Security in the Enterprise In this course, experts Simon May and Erdal Ozkaya take you through social media platforms to discover how they really work. Get tips and practical advice on social networking security, and explore methods of developing a secure baseline and how to harden your Windows Enterprise architectures and applications from pass-the-hash and other advanced attacks. Learn how to help improve your organization’s security with Microsoft operating systems and tools.
Today I’ve received a congratulation email from Microsoft Learning that I’ve reached the tenth anniversary of being an MCT (Microsoft Certified Trainer).
Checking my MCP transcript, I’m MCP since 2001,and MCT since 2006
Erdal is brilliant! Can that be a stand-alone recommendation? I believe it should be and the following is why: Erdal brings with him not only the value of being incredibly intelligent in his field; he brings lengthy experience with both consulting (freelance work) and through companies; along with the ability to communicate with others at several different levels (including “tech” talk, networking, humor, & conversational styling), he knows how to bring strategy into the picture. That is difficult to do and he does it wonderfully. Wrap it all together, and that is brilliant and therefore, Erdal is brilliant! I am proud that I was able to work with him with the MCT Advisory Council at Microsoft.” (2012)
I love to be with MCT‘s , and as always I am making sure, they will improve their Security skills, to help me reach out more and more people to make the cyber space safe.
The feedback from San Francisco MCT summit was really great. I am proud to be part of the MCT Family.
The MCT Summit (MCT standing for Microsoft Certified Trainer) is an opportunity for MCTs around the nation to meet, learn about new technologies, and grow as instructors and presenters through many professional development presentations and classes.
This year I had 2 session to present for my MCT peers:
Halt Hackers MCT Edition
Windows Intune, what you need to know
It was great to be with the MCT’s in Stockholm, Sweden ; and I am really pleased to get the wonderful feedback from my peers. Hopefully with their support our Security community will grove . As I always say WE ARE BETTER TOGETHER
Cybersecurity isn’t just about technology – it’s fundamentally a battle of mindsets. The way we approach challenges shapes our strategies and determines our chances of success in this constantly shifting landscape. Two distinct mindsets dominate: the finite mindset and the infinite mindset.
Hacking Articles , a popular web site has just announced my book Incident Response in the Age of the Cloud , one of the best for the year. I am really thank full.
Hacking Articles has announced the winners via their official twitter account which has more the 34.ooo followers
Best of Cyber Security 2021 Books (Part 1)
Incident Response in the Age of Cloud
Techniques and best practices to effectively respond to cybersecurity incidents – get it from Amazon
Antivirus Bypass Techniques
Threat Hunting with Elastic Stack
Threat Hunting in the Cloud
Abbas Kudrati (Author), Chris Peiris (Author), Binil Pillai (Author)
Cybersecurity Leadership Demystified Announcing 11 Experts , who is part of the book 🙂
My new book is ready to be published and I am really proud to announce the 11 Experts who has contributed in the Bonus chapter ,called Ask The Experts. A chapter which has not been written by me, but instead by a selection of very well-known Cybersecurity Experts, which some of protect worlds biggest organizations with their services, products , some who are trainers who teaches CISO classes as well as advanced security classes.
I’m honored to welcome Dr. Timothy Summers, Dr. Suleyman Ozturk, Dr. Mike Jankowski, and my very close friends Marcus Murray, Raymond Comvalius, Sukru Durmaz, Raif Sarica, Vladimir Meloski, Paula Januskiewicz, and Mert Sarica. They shared their time, insight, and experiences freely and without reservation. I am thankful for the contribution of their expertise and wisdom in this book.
After many months of very hard work , finally my new book ” Incident Response in the age of Cloud” for everyone who wants to learn how to identify a security incident and build a series of best practices to stop an attack before it creates serious consequences. Cybercriminals are always in search of new […]
Anyone can be hacked. It is just a matter of time. Even the right technology, e.g. the best firewall or anti-virus application, can fall short of protecting your system against cyber-attacks since cybercriminals are always in search of finding new methods and ways to infiltrate into systems. Responding to an incident quickly will help an […]