Mike Danseglio

In today's environment, certified security professionals are in high demand. Gain an understanding of the techniques and tools used so you'll be able to identify and stop them by becoming a Certified Ethical Hacker. “I teach by telling stories, and they’re stories I’ve had first-hand experience with,”…“I’ve helped put hackers in jail. I teach so my students can make a difference, too.”


Mike Danseglio has worked in the IT field for more than 20 years. He is an award-winning author, public speaker, and instructor on a variety of technology topics including security, virtualization, cloud computing, wireless and wired networking, and IT lifecycle processes.

His security work has included protecting militaries, government agencies, and private industry around the world. Mike has developed and taught extensive security training on topics including cryptography, security technology, and attacks and countermeasures.

Mike has published several books and numerous papers on computer security including Microsoft's own product security guides. He holds numerous certifications and credentials in technical instruction, security expertise, and across several IT specializations.

Mike Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations.

Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as hacking, viruses and corrupted processes.
“I help people understand attacks across all these approaches,” Danseglio says. “I understand how relentless and creative hackers are, and I’ve translated that knowledge into training that’s directly applicable for the IT pro.”

Danseglio has written National Security Agency (NSA) security recommendations and has written and presented on topics such as Active Directory Recovery and Availability in the enterprise, using SSL and Trust Marks and simplifying Compliance.

Mike is a Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH) and Langevin Master Trainer. He has developed and taught security training programs in Cryptography, Security Technology and Attacks and Countermeasures.

Twitter @InterfaceTT

#Windows Troubleshooting Tip ? Use the snipping tool.

2 hours 1 min ago

Creating a Custom List Form with #SharePoint #Designer -

17 hours 1 min ago

Adding a child domain to #ActiveDirectory Domain Services (AD DS) #WindowsServer part 2

21 hours 1 min ago

Implementing the #Lync Server 2010 Web Scheduler -

1 day 2 hours ago

Setting Default Metadata Values in #SharePoint 2010 -

1 day 17 hours ago


Finding Rogue Wireless Access Points with Kali Linux

Posted February 20, 2015

Many Wi-Fi network administrators have trouble dealing with unauthorized Wi-Fi access points on their networks. Users bring in their own APs so they can connect their iPad, their phone, their gaming device, even their non-approved laptops to the corporate network. … Continue Reading

The post Finding Rogue Wireless Access Points with Kali Linux appeared first on My CMS.

Finding Hidden Wireless Networks

Posted February 16, 2015

Many Wi-Fi network administrators decide to disable SSID broadcasts. They do this, in part, in an attempt to hide their network from uninvited users. The common belief behind it is that if the network name is not being broadcast, it … Continue Reading

The post Finding Hidden Wireless Networks appeared first on My CMS.

The Best Anti-Phishing Tool in the Enterprise… Is Free!

Posted January 19, 2015

Phishing is a combination of social engineering and technology that tries to trick users into disclosing sensitive information. You’re probably already familiar with the stereotypical Nigerian Prince email – an unsolicited email from an unknown sender identifying himself as a … Continue Reading

The post The Best Anti-Phishing Tool in the Enterprise… Is Free! appeared first on My CMS.