TECHNICAL DIRECTOR AND INSTRUCTOR, SYSTEMS & SECURITY

Mike Danseglio

In today's environment, certified security professionals are in high demand. Gain an understanding of the techniques and tools used so you'll be able to identify and stop them by becoming a Certified Ethical Hacker. “I teach by telling stories, and they’re stories I’ve had first-hand experience with,”…“I’ve helped put hackers in jail. I teach so my students can make a difference, too.”

Biography

Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes.

His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures.

Mike has published several books and numerous papers on computer security including Microsoft's own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations.

Mike Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.


Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes.
“I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.”


Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance.


Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.

Twitter @InterfaceTT

How to create #Windows10 Alternate Upgrade Media - MediaCreationToolx64.exe http://t.co/HAI1Jzb3sI

15 hours 52 min ago

RT @ncover: #JavaScript for #Csharp Developers via @interfacett http://t.co/V5JEH1XYoO #js

1 day 12 hours ago

RT @staticvoidmain: Teaching the #O365 Managing Identities and Services @InterfaceTT http://t.co/2m19mJuVSo

2 days 19 hours ago

How to set Optional Parameters in #SQLServer Reporting Services #SSRS http://t.co/GxNFd0fDvB

2 days 21 hours ago

How to use File Server Resource Manager (FSRM) to Move Files Containing Sensitive Data http://t.co/sUDmkKp3ej

5 days 20 hours ago


Blog

How to Configure Driver Installation Settings in Windows 7

Posted July 13, 2015

Windows 7 is configured to make driver installation as smooth as possible. By default it will always try to download appropriate and newer drivers from Windows Update. For most users that’s a great idea. However, you may have custom drivers... Continue reading →

Troubleshooting Slow Logon and Logoff on a Standalone Windows Computer

Posted July 8, 2015

Windows performs a remarkably long list of tasks whenever a user logs on or off a computer. The tasks can be different depending on a number of variables, some of which are: If the computer is domain-joined If the computer... Continue reading →

How to Manually Install a Device Driver in Windows 7

Posted June 24, 2015

Windows 7 is configured to make driver installation as smooth as possible. By default it will always try to download appropriate and newer drivers from Windows Update. For most users and devices that’s a great setup. However, you may need... Continue reading →