Dale Meredith
Simplifying the Complex World of Cyber Security One Byte at a Time
Courses Created
Hours Watched
Viewers
As virtual events take center stage, Dale Dumbs IT Down is your go-to for an unparalleled speaker, Dale Meredith. From captivating keynotes to insightful webinars, Dale deftly simplifies and demystifies the importance of IT security.
MOST REQUESTED
VIRTUAL LEARNINGS SESSIONS OF 2023
Beyond the Headlines: Deep Dive into the Costly World of Data Breaches
AI in Cybersecurity: Threats and Opportunities
Be the Super Hero Your Company Needs: Safeguard Your Companies Assets
The Art of Self Hacking: Seeing Yourself from a Hackers Perspective
Tackling Your Top IT Security Challenges (and Convincing Your C-Suite To Go Along!)
Testimonials
“This course showing how to make sure your security profile provides coverage of data privacy and protection practices, risk management, and security frameworks. Recommend to watch”
“Great instructor! Somehow, he is able to water down complex concepts in a way that you can see the big picture and the need for each element.”
“Hey Dale you are the best instructor i have ever had
wanted to reach out and connect with you and thank you for putting out such an awesome course! I have gotten a plethora of knowledge and enjoyment from it.”
“I highly recommend Dale to any organization.I highly recommend Dale to any organization.
Dale is one of the leading Microsoft training professionals that I have ever met, he is up to date on all upgrades, migrations and new product roll out.”
“Dale is a phenomenal instructor. The topic we were learning about was not in my specialty but he used his skills and expertise to educate me in an uncharted arena and I passed the test with high marks.“
“Dale Meredith exemplifies what it means to be a scholar and a mentor in the ever-evolving landscape of IT.“
“Great online tutor and great teaching technique. Looking forward to his new one.“
“Dale has a great ability to make complex IT concepts simple and that is rare in my experience.“
Latest Articles
How Microsoft’s Latest Update Exposes Your Private Data!
Hey folks, ever wondered how deep the rabbit hole goes when you click "I Agree" on Microsoft's service agreements? What Exactly is Microsoft Peeking At? Imagine someone going through your drawers, flipping through your diaries, and even scanning your daydreams!...
A Deep Dive into Windows Defender’s Stand Against Malware
Hello there, fellow warriors of the web! Are you curious about how the Windows Defender in your arsenal measures up when you're not busy conducting penetration tests or battling botnets? Well, today we're putting this guardian under the microscope to see how well...
A Close Look at Wi-Fi War Driving and Wiggle.net
Hey folks, if you've got Wi-Fi at home or work—basically, if you live in the 21st century—you're going to want to stick around for this. Today, we're diving deep into something called Wi-Fi War Driving and this super useful app, Wiggle.net. Trust me, whether...
Certified Ethical Hacker (CEH) v11-12 Exam Guide
by Dale Meredith
“FINALLY! One resource to help me PASS my Exam”
★ ★ ★ ★ ★
Reviews on Amazon
In the Media
Latest Articles
Latest Podcasts
Latest Youtube
Latest Articles
How Microsoft’s Latest Update Exposes Your Private Data!
Hey folks, ever wondered how deep the rabbit hole goes when you click "I Agree" on Microsoft's service agreements? What Exactly is Microsoft Peeking At? Imagine someone going through your drawers, flipping through your diaries, and even scanning your daydreams!...
Latest Podcasts
Understanding Ethical Hacking
Ever wonder what it takes to become an ethical hacker? In this episode, Dale Meredith author of the Pluralsight course Ethical Hacking: Understanding Ethical Hacking shares some key takes away from his course. Discover why Ethical Hacking is becoming a popular skill for security, what you need to know how to pass the Certified Ethical Hacker (CEH) certification, and much much more.
Latest Youtube
Port Scanning with Nmap
Stealth scanning is a method of scanning a network or system while avoiding detection by firewalls or intrusion detection systems. It is an essential component of any penetration testing or vulnerability assessment since it allows security professionals to detect potential weaknesses that attackers could exploit.
You can find Dale speaking and engaging at