Mike Danseglio

In today's environment, certified security professionals are in high demand. Gain an understanding of the techniques and tools used so you'll be able to identify and stop them by becoming a Certified Ethical Hacker. “I teach by telling stories, and they’re stories I’ve had first-hand experience with,”…“I’ve helped put hackers in jail. I teach so my students can make a difference, too.”


Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes.

His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures.

Mike has published several books and numerous papers on computer security including Microsoft's own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations.

Mike Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.

Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes.
“I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.”

Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance.

Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.

Twitter @InterfaceTT

We know you were wondering... "What is wmpnetwk.exe and can I kill it?" (now you feel better, right?) #Windows

17 hours 38 min ago

Thanks for the mention! RT @ralphtq: jQuery Daily Tab is out! Stories via @InterfaceTT @aspdotnetsuresh @junxilu

19 hours 58 min ago

Free ebook: Building Cloud Apps with @Microsoft #Azure -

20 hours 40 sec ago

Thanks for the mention! RT @ivbran: Appreneuring news is out! Stories via @InterfaceTT @BluePhoenixMod @RhoMobile

20 hours 4 min ago

Are you sure you want to change that URL? - How to Change the Title and URL at the Same Time in #SharePoint 2010

22 hours 38 min ago


Do Not Rely on PDF Document Security

Posted July 16, 2014

The scenario is simple enough. You need to share some information, a document, with a friend or coworker. You want them to read the document, but not alter or print it. You don’t want them to copy the text or … Continue Reading

How to Force System Center Configuration Manager Client Updates

Posted July 7, 2014

When working with System Center Configuration Manager 2007, 2012, or 2012 R2, you probably make changes to client configuration settings. Some of the changes don’t need to reach your managed clients very quickly, while others could be considered more important. … Continue Reading

Are Browser Toolbars Really Malware?

Posted June 25, 2014

Browser toolbars are really common. You may even have one installed in your browser right now as you read this article. Whether you use Chrome, Firefox, Internet Explorer, Opera, Safari, or a less common browser, software companies make toolbars that … Continue Reading