TECHNICAL DIRECTOR AND INSTRUCTOR, SYSTEMS & SECURITY

Mike Danseglio

In today's environment, certified security professionals are in high demand. Gain an understanding of the techniques and tools used so you'll be able to identify and stop them by becoming a Certified Ethical Hacker. “I teach by telling stories, and they’re stories I’ve had first-hand experience with,”…“I’ve helped put hackers in jail. I teach so my students can make a difference, too.”

Biography

Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes.

His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures.

Mike has published several books and numerous papers on computer security including Microsoft's own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations.

Mike Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.


Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes.
“I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.”


Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance.


Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.

Twitter @InterfaceTT

Sometimes the Universe sends you a message. We don’t listen... aka Before you Rebuild your Computer read this blog - http://t.co/DRzrtoKgjU

1 day 8 hours ago

What do you do when Word 2010 is not saving back to #SharePoint 2010 by default - http://t.co/alAcAIP6Vg

1 day 12 hours ago

How to use BCDEDIT to add menu items to the selection screen in #WindowsServer and #Win7 - http://t.co/rxvn7zT1LJ

1 day 17 hours ago

Did you know that you can subscribe to the @InterfaceTT Blogs via RSS feed? Check it out at: - http://t.co/TPGfEx9TDX

2 days 8 hours ago

How to enable Ratings for SharePoint 2010 Lists and Libraries - http://t.co/q6jFZu0MJx

2 days 12 hours ago


Blog

How to make the System Center Configuration Manager Client install faster

Posted May 11, 2015

When working with System Center Configuration Manager 2007, 2012, or 2012 R2, one of your primary tasks is to ensure that the Configuration Manager Client Agent is successfully installed and running properly. The agent must be running to make client... Continue reading →

The post How to make the System Center Configuration Manager Client install faster appeared first on Interface Technical Training – Blogs.

Listing Current Network Sessions in Windows with Resource Monitor

Posted May 6, 2015

“What is my computer doing on the internet?” “What servers does this new software talk to?” “Where are these cloud files kept?” “Does {insert any software here} use the internet all the time or does it ask me first?” I... Continue reading →

The post Listing Current Network Sessions in Windows with Resource Monitor appeared first on Interface Technical Training – Blogs.

Creating an Installation USB Stick for Kali Linux

Posted April 15, 2015

Kali Linux is an ultra-powerful security tool. I use it extensively when doing Wi-Fi penetration testing, network security evaluations, and security audit tasks. It is freely downloadable from Kali.org as an ISO. I want to get the best possible performance … Continue Reading

The post Creating an Installation USB Stick for Kali Linux appeared first on Interface Technical Training – Blogs.