Dale Meredith
▶︎ Cyber Security Speaker
▶︎ Author
▶︎ Trainer
▶︎ Consultant
▶︎ Batman Addict
Clients Include
Virtual Speaking
Live Engagements
“He has the unique gift of teaching while making it fun. I call it edutainment, and every time I watch one of his courses or read an article he has published, I learn something. It could be a piece of technical detail I was not aware of( or had forgotten about) or something about the way he delivers material. Keeping a listener engaged while delivering training is no easy task and in this Dale excels.”
-Christopher Rees
Dale's Popular Webinars
▶︎ Beyond the Headlines: Deep Dive into the Costly World of Data Breaches
▶︎ AI in Cybersecurity: Threats and Opportunities
▶︎ Be the Super Hero Your Company Needs: Safeguard Your Companies Assets
▶︎ The Art of Self Hacking: Seeing Yourself from a Hackers Perspective
▶︎ Tackling Your Top IT Security Challenges (and Convincing Your C-Suite To Go Along!)
Certified Ethical Hacker (CEH) v11-12 Exam Guide by Dale Meredith
“FINALLY! One resource to help me PASS my Exam”
★ ★ ★ ★ ★
Reviews on Amazon
In the Media
Latest Articles
Latest Podcasts
Latest Youtube
Latest Articles
Exciting News: Google Introduces Passkeys for Enhanced Account Security
Hey there, exciting news coming your way! Google has started a fantastic initiative where they're introducing a new way to log into your personal accounts, and it's called "passkeys." This cool feature is rolling out this month for all of Google's billions of...
Latest Podcasts
Understanding Ethical Hacking
Ever wonder what it takes to become an ethical hacker? In this episode, Dale Meredith author of the Pluralsight course Ethical Hacking: Understanding Ethical Hacking shares some key takes away from his course. Discover why Ethical Hacking is becoming a popular skill for security, what you need to know how to pass the Certified Ethical Hacker (CEH) certification, and much much more.
Latest Youtube
Port Scanning with Nmap
Stealth scanning is a method of scanning a network or system while avoiding detection by firewalls or intrusion detection systems. It is an essential component of any penetration testing or vulnerability assessment since it allows security professionals to detect potential weaknesses that attackers could exploit.
You can find Dale speaking and engaging at
Latest Articles
Exciting News: Google Introduces Passkeys for Enhanced Account Security
Hey there, exciting news coming your way! Google has started a fantastic initiative where they're introducing a new way to log into your personal accounts, and it's called "passkeys." This cool feature is rolling out this month for all of Google's billions of...
The Importance of CEH Certification
As businesses increasingly rely on technology, the need for cybersecurity professionals has grown exponentially. With cyber threats becoming more sophisticated, it's crucial for organizations to have skilled cybersecurity experts who can protect their networks and...
CEH Certification Benefits
Are you interested in a career in cybersecurity? Then you may have heard of the CEH certification. This certification is highly sought after by professionals in the field, and for good reason. In 2005, the US Department of Defense issued a directive requiring...