Video – How To Erase Data Permanently in Windows with Cipher

Home > Blogs > Security

Blogs: Security

Video – How To Erase Data Permanently in Windows with Cipher

0 0

Most computer users think that when they empty the Recycle Bin, that data is gone forever. Unless the FBI or Interpol decide to use a scanning electron microscope, there’s no way someone can recover the information. Right? Wrong. That data is usually still laying around on the hard drive. Data remnants, or pieces of information … Continue reading Video – How To Erase Data Permanently in Windows with Cipher

Security Blogs

Is My Business Being Hacked?

0 0

I get asked all the time about web sites or business computers being hacked. Specifically, someone asks me whether his Internet site is being hacked or internal computers are being attacked. My answer is always the same. "Yes. Your business is being attacked. Your web site and your internal computers are both under attack right … Continue reading Is My Business Being Hacked?

The Big Picture for Data Encryption – Mike Danseglio CISSP

1 0

Last week I spoke at a public IT conference on Microsoft’s campus in Redmond, Washington. One of my popular lecture topics is data security and encryption. Even though my session was at the end of the conference, I had a capacity audience. An attendee spoke up early in the session with a surprising comment. “Are … Continue reading The Big Picture for Data Encryption – Mike Danseglio CISSP

Windows 7 – How to use Cipher.exe – A Critical Win 7 security Tool

2 1

The Cipher.exe command line tool was originally released with Windows 2000, commensurate with the release of NTFS V5.0 and the ability to use the Encrypting File System (EFS). Microsoft continues to upgrade the tool as Windows Operating System security solutions evolve. With the release of Windows 7, the Cipher command becomes a critical component of … Continue reading Windows 7 – How to use Cipher.exe – A Critical Win 7 security Tool

Enter the Danger Zone – Computer Security Expert Mike Danseglio at Interface Technical Training

1 0

Interface Technical Training, is pleased to welcome Mike Danseglio as Technical Director and Instructor, Systems & Security. Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations. Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as … Continue reading Enter the Danger Zone – Computer Security Expert Mike Danseglio at Interface Technical Training

Video: Information Security – How Cryptography Works (Choosing the Right Crypto for the Right Job)

0 0

Information Security Expert, Interface Technical Training Director and CISSP / CEH Instructor Mike Danseglio presented at the Security BSides event in Tempe, AZ on February 18th, 2012. Mr. Danseglio’s topic was How Cryptography Works (Choosing the Right Crypto for the Right Job). Here is the 3-part video of his presentation: Video 1 of 3 Video 2 … Continue reading Video: Information Security – How Cryptography Works (Choosing the Right Crypto for the Right Job)

Cloud Intelligence Conference Phoenix 2012

0 0

On May 8, 2012, Interface Technical Training hosted The Cloud Intelligence Conference which included 19 sessions across 5 targeted learning tracks. Attendees gained knowledge and information to help develop their company's cloud computing strategy. Here are the presentation slides of the speakers at The Cloud Intelligence conference in Phoenix, AZ.(Right click the links and "Save link as" … Continue reading Cloud Intelligence Conference Phoenix 2012

Workshops / Webinars

Project Management (PMP) for Executives – Introduction

1 96 0

Introduction Project Management (PMP) for Executives is a 9 part video training series developed by Steve Fullmer, PMP, MBA, MCT/CTT+, CDP.  Steven has a global reputation as a project manager, chief technology officer, and computer systems innovator. He has authored more than 100 articles and a dozen courses in the fields of project management, productivity, business … Continue reading Project Management (PMP) for Executives – Introduction

Project Management (PMP) Leadership Skills in the 21st Century … Do you Know Your History? – November 10, 2017

0 99 2

The PMI Leadership triangle touts our need to develop our knowledge and application of leadership. Do you understand the leadership models of the 20th century? The 21st Century? Understanding your predecessors can assist to set your future course. On the matter of history, Mark Twain’s quote “History doesn’t repeat itself, but it does rhyme” is … Continue reading Project Management (PMP) Leadership Skills in the 21st Century … Do you Know Your History? – November 10, 2017

Principles of Decision Tree Design and Analysis in Project Management (PMP)

0 59 0

In this Project Management Professional (PMP) training video, learn how about Decision Trees and how to solve them with Risk Analysis. Existentialism conveys themes like the importance of choice, contingencies, and extreme situations.  How do you choose when the decision is hard? (If the decision is easy, you just choose.) When the decision is hard, we … Continue reading Principles of Decision Tree Design and Analysis in Project Management (PMP)

Understand the Mind to Become a Better Project Manager – February 18, 2015

0 98 2

Our minds all work alike, at least biologically. Yet we are a diverse species with different motivations, opinions, perspectives, and directions. Do you understand how and why the human mind works? What makes you a great project manager? In this recording of our PMP training webinar from February 18, 2015, Steve Fullmer covers some of … Continue reading Understand the Mind to Become a Better Project Manager – February 18, 2015

Windows 10 Security – What’s New and Improved? – December 3, 2015

0 104 1

In this recording of our Windows 10 webinar from December 3, 2015 training,  security expert Mike Danseglio presents the enhanced security features of SmartScreen, Defender and BitLocker in Windows 10 and new features such as Biometric Identification, Microsoft Passport, Device Guard and more.

Windows 10 Managing, Deploying and Configuring – December 2, 2015

0 486 1

In this recorded Windows 10 training webinar from December 2, 2015, Windows Server instructor Rick Trader presents the deployment and management of Windows 10 Enterprise and the new Provisioning capability in Windows 10. Learn how to manage Windows 10 deployments using System Center Configuration Manager, Mobile Device Management and Intune. Also included in his presentation … Continue reading Windows 10 Managing, Deploying and Configuring – December 2, 2015

Videos You May Like

A Simple Introduction to Cisco CML2

0 3901 0

Mark Jacob, Cisco Instructor, presents an introduction to Cisco Modeling Labs 2.0 or CML2.0, an upgrade to Cisco’s VIRL Personal Edition. Mark demonstrates Terminal Emulator access to console, as well as console access from within the CML2.0 product. Hello, I’m Mark Jacob, a Cisco Instructor and Network Instructor at Interface Technical Training. I’ve been using … Continue reading A Simple Introduction to Cisco CML2

Creating Dynamic DNS in Network Environments

0 645 1

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader teaches how to create Dynamic DNS zones in Network Environments. Video Transcription: Now that we’ve installed DNS, we’ve created our DNS zones, the next step is now, how do we produce those … Continue reading Creating Dynamic DNS in Network Environments

Cable Testers and How to Use them in Network Environments

0 732 1

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments