Dale Meredith

Dale Meredith

Simplifying the Complex World of Cyber Security One Byte at a Time

Courses Created

Hours Watched

Viewers

Dale Meredith is your go-to for an unparalleled speaker. From captivating keynotes to insightful webinars, Dale deftly simplifies and demystifies the importance of IT security.

MOST REQUESTED
VIRTUAL LEARNINGS SESSIONS OF 2024

Beyond the Headlines: Deep Dive into the Costly World of Data Breaches

AI in Cybersecurity: Threats and Opportunities 

Be the Super Hero Your Company Needs: Safeguard Your Companies Assets

The Art of Self Hacking: Seeing Yourself from a Hackers Perspective 

Tackling Your Top IT Security Challenges (and Convincing Your C-Suite To Go Along!)

See Dale on Tour

The Human Firewall Tour

Influencing Leaders and Empowering Employees to be the First Line of Cyber Defense

Testimonials

Latest Articles

Device ProtectionGeek SpeakReviewsTrending
OpenClaw Security: How I Test A Viral AI Agent Without Opening Public Ports

OpenClaw Security: How I Test A Viral AI Agent Without Opening Public Ports

OpenClaw (formerly Clawbot and Moltbot) keeps popping up in my DMs. Friends, family, parents in my neighborhood, and security folks I work with all ask the same thing: "Is it safe to run an AI assistant that can actually do stuff?" Here's my honest take on OpenClaw...

Device ProtectionGeek SpeakReviewsTrending
OpenClaw Security: How I Test A Viral AI Agent Without Opening Public Ports

OpenClaw Security: How I Test A Viral AI Agent Without Opening Public Ports

OpenClaw (formerly Clawbot and Moltbot) keeps popping up in my DMs. Friends, family, parents in my neighborhood, and security folks I work with all ask the same thing: "Is it safe to run an AI assistant that can actually do stuff?" Here's my honest take on OpenClaw...

Certified Ethical Hacker (CEH) v11-12 Exam Guide
by Dale Meredith

“FINALLY! One resource to help me PASS my Exam”

★ ★ ★ ★ ★

Reviews on Amazon

Certified Ethical Hacker (CEH) v11-12 Exam Guide
by Dale Meredith

I recommend this book for sure and I’m glad it fell into my lap. I don’t think this is a book you will read just once.”

★ ★ ★ ★ ★

Reviews on Amazon

In the Media

Latest Articles

How to Spot Fake Security Alerts on Windows and macOS

These phishing scams use fake pop-ups that are getting better at acting like your computer is screaming for help. One minute you're reading the news, the next you're staring at a "virus detected" pop-up warning that feels way too real. Here's the bottom line: fake...

Latest Podcasts

Understanding Ethical Hacking

Ever wonder what it takes to become an ethical hacker? In this episode, Dale Meredith author of the Pluralsight course Ethical Hacking: Understanding Ethical Hacking shares some key takes away from his course. Discover why Ethical Hacking is becoming a popular skill for security, what you need to know how to pass the Certified Ethical Hacker (CEH) certification, and much much more.

Latest Youtube

Port Scanning with Nmap

Stealth scanning is a method of scanning a network or system while avoiding detection by firewalls or intrusion detection systems. It is an essential component of any penetration testing or vulnerability assessment since it allows security professionals to detect potential weaknesses that attackers could exploit.

You can find Dale speaking and engaging at

Pin It on Pinterest