
Dale Meredith
Pluralsight Author
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government.
Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices.
Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
Topics Authored
Security Professional
IT Ops
Business Professional
Courses Authored
45
Total Ratings
2025
Avg Course Ratings
4.6
Courses by Dale
-
Course
Ethical Hacking: Updates and New ExploitsBeginner
38m 46s
Jun 26, 2025
Course
Web App Pen Testing with MetasploitIntermediate
24m 4s
Mar 26, 2025
Course
Post-exploitation and Lateral Movements for CompTIA Pentest+Beginner
1h 28m 20s
Mar 05, 2025
Course
Attacks and Exploits: Specialized Attacks for CompTIA Pentest+Beginner
2h 26m 24s
Feb 06, 2025
Course
Attacks and Exploits: Network and Application Attacks for CompTIA Pentest+Beginner
1h 28m 27s
Jan 22, 2025
Course
Scanning and Reconnaissance with MetasploitIntermediate
35m 11s
Oct 22, 2024
Labs
Lab 3 - Ethical Hacking: Scanning NetworksIntermediate
2h 45m
Oct 17, 2024
Course
Exploitation and Post-exploitation with MetasploitIntermediate
31m 18s
Oct 09, 2024
Labs
Lab - Ethical Hacking: Reconnaissance and FootprintingIntermediate
1h 15m
Sep 10, 2024
(17)Course
Physical Security for The HackerIntermediate
28m 32s
Aug 21, 2024
(11)Course
Building a Cybersecurity Home Lab EnvironmentIntermediate
2h 2m 1s
Mar 19, 2024
(68)Course
OpenAI: Prompt Engineering for Cyber SecurityBeginner
18m 5s
Jan 23, 2024
(32)Course
Generative AI Techniques for Social EngineeringIntermediate
36m 13s
Jan 12, 2024
(20)Labs
Lab 2 - Ethical Hacking: Scanning NetworksIntermediate
3h 45m
Sep 08, 2023
(28)Course
Incident Response and Management for CySA+Beginner
1h 1m 34s
Jun 07, 2023
(17)Course
Vulnerability Management for CySA+Beginner
1h 31m 5s
Jun 07, 2023
(18)Course
Reporting and Communication for CySA+Beginner
58m 19s
Jun 07, 2023
(11)Course
Exam Review Tips and Tricks for CySA+Beginner
28m 44s
Jun 07, 2023
(18)Course
Security Operations for CySA+Beginner
1h 39m 25s
Jun 07, 2023
(49)Course
Ethical Hacking: System HackingIntermediate
4h 34m 34s
Dec 07, 2022
(80)Course
Ethical Hacking: Scanning NetworksIntermediate
2h 54m 40s
Nov 22, 2022
(92)Course
Ethical Hacking: Reconnaissance/FootprintingBeginner
4h 18m 2s
Nov 22, 2022
(127)Course
Ethical Hacking: Malware ThreatsIntermediate
5h 2m 1s
Nov 22, 2022
(68)Course
Ethical Hacking: SniffingIntermediate
3h 7m 44s
Nov 22, 2022
(49)Course
Ethical Hacking: Hacking IoT and OTIntermediate
2h 12m 7s
Nov 22, 2022
(49)Course
Ethical Hacking: Vulnerability AnalysisIntermediate
1h 25m 59s
Nov 22, 2022
(69)Course
Ethical Hacking: EnumerationIntermediate
2h 34m 43s
Nov 22, 2022
(77)Course
Ethical Hacking: Exam Review and TipsIntermediate
16m 58s
Nov 22, 2022
(16)Course
Ethical Hacking: Hacking Mobile PlatformsIntermediate
2h 22m 24s
Nov 22, 2022
(58)Course
Ethical Hacking: Understanding Ethical HackingBeginner
2h 39m 21s
Nov 22, 2022
(266)Course
Ethical Hacking: CryptographyIntermediate
1h 58m 30s
Nov 22, 2022
(55)Course
Ethical Hacking: Hacking Wireless NetworksIntermediate
3h 36m 33s
Nov 22, 2022
(50)Course
Password and Wireless Attacks with Kali LinuxBeginner
53m 18s
Oct 07, 2022
(34)Course
You're Compromising Your Company's Security. Here's How.Beginner
1h 1m 25s
Sep 03, 2020
(11)
-
Course
Ethical Hacking: Updates and New ExploitsBeginner
38m 46s
Jun 26, 2025
Course
Web App Pen Testing with MetasploitIntermediate
24m 4s
Mar 26, 2025
Course
Post-exploitation and Lateral Movements for CompTIA Pentest+Beginner
1h 28m 20s
Mar 05, 2025
Course
Attacks and Exploits: Specialized Attacks for CompTIA Pentest+Beginner
2h 26m 24s
Feb 06, 2025
Course
Attacks and Exploits: Network and Application Attacks for CompTIA Pentest+Beginner
1h 28m 27s
Jan 22, 2025
Course
Scanning and Reconnaissance with MetasploitIntermediate
35m 11s
Oct 22, 2024
Course
Exploitation and Post-exploitation with MetasploitIntermediate
31m 18s
Oct 09, 2024
Course
Physical Security for The HackerIntermediate
28m 32s
Aug 21, 2024
(11)Course
Building a Cybersecurity Home Lab EnvironmentIntermediate
2h 2m 1s
Mar 19, 2024
(68)Course
OpenAI: Prompt Engineering for Cyber SecurityBeginner
18m 5s
Jan 23, 2024
(32)Course
Generative AI Techniques for Social EngineeringIntermediate
36m 13s
Jan 12, 2024
(20)Course
Incident Response and Management for CySA+Beginner
1h 1m 34s
Jun 07, 2023
(17)Course
Vulnerability Management for CySA+Beginner
1h 31m 5s
Jun 07, 2023
(18)Course
Reporting and Communication for CySA+Beginner
58m 19s
Jun 07, 2023
(11)Course
Exam Review Tips and Tricks for CySA+Beginner
28m 44s
Jun 07, 2023
(18)Course
Security Operations for CySA+Beginner
1h 39m 25s
Jun 07, 2023
(49)Course
Ethical Hacking: System HackingIntermediate
4h 34m 34s
Dec 07, 2022
(80)Course
Ethical Hacking: Scanning NetworksIntermediate
2h 54m 40s
Nov 22, 2022
(92)Course
Ethical Hacking: Reconnaissance/FootprintingBeginner
4h 18m 2s
Nov 22, 2022
(127)Course
Ethical Hacking: Malware ThreatsIntermediate
5h 2m 1s
Nov 22, 2022
(68)Course
Ethical Hacking: SniffingIntermediate
3h 7m 44s
Nov 22, 2022
(49)Course
Ethical Hacking: Hacking IoT and OTIntermediate
2h 12m 7s
Nov 22, 2022
(49)Course
Ethical Hacking: Vulnerability AnalysisIntermediate
1h 25m 59s
Nov 22, 2022
(69)Course
Ethical Hacking: EnumerationIntermediate
2h 34m 43s
Nov 22, 2022
(77)Course
Ethical Hacking: Exam Review and TipsIntermediate
16m 58s
Nov 22, 2022
(16)Course
Ethical Hacking: Hacking Mobile PlatformsIntermediate
2h 22m 24s
Nov 22, 2022
(58)Course
Ethical Hacking: Understanding Ethical HackingBeginner
2h 39m 21s
Nov 22, 2022
(266)Course
Ethical Hacking: CryptographyIntermediate
1h 58m 30s
Nov 22, 2022
(55)Course
Ethical Hacking: Hacking Wireless NetworksIntermediate
3h 36m 33s
Nov 22, 2022
(50)Course
Password and Wireless Attacks with Kali LinuxBeginner
53m 18s
Oct 07, 2022
(34)Course
You're Compromising Your Company's Security. Here's How.Beginner
1h 1m 25s
Sep 03, 2020
(11)
-
Labs
Lab 3 - Ethical Hacking: Scanning NetworksIntermediate
2h 45m
Oct 17, 2024
Labs
Lab - Ethical Hacking: Reconnaissance and FootprintingIntermediate
1h 15m
Sep 10, 2024
(17)Labs
Lab 2 - Ethical Hacking: Scanning NetworksIntermediate
3h 45m
Sep 08, 2023
(28)
-
Course
Anthropic: Prompt Engineering for Cyber SecurityRETIREDBeginner
20m 19s
Jun 30, 2025
Course
Selecting the Right Tool(s) for Your Red Team OperationRETIREDIntermediate
1h 30m 59s
Mar 19, 2024
(26)Course
Assessing Red Team Post Exploitation ActivityRETIREDIntermediate
1h 3m 13s
Mar 19, 2024
(18)Course
Assessing and Mitigating Security RisksRETIREDBeginner
3h 14m 5s
Feb 01, 2023
(19)Course
Ethical Hacking: Hacking the Internet of Things (IoT)RETIREDBeginner
2h 44m 18s
Feb 10, 2022
(37)Course
Ethical Hacking: CryptographyRETIREDBeginner
2h 28m 42s
Feb 10, 2022
(48)Course
Ethical Hacking: Hacking Mobile PlatformsRETIREDBeginner
4h 56m 44s
Feb 10, 2022
(137)Course
Ethical Hacking: Hacking Wireless NetworksRETIREDBeginner
3h 15m 19s
Feb 10, 2022
(159)Course
Ethical Hacking: Penetration TestingRETIREDBeginner
4h 43m 12s
Feb 10, 2022
(65)Course
Implementing Windows Server 2012 R2 Essentials EditionRETIREDBeginner
3h 42m 25s
Apr 09, 2021
(68)Course
The Issues of Identity and Access Management (IAM)RETIREDBeginner
2h 55m 38s
Nov 24, 2020
(58)