Enjoy a short clip from my PluralSight Ethical Hacking:Reconnaissance/Footprinting course The full course is part 2 of our 20 course Ethical Hacking series. This course starts you at the first phase (out of 5) of hacking. You'll begin
Read More

Here's another short video clip on how your passwords, are your weakest link. It's from my PluralSight Ethical Hacking:System Hacking course
Read More

Episode 9: It’s our security episode! In addition to a security update from Dale Meredith, we’ll also talk with Dale and author Troy Hunt about their work on the soon-to-be-complete Ethical Hacking series. We’ll talk about how
Read More

This course is part of the 20 course Ethical Hacking Series. This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking
Read More

When people ask what makes the 2012 LinkedIn data hack and the 2013 Myspace breach different than others, I tell them it shows how little we understand our enemy. This is obviously because the attacker mind set is constantly evolving,
Read More

Let's play a game. Let's see if I can guess one of your passwords, or at least part of it. Is it your dog's name? Does it have your birthday in it? How about your favorite sports team? Did I
Read More

Published Article from "IT PRO PORTAL" Speaking to Pluralsight author and industry expert Dale Meredith, he said there is currently a massive skills gap in this space, with the Information Systems Security Certification Consortium (ISC2) claiming there will be a
Read More