TECHNICAL DIRECTOR AND INSTRUCTOR, SYSTEMS & SECURITY

Mike Danseglio

In today's environment, certified security professionals are in high demand. Gain an understanding of the techniques and tools used so you'll be able to identify and stop them by becoming a Certified Ethical Hacker. “I teach by telling stories, and they’re stories I’ve had first-hand experience with,”…“I’ve helped put hackers in jail. I teach so my students can make a difference, too.”

Biography

Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes.

His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures.

Mike has published several books and numerous papers on computer security including Microsoft's own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations.

Mike Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.


Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes.
“I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.”


Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance.


Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.

Twitter @InterfaceTT

How to redistribute routes using #Cisco route maps and IP prefix lists - http://t.co/6mrkOIpSEW

5 hours 45 min ago

Access Management Control in IT is not just about the tools! http://t.co/aMfgoQLh2S #AccessManagement

9 hours 45 min ago

Video Trng - Make and Receive Audio and Video Calls in Microsoft #Lync Server 2010 - http://t.co/0LUNPpCZ8C

17 hours 46 min ago

#PowerShell ? How to use Do While Until Constructs to Repeat Commands http://t.co/H9XNz5Zb0J

22 hours 46 min ago

Learn how to Create a Picture Password in #Windows 8 http://t.co/8QHApJOhpJ #WIN8

1 day 5 hours ago


Blog

Windows Troubleshooting Tip – Verifying TCP Connections

Posted December 30, 2013

I’ve published a number of articles on following a simple and straightforward troubleshooting methodology. I advocate a simple and focused approach shown in Figure 1. You can see that symptom identification is the first step, followed by root cause analysis … Continue Reading

Windows Troubleshooting Tip – Advanced DNS Query Debugging With NSLookup

Posted December 23, 2013

I’ve published a number of articles on following a simple and straightforward troubleshooting methodology. I advocate a simple and focused approach shown in Figure 1. You can see that symptom identification is the first step, followed by root cause analysis … Continue Reading

Finding Windows Problems With Reliability Monitor

Posted December 18, 2013

Reliability Monitor is a great built-in tool hidden deep with Windows 7, Windows 8, and even the newest Windows 8.1. It can show you amazing statistics about operating system failures, application crashes, and more. If you’re like most folks, you’ve … Continue Reading