Tag - CEO IT Training

Free Event: Building Resilient Systems.- Microsoft Jakarta & Hong Kong

Building Resilient Systems:  A Comprehensive Guide to Load Balancing Microsoft Workloads  Learn how to build resiliency into your Microsoft Workloads such as Exchange, Lync.  As Microsoft Workloads become more critical to the productivity of your organisation, it becomes even more important to deploy them in highly available architectures. Server and site Load balancing are essential technologies for ensuring your organisation [...]


Leading IT security expert, Erdal Ozkaya, now lecturing at Charles Sturt

Erdal Ozkaya, one of the world's leading experts and educators on security in the Microsoft environment has taken up a lecturing role at Charles Sturt University. Ozkaya was the founder and senior Microsoft instructor of CEO IT Training, a company that has now merged with Fast Lane Asia Pacific; one of Australia’s Silver certified Microsoft Learning Partners. He now participates [...]


Using tech for your business

Published at Entrepreneur Magazine https://www.entrepreneur.com.ph/business-ideas/using-tech-for-your-business Upgrading the technology that runs your business could mean the difference between keeping the status quo and boosting sales. In line with their commitment to empower businesses through technology, Microsoft, together with its Certified Partner for Learning Solutions namely Fast Lane (which bought CEO IT), brought Erdal Ozkaya, one of their top global IT [...]


Windows Security Tour

Be ready , I am coming all the way from Australia to visit your country, to talk about Windows , Security and more The tour will be in 3 section, watch out my blog and Social Media channels for for the exact dates I call the tour " Erdal across the world" for windows in 20 days :) ASIA Tour - November [...]


Worlds First CEH v7 Class Delivery

Certified Ethical Hacker Certification A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the [...]