![Dale Meredith](https://pluralsight.imgix.net/author/lg/dale-meredith-v3.jpg?w=200)
Dale Meredith
Pluralsight Author
Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT management experience and worked as a CTO for a popular ISP provider. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge of the course material. Straddling the line of fun and function, Dale's instruction is memorable and entertaining. Dale's knowledge and understanding of current trends in technology and applications have led to many opportunities, such as: training various Inc 500 companies, universities, and Divisions of the Department of Homeland Security for the United States government.
Along with authoring for Pluralsight, consulting, and IT classroom training, you can catch Dale on stage speaking at IT conferences, helping IT teams keep their companies safe, relevant, and "breach" aware. Outside of the professional sphere, Dale spends quite a bit of his time giving back by speaking at adult and youth non-profit community gatherings and posting on his 'Dale Dumbs IT Down' social media sites. Dale uses these speaking engagements and social media sites to 'Dumb Down IT' concepts with the intent to help everyone be safe and smart with their technology and personal devices.
Dale also specializes in Active Directory, Exchange Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud
Topics Authored
Business Professional
Security Professional
IT Ops
Contents Authored
42
Total Ratings
1937
Avg Course Ratings
4.6
Courses by Dale
-
Course
SecurityAttacks and Exploits: Specialized Attacks for CompTIA Pentest+SecurityBeginner
2h 26m 24s
Feb 06, 2025
Course
SecurityAttacks and Exploits: Network and Application Attacks for CompTIA Pentest+SecurityBeginner
1h 28m 27s
Jan 22, 2025
Course
SecurityScanning and Reconnaissance with MetasploitSecurityIntermediate
35m 11s
Oct 22, 2024
Labs
SecurityLab 3 - Ethical Hacking: Scanning NetworksSecurityIntermediate
2h 45m
Oct 17, 2024
Course
SecurityExploitation and Post-exploitation with MetasploitSecurityIntermediate
31m 18s
Oct 09, 2024
Labs
SecurityLab - Ethical Hacking: Reconnaissance and FootprintingSecurityIntermediate
1h 15m
Sep 10, 2024
(14)Course
SecurityPhysical Security for The HackerSecurityIntermediate
28m 32s
Aug 21, 2024
Course
AISecurityAnthropic: Prompt Engineering for Cyber SecurityAISecurityBeginner
20m 19s
Jun 11, 2024
Course
SecurityBuilding a Cybersecurity Home Lab EnvironmentSecurityIntermediate
2h 2m 1s
Mar 19, 2024
(65)Course
AISecurityOpenAI: Prompt Engineering for Cyber SecurityAISecurityBeginner
18m 5s
Jan 23, 2024
(32)Course
SecurityGenerative AI Techniques for Social EngineeringSecurityIntermediate
36m 13s
Jan 12, 2024
(19)Labs
SecurityLab 2 - Ethical Hacking: Scanning NetworksSecurityIntermediate
3h 45m
Sep 08, 2023
(28)Course
SecurityExam Review Tips and Tricks for CySA+SecurityBeginner
28m 44s
Jun 07, 2023
(15)Course
SecuritySecurity Operations for CySA+SecurityBeginner
1h 39m 25s
Jun 07, 2023
(46)Course
SecurityVulnerability Management for CySA+SecurityBeginner
1h 31m 5s
Jun 07, 2023
(15)Course
SecurityReporting and Communication for CySA+SecurityBeginner
58m 19s
Jun 07, 2023
Course
SecurityIncident Response and Management for CySA+SecurityBeginner
1h 1m 34s
Jun 07, 2023
(15)Course
SecurityEthical Hacking: System HackingSecurityIntermediate
4h 34m 34s
Dec 07, 2022
(76)Course
SecurityEthical Hacking: SniffingSecurityIntermediate
3h 7m 44s
Nov 22, 2022
(47)Course
SecurityEthical Hacking: Malware ThreatsSecurityIntermediate
5h 2m 1s
Nov 22, 2022
(65)Course
SecurityEthical Hacking: Exam Review and TipsSecurityIntermediate
16m 58s
Nov 22, 2022
(15)Course
SecurityEthical Hacking: Vulnerability AnalysisSecurityIntermediate
1h 25m 59s
Nov 22, 2022
(68)Course
SecurityEthical Hacking: Scanning NetworksSecurityIntermediate
2h 54m 40s
Nov 22, 2022
(88)Course
SecurityEthical Hacking: Hacking IoT and OTSecurityIntermediate
2h 12m 7s
Nov 22, 2022
(48)Course
