \n<!-- DIFFERENTIATORS -->\n<section class=\"section\">\n  <div class=\"inner\">\n    <p class=\"section-label\">Why Here<\/p>\n    <h2 class=\"section-title\">What Makes This Different.<\/h2>\n    <div class=\"diff-grid\">\n      <div class=\"diff-item\">\n        <div class=\"diff-num\">01<\/div>\n        <h3>Real-World First<\/h3>\n        <p>Everything is grounded in how cybersecurity actually operates inside organizations \u2014 not how textbooks say it should. Three decades of practitioner experience inform every course and engagement.<\/p>\n      <\/div>\n      <div class=\"diff-item\">\n        <div class=\"diff-num\">02<\/div>\n        <h3>Depth Without Complexity<\/h3>\n        <p>This isn't simplified cybersecurity \u2014 it's accessible cybersecurity. There's a difference. You'll walk away with real understanding that holds up the moment you try to apply it.<\/p>\n      <\/div>\n      <div class=\"diff-item\">\n        <div class=\"diff-num\">03<\/div>\n        <h3>People and Paper<\/h3>\n        <p>Technology alone doesn't make you secure. The policies, procedures, and frameworks that govern how people behave matter just as much as the tools. That's the specialty \u2014 and where most organizations have the biggest gaps.<\/p>\n      <\/div>\n      <div class=\"diff-item\">\n        <div class=\"diff-num\">04<\/div>\n        <h3>Flexible Formats<\/h3>\n        <p>Self-paced online courses, direct consulting engagements, or one-on-one coaching sessions. Multiple ways to work together based on what fits your situation, timeline, and budget.<\/p>\n      <\/div>\n    <\/div>\n  <\/div>\n<\/section>\n \n<!-- CTA BAND -->\n<div class=\"cta-band\">\n  <h2>Ready to Get Started?<\/h2>\n  <p>Browse online courses or reach out to discuss consulting, coaching, or policy development.<\/p>\n  <div class=\"btn-group\">\n    <a href=\"#\" class=\"btn-primary\">Browse Courses &rarr;<\/a>\n    <a href=\"https:\/\/jrobertsonsecurity.com\/contact\/\" class=\"btn-outline\">Get In Touch<\/a>\n  <\/div>\n<\/div>\n \n<!-- FOOTER -->\n<footer>\n  <p>&copy; 2026 JRobertson Security. All Rights Reserved.<\/p>\n  <div class=\"footer-links\">\n    <a href=\"\/about\">About<\/a>\n    <a href=\"\/services\">Services<\/a>\n    <a href=\"\/blog\">Blog<\/a>\n    <a href=\"https:\/\/jrobertsonsecurity.com\/contact\/\">Contact<\/a>\n    <a href=\"\/privacy-policy\">Privacy Policy<\/a>\n  <\/div>\n<\/footer>\n \n<\/body>\n<\/html>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Services \u2014 JRobertson Security JRobertson Security About Services Blog Contact Browse Courses What I Offer Services Online courses, consulting, coaching, and policy development \u2014 all built around how cybersecurity actually\u2026<\/p>\n","protected":false},"author":1,"featured_media":282,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"nf_dc_page":"","footnotes":""},"class_list":["post-42","page","type-page","status-publish","has-post-thumbnail","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Services - JRobertson Security<\/title>\n<meta name=\"description\" content=\"Cybersecurity courses, consulting, coaching, and policy development \u2014 delivered by a 30-year practitioner. Online courses, one-on-one sessions, and enterprise security programs built for real-world results.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jrobertsonsecurity.com\/?page_id=42\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Services - JRobertson Security\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity courses, consulting, coaching, and policy development \u2014 delivered by a 30-year practitioner. Online courses, one-on-one sessions, and enterprise security programs built for real-world results.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jrobertsonsecurity.com\/?page_id=42\" \/>\n<meta property=\"og:site_name\" content=\"JRobertson Security\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-07T01:49:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2026\/04\/Standing-at-whiteboard.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42\",\"name\":\"Services - JRobertson Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Standing-at-whiteboard.png\",\"datePublished\":\"2022-07-14T14:28:14+00:00\",\"dateModified\":\"2026-04-07T01:49:54+00:00\",\"description\":\"Cybersecurity courses, consulting, coaching, and policy development \u2014 delivered by a 30-year practitioner. Online courses, one-on-one sessions, and enterprise security programs built for real-world results.