Dale Meredith
PLURALSIGHT AUTHOR
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government.
Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices.
Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
Courses Authored
37
Topics Authored
Business Professional
Security Professional
IT Ops
Total Ratings
1826
Avg Course Ratings
4.6
Courses by Dale
-
CourseScanning and Reconnaissance with MetasploitIntermediate35mOct 22, 2024
-
CourseExploitation and Post-exploitation with MetasploitIntermediate31mOct 09, 2024
-
CoursePhysical Security for The HackerIntermediate28mAug 21, 2024
-
CourseAnthropic: Prompt Engineering for Cyber SecurityBeginner20mJun 11, 2024
-
CourseBuilding a Cybersecurity Home Lab EnvironmentIntermediate2h 2mMar 19, 2024
-
CourseOpenAI: Prompt Engineering for Cyber SecurityBeginner18mJan 23, 2024
-
CourseGenerative AI Techniques for Social EngineeringIntermediate36mJan 12, 2024
-
CourseExam Review Tips and Tricks for CySA+Beginner28mJun 07, 2023
-
CourseIncident Response and Management for CySA+Beginner1h 1mJun 07, 2023
-
CourseVulnerability Management for CySA+Beginner1h 31mJun 07, 2023
-
CourseReporting and Communication for CySA+Beginner58mJun 07, 2023
-
CourseSecurity Operations for CySA+Beginner1h 39mJun 07, 2023
-
CourseEthical Hacking: System HackingIntermediate4h 34mDec 07, 2022
-
CourseEthical Hacking: Scanning NetworksIntermediate2h 54mNov 22, 2022
-
CourseEthical Hacking: SniffingIntermediate3h 7mNov 22, 2022
-
CourseEthical Hacking: EnumerationIntermediate2h 34mNov 22, 2022
-
CourseEthical Hacking: Exam Review and TipsIntermediate16mNov 22, 2022
-
CourseEthical Hacking: CryptographyIntermediate1h 58mNov 22, 2022
-
CourseEthical Hacking: Understanding Ethical HackingBeginner2h 39mNov 22, 2022
-
CourseEthical Hacking: Vulnerability AnalysisIntermediate1h 25mNov 22, 2022
-
CourseEthical Hacking: Malware ThreatsIntermediate5h 2mNov 22, 2022
-
CourseEthical Hacking: Reconnaissance/FootprintingBeginner4h 18mNov 22, 2022
-
CourseEthical Hacking: Hacking IoT and OTIntermediate2h 12mNov 22, 2022
-
CourseEthical Hacking: Hacking Mobile PlatformsIntermediate2h 22mNov 22, 2022
-
CourseEthical Hacking: Hacking Wireless NetworksIntermediate3h 36mNov 22, 2022
-
CoursePassword and Wireless Attacks with Kali LinuxBeginner53mOct 07, 2022
-
CourseYou're Compromising Your Company's Security. Here's How.Beginner1h 1mSep 03, 2020
-
CourseSelecting the Right Tool(s) for Your Red Team OperationRETIREDIntermediate1h 30mMar 19, 2024
-
CourseAssessing Red Team Post Exploitation ActivityRETIREDIntermediate1h 3mMar 19, 2024
-
CourseAssessing and Mitigating Security RisksRETIREDBeginner3h 14mFeb 01, 2023
-
CourseEthical Hacking: Hacking the Internet of Things (IoT)RETIREDBeginner2h 44mFeb 10, 2022
-
CourseEthical Hacking: CryptographyRETIREDBeginner2h 28mFeb 10, 2022
-
CourseEthical Hacking: Hacking Wireless NetworksRETIREDBeginner3h 15mFeb 10, 2022
-
CourseEthical Hacking: Penetration TestingRETIREDBeginner4h 43mFeb 10, 2022
-
CourseEthical Hacking: Hacking Mobile PlatformsRETIREDBeginner4h 56mFeb 10, 2022
-
CourseImplementing Windows Server 2012 R2 Essentials EditionRETIREDBeginner3h 42mApr 09, 2021
-
CourseThe Issues of Identity and Access Management (IAM)RETIREDBeginner2h 55mNov 24, 2020