Dale Meredith

Simplifying the Complex World of Cyber Security One Byte at a Time
Courses Created
Hours Watched
Viewers
Dale Meredith is your go-to for an unparalleled speaker. From captivating keynotes to insightful webinars, Dale deftly simplifies and demystifies the importance of IT security.
MOST REQUESTED
VIRTUAL LEARNINGS SESSIONS OF 2024
Beyond the Headlines: Deep Dive into the Costly World of Data Breaches
AI in Cybersecurity: Threats and Opportunities
Be the Super Hero Your Company Needs: Safeguard Your Companies Assets
The Art of Self Hacking: Seeing Yourself from a Hackers Perspective
Tackling Your Top IT Security Challenges (and Convincing Your C-Suite To Go Along!)
Testimonials
“This course showing how to make sure your security profile provides coverage of data privacy and protection practices, risk management, and security frameworks. Recommend to watch”
“Great instructor! Somehow, he is able to water down complex concepts in a way that you can see the big picture and the need for each element.”
“Hey Dale you are the best instructor i have ever had
wanted to reach out and connect with you and thank you for putting out such an awesome course! I have gotten a plethora of knowledge and enjoyment from it.”
“I highly recommend Dale to any organization.I highly recommend Dale to any organization.
Dale is one of the leading Microsoft training professionals that I have ever met, he is up to date on all upgrades, migrations and new product roll out.”
“Dale is a phenomenal instructor. The topic we were learning about was not in my specialty but he used his skills and expertise to educate me in an uncharted arena and I passed the test with high marks.“
“Dale Meredith exemplifies what it means to be a scholar and a mentor in the ever-evolving landscape of IT.“
“Great online tutor and great teaching technique. Looking forward to his new one.“
“Dale has a great ability to make complex IT concepts simple and that is rare in my experience.“
Latest Articles
How to Spot Fake Security Alerts on Windows and macOS
These phishing scams use fake pop-ups that are getting better at acting like your computer is screaming for help. One minute you're reading the news, the next you're staring at a "virus detected" pop-up warning that feels way too real. Here's the bottom line: fake...
OpenClaw Security: How I Test A Viral AI Agent Without Opening Public Ports
OpenClaw (formerly Clawbot and Moltbot) keeps popping up in my DMs. Friends, family, parents in my neighborhood, and security folks I work with all ask the same thing: "Is it safe to run an AI assistant that can actually do stuff?" Here's my honest take on OpenClaw...
Passwordless Passkeys Explained for Google, Apple, and Microsoft Accounts
If passwords feel like house keys you've copied a hundred times and tossed into a dozen junk drawers, you're not imagining it. Passwords get reused, guessed, phished, and leaked, then we all get stuck playing the reset game at 2 a.m. That's why passwordless...
How to Spot Fake Security Alerts on Windows and macOS
These phishing scams use fake pop-ups that are getting better at acting like your computer is screaming for help. One minute you're reading the news, the next you're staring at a "virus detected" pop-up warning that feels way too real. Here's the bottom line: fake...
OpenClaw Security: How I Test A Viral AI Agent Without Opening Public Ports
OpenClaw (formerly Clawbot and Moltbot) keeps popping up in my DMs. Friends, family, parents in my neighborhood, and security folks I work with all ask the same thing: "Is it safe to run an AI assistant that can actually do stuff?" Here's my honest take on OpenClaw...
























Certified Ethical Hacker (CEH) v11-12 Exam Guide
by Dale Meredith
“FINALLY! One resource to help me PASS my Exam”
★ ★ ★ ★ ★
Reviews on Amazon
Certified Ethical Hacker (CEH) v11-12 Exam Guide
by Dale Meredith
“I recommend this book for sure and I’m glad it fell into my lap. I don’t think this is a book you will read just once.”
★ ★ ★ ★ ★
Reviews on Amazon
In the Media
Latest Articles
How to Spot Fake Security Alerts on Windows and macOS
These phishing scams use fake pop-ups that are getting better at acting like your computer is screaming for help. One minute you're reading the news, the next you're staring at a "virus detected" pop-up warning that feels way too real. Here's the bottom line: fake...
Latest Podcasts

Understanding Ethical Hacking
Ever wonder what it takes to become an ethical hacker? In this episode, Dale Meredith author of the Pluralsight course Ethical Hacking: Understanding Ethical Hacking shares some key takes away from his course. Discover why Ethical Hacking is becoming a popular skill for security, what you need to know how to pass the Certified Ethical Hacker (CEH) certification, and much much more.
Latest Youtube

Port Scanning with Nmap
Stealth scanning is a method of scanning a network or system while avoiding detection by firewalls or intrusion detection systems. It is an essential component of any penetration testing or vulnerability assessment since it allows security professionals to detect potential weaknesses that attackers could exploit.
You can find Dale speaking and engaging at