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42#primaryimage\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Standing-at-whiteboard.png\",\"contentUrl\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Standing-at-whiteboard.png\",\"width\":768,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?page_id=42#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#website\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/\",\"name\":\"JRobertson Security\",\"description\":\"Expert Instruction on Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#organization\",\"name\":\"JRobertson Security\",\"url\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/jrobertsonsecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/10\\\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1\",\"width\":1128,\"height\":191,\"caption\":\"JRobertson Security\"},\"image\":{\"@id\":\"https:\\\/\\\/jrobertsonsecurity.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Services - JRobertson Security","description":"Cybersecurity courses, consulting, coaching, and policy development \u2014 delivered by a 30-year practitioner. Online courses, one-on-one sessions, and enterprise security programs built for real-world results.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jrobertsonsecurity.com\/?page_id=42","og_locale":"en_US","og_type":"article","og_title":"Services - JRobertson Security","og_description":"Cybersecurity courses, consulting, coaching, and policy development \u2014 delivered by a 30-year practitioner. Online courses, one-on-one sessions, and enterprise security programs built for real-world results.","og_url":"https:\/\/jrobertsonsecurity.com\/?page_id=42","og_site_name":"JRobertson Security","article_modified_time":"2026-04-07T01:49:54+00:00","og_image":[{"width":768,"height":1024,"url":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2026\/04\/Standing-at-whiteboard.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/jrobertsonsecurity.com\/?page_id=42","url":"https:\/\/jrobertsonsecurity.com\/?page_id=42","name":"Services - JRobertson Security","isPartOf":{"@id":"https:\/\/jrobertsonsecurity.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jrobertsonsecurity.com\/?page_id=42#primaryimage"},"image":{"@id":"https:\/\/jrobertsonsecurity.com\/?page_id=42#primaryimage"},"thumbnailUrl":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2026\/04\/Standing-at-whiteboard.png","datePublished":"2022-07-14T14:28:14+00:00","dateModified":"2026-04-07T01:49:54+00:00","description":"Cybersecurity courses, consulting, coaching, and policy development \u2014 delivered by a 30-year practitioner. Online courses, one-on-one sessions, and enterprise security programs built for real-world results.","breadcrumb":{"@id":"https:\/\/jrobertsonsecurity.com\/?page_id=42#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jrobertsonsecurity.com\/?page_id=42"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jrobertsonsecurity.com\/?page_id=42#primaryimage","url":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2026\/04\/Standing-at-whiteboard.png","contentUrl":"https:\/\/jrobertsonsecurity.com\/wp-content\/uploads\/2026\/04\/Standing-at-whiteboard.png","width":768,"height":1024},{"@type":"BreadcrumbList","@id":"https:\/\/jrobertsonsecurity.com\/?page_id=42#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jrobertsonsecurity.com\/"},{"@type":"ListItem","position":2,"name":"Services"}]},{"@type":"WebSite","@id":"https:\/\/jrobertsonsecurity.com\/#website","url":"https:\/\/jrobertsonsecurity.com\/","name":"JRobertson Security","description":"Expert Instruction on Cybersecurity","publisher":{"@id":"https:\/\/jrobertsonsecurity.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jrobertsonsecurity.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jrobertsonsecurity.com\/#organization","name":"JRobertson Security","url":"https:\/\/jrobertsonsecurity.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jrobertsonsecurity.com\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/10\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1","contentUrl":"https:\/\/i0.wp.com\/jrobertsonsecurity.com\/wp-content\/uploads\/2022\/10\/jrs_logo_fc-copy.png?fit=1128%2C191&ssl=1","width":1128,"height":191,"caption":"JRobertson Security"},"image":{"@id":"https:\/\/jrobertsonsecurity.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/42","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=42"}],"version-history":[{"count":5,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/42\/revisions"}],"predecessor-version":[{"id":350,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/pages\/42\/revisions\/350"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=\/wp\/v2\/media\/282"}],"wp:attachment":[{"href":"https:\/\/jrobertsonsecurity.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=42"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}