TECHNICAL DIRECTOR AND INSTRUCTOR, SYSTEMS & SECURITY

Mike Danseglio

In today's environment, certified security professionals are in high demand. Gain an understanding of the techniques and tools used so you'll be able to identify and stop them by becoming a Certified Ethical Hacker. “I teach by telling stories, and they’re stories I’ve had first-hand experience with,”…“I’ve helped put hackers in jail. I teach so my students can make a difference, too.”

Biography

Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes.

His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures.

Mike has published several books and numerous papers on computer security including Microsoft's own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations.

Mike Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.


Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes.
“I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.”


Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance.


Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.

Twitter @InterfaceTT

RT @staticvoidmain: Took classes @InterfaceTT , interned with @scottcate , attended many user groups and got a job in I. T. Super grateful…

4 hours 10 min ago

RT @staticvoidmain: Taking my first class @InterfaceTT was one of the best decisions i ever made.

4 hours 21 min ago

Working with Validation in #SQL Server Integration Services #SSIS 2008R2 - http://t.co/9lVj2b6fTw

6 hours 22 min ago

What the heck? #PowerShell Cmdlets with FeatureDependencyId are not registered in #SharePoint 2010 - http://t.co/LUIIAbH2KG

9 hours 22 min ago

Enabling #Win7 Remote Desktop and Remote Assistance - http://t.co/rW3qndCcmC

1 day 1 hour ago


Blog

Synchronizing the Windows Clock With an Authoritative Time Source

Posted October 24, 2014

“Lost time is never found again.” – Benjamin Franklin You probably already know that having accurate time set on all clients and servers is important. Very bad things happen when computer clocks disagree. Things like: Users cannot logon to a … Continue Reading

The post Synchronizing the Windows Clock With an Authoritative Time Source appeared first on My CMS.

Using Nmap to Reconnoiter the DMZ and Perimeter Networks

Posted October 3, 2014

The importance of reconnaissance in vulnerability discovery and penetration testing is usually overlooked. Network security personnel with little training or experience will often begin their analysis by finding a few target systems and immediately attempt to compromise their security with … Continue Reading

The post Using Nmap to Reconnoiter the DMZ and Perimeter Networks appeared first on Interface Technical Training Blog.

Using WebRipper to Examine Website Content

Posted September 22, 2014

A skilled attacker usually begins an attack by performing detailed reconnaissance. Recon is critical to a comprehensive attack as it yields information about the target network, hosts, personnel, publicly accessible assets, and a host of other data. One of the … Continue Reading

The post Using WebRipper to Examine Website Content appeared first on Interface Technical Training Blog.