Sponsored by Keepnet Labs

Charles Sturt University Most Valuable Lecturers

This is from the a newsletter which is send by CSU / IT Masters for more then 60.000 students, world wide announcing we will lecture in the University. Beside Security Classes , I will also run Windows Server and Microsoft Virtualization Short courses , I am looking forward to meet all of you in my classes. Thank you Charles [...]


Server war stories: webcast

Published at ZDnet https://www.zdnet.com/article/server-war-stories-webcast/ How many server disaster stories (or close calls) do you think the average system administrator has under their belt? We're guessing that the answer would be a lot. Everyone who works with servers has heard of a story or experienced a breakdown. In a long career, it's impossible not to. Often, it's no one's fault; it's just a [...]


So You Want to Be a Security Expert

Repost from Bruce Schneier Blog I regularly receive e-mail from people who want advice on how to learn more about computer security, either as a course of study in college or as an IT person considering it as a career choice. First, know that there are many subspecialties in computer security. You can be an expert in keeping systems from being hacked, [...]


Posted By Category: Cyber Security, How to ...?Tags: , Comments: 0

Martin Smith, National Sales Manager ANZ, Fastlane Asia Pacific

Erdal's breadth and depth of knowledge is certainly matched by his presentation and training skills, where his natural flair and character is certainly endearing to the audience. He knows what Delegates want and is always able to help them find answers to questions, either from his own experiences or through his understanding of the Microsoft technologies he is [...]


Posted By Category: FeedbackComments: 0

Mitch Garvis, Senior IT Consultant

Erdal is an incredible wealth of knowledge in several areas of IT, and his passion for teaching it makes him one of the better trainers and presenters whom I have had the pleasure of working with Mitch Garvis, Senior IT Consultant, Trainer, & Courseware Developer, SWMI Consulting Group


Posted By Category: FeedbackTags: , Comments: 0

Getting hacked by color

A hacking anatomy and what we can learn out of it! There is nearly no single week , we don’t read in the news that there is a attack launched against a government, business or organization. As we all know there is NO WAY to STAP a Hacker. All what we can do is make their job harder ? But how? The best way is [...]


Posted By Category: Cyber Security, NewsComments: 0

Australian Banking Security (!)

Online Security is getting every day more and more important. It’s so common these days to implement secure password policies, which is at least 8 characters, with minimum 1 special character like @$# …. More and more cooperation's taking care of Passwords  as nearly every day a new “hack incidents “ happens… We all expect at least banks take care of secure password [...]


Worlds First CEH v7 Class Delivery

Certified Ethical Hacker Certification A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the [...]