SecurityEthical Hacking: Reconnaissance/FootprintingSecurityBeginner
4h 18m 2s
Nov 22, 2022
(122)Course
SecurityEthical Hacking: CryptographySecurityIntermediate
1h 58m 30s
Nov 22, 2022
(52)Course
SecurityEthical Hacking: Hacking Wireless NetworksSecurityIntermediate
3h 36m 33s
Nov 22, 2022
(48)Course
SecurityEthical Hacking: Understanding Ethical HackingSecurityBeginner
2h 39m 21s
Nov 22, 2022
(252)Course
SecurityEthical Hacking: Hacking Mobile PlatformsSecurityIntermediate
2h 22m 24s
Nov 22, 2022
(56)Course
SecurityEthical Hacking: EnumerationSecurityIntermediate
2h 34m 43s
Nov 22, 2022
(74)Course
SecurityPassword and Wireless Attacks with Kali LinuxSecurityBeginner
53m 18s
Oct 07, 2022
(32)Course
SecurityYou're Compromising Your Company's Security. Here's How.SecurityBeginner
1h 1m 25s
Sep 03, 2020
(11)
-
Course
SecurityAttacks and Exploits: Specialized Attacks for CompTIA Pentest+SecurityBeginner
2h 26m 24s
Feb 06, 2025
Course
SecurityAttacks and Exploits: Network and Application Attacks for CompTIA Pentest+SecurityBeginner
1h 28m 27s
Jan 22, 2025
Course
SecurityScanning and Reconnaissance with MetasploitSecurityIntermediate
35m 11s
Oct 22, 2024
Course
SecurityExploitation and Post-exploitation with MetasploitSecurityIntermediate
31m 18s
Oct 09, 2024
Course
SecurityPhysical Security for The HackerSecurityIntermediate
28m 32s
Aug 21, 2024
Course
AISecurityAnthropic: Prompt Engineering for Cyber SecurityAISecurityBeginner
20m 19s
Jun 11, 2024
Course
SecurityBuilding a Cybersecurity Home Lab EnvironmentSecurityIntermediate
2h 2m 1s
Mar 19, 2024
(65)Course
AISecurityOpenAI: Prompt Engineering for Cyber SecurityAISecurityBeginner
18m 5s
Jan 23, 2024
(32)Course
SecurityGenerative AI Techniques for Social EngineeringSecurityIntermediate
36m 13s
Jan 12, 2024
(19)Course
SecurityExam Review Tips and Tricks for CySA+SecurityBeginner
28m 44s
Jun 07, 2023
(15)Course
SecuritySecurity Operations for CySA+SecurityBeginner
1h 39m 25s
Jun 07, 2023
(46)Course
SecurityVulnerability Management for CySA+SecurityBeginner
1h 31m 5s
Jun 07, 2023
(15)Course
SecurityReporting and Communication for CySA+SecurityBeginner
58m 19s
Jun 07, 2023
Course
SecurityIncident Response and Management for CySA+SecurityBeginner
1h 1m 34s
Jun 07, 2023
(15)Course
SecurityEthical Hacking: System HackingSecurityIntermediate
4h 34m 34s
Dec 07, 2022
(76)Course
SecurityEthical Hacking: SniffingSecurityIntermediate
3h 7m 44s
Nov 22, 2022
(47)Course
SecurityEthical Hacking: Malware ThreatsSecurityIntermediate
5h 2m 1s
Nov 22, 2022
(65)Course
SecurityEthical Hacking: Exam Review and TipsSecurityIntermediate
16m 58s
Nov 22, 2022
(15)Course
SecurityEthical Hacking: Vulnerability AnalysisSecurityIntermediate
1h 25m 59s
Nov 22, 2022
(68)Course
SecurityEthical Hacking: Scanning NetworksSecurityIntermediate
2h 54m 40s
Nov 22, 2022
(88)Course
SecurityEthical Hacking: Hacking IoT and OTSecurityIntermediate
2h 12m 7s
Nov 22, 2022
(48)Course
SecurityEthical Hacking: Reconnaissance/FootprintingSecurityBeginner
4h 18m 2s
Nov 22, 2022
(122)Course
SecurityEthical Hacking: CryptographySecurityIntermediate
1h 58m 30s
Nov 22, 2022
(52)Course
SecurityEthical Hacking: Hacking Wireless NetworksSecurityIntermediate
3h 36m 33s
Nov 22, 2022
(48)Course
SecurityEthical Hacking: Understanding Ethical HackingSecurityBeginner
2h 39m 21s
Nov 22, 2022
(252)Course
SecurityEthical Hacking: Hacking Mobile PlatformsSecurityIntermediate
2h 22m 24s
Nov 22, 2022
(56)Course
SecurityEthical Hacking: EnumerationSecurityIntermediate
2h 34m 43s
Nov 22, 2022
(74)Course
SecurityPassword and Wireless Attacks with Kali LinuxSecurityBeginner
53m 18s
Oct 07, 2022
(32)Course
SecurityYou're Compromising Your Company's Security. Here's How.SecurityBeginner
1h 1m 25s
Sep 03, 2020
(11)
-
Labs
SecurityLab 3 - Ethical Hacking: Scanning NetworksSecurityIntermediate
2h 45m
Oct 17, 2024
Labs
SecurityLab - Ethical Hacking: Reconnaissance and FootprintingSecurityIntermediate
1h 15m
Sep 10