Tag Archives: Security

Security+ SY0-301 versus SY0-401 and other questions

The SY0-401Security+ exam went live in April 2014, though you may still take the SYO-301 exam through December 31, 2014. In either event, the Security+ credential is now a Continuing Education certification such that you will want to update your knowledge and skill sets regardless of the exam version you initially pass. While teaching our … Continue reading Security+ SY0-301 versus SY0-401 and other questions

Hacking the RSA Wireless Network: Bring Your A Game

I’m attending the RSA Conference this week. Right now I’m writing from the conference floor. The event looks to be amazing, with a great speaker line-up and really strong attendance. I can’t wait for the sessions to get fully underway. This year the conference is providing free, unsecured wireless networking to all attendees. Yes, free … Continue reading Hacking the RSA Wireless Network: Bring Your A Game

The Big Picture for Data Encryption – Mike Danseglio CISSP

Last week I spoke at a public IT conference on Microsoft’s campus in Redmond, Washington. One of my popular lecture topics is data security and encryption. Even though my session was at the end of the conference, I had a capacity audience. An attendee spoke up early in the session with a surprising comment. “Are … Continue reading The Big Picture for Data Encryption – Mike Danseglio CISSP

Tips for Using Local Group Policy in your Windows Pre Deployment Image Windows 7 & 8

Windows automated installation tools afford the opportunity to customize the Windows 7 (and Windows 8) image files prior to deployment.   Building and capturing a reference computer image affords the opportunity to deploy an image that not only meets customer needs, but also enables premeditated feature deployment and security decisions.  Both feature control and security are … Continue reading Tips for Using Local Group Policy in your Windows Pre Deployment Image Windows 7 & 8

Enter the Danger Zone – Computer Security Expert Mike Danseglio at Interface Technical Training

Interface Technical Training, is pleased to welcome Mike Danseglio as Technical Director and Instructor, Systems & Security. Danseglio performed computer security hardening for NATO, wrote many Microsoft product security guides and managed Microsoft’s Xbox LIVE Operations. Danseglio trains IT professionals to protect their companies’ infrastructure, database systems, websites and customer accounts from threats such as … Continue reading Enter the Danger Zone – Computer Security Expert Mike Danseglio at Interface Technical Training

Video: Information Security – How Cryptography Works (Choosing the Right Crypto for the Right Job)

Information Security Expert, Interface Technical Training Director and CISSP / CEH Instructor Mike Danseglio presented at the Security BSides event in Tempe, AZ on February 18th, 2012. Mr. Danseglio’s topic was How Cryptography Works (Choosing the Right Crypto for the Right Job). Here is the 3-part video of his presentation: Video 1 of 3 Video 2 … Continue reading Video: Information Security – How Cryptography Works (Choosing the Right Crypto for the Right Job)

The CompTIA A+ credential is changing again?

In 2008, the top 3 skills in demand by CIOs and IT executives were network administration, windows administration and desktop support. In 2012 the list shifts to programming and application development, project management, and help desk and technical support. Demand for networking skills declined dramatically to fourth or fifth position by 2011, though is recovering … Continue reading The CompTIA A+ credential is changing again?

Video: Cloud Intelligence Conference – May 8, 2012

Interface Technical Training is presenting an opportunity for Arizona businesses and organizations to learn how to put their computing in “the cloud.” The Phoenix Cloud Intelligence Conference May 8, 7:30 a.m. – 6 p.m. As one of a small group of Microsoft Managed Partners, Interface Technical Training was invited to participate in Microsoft’s 15-city Cloud … Continue reading Video: Cloud Intelligence Conference – May 8, 2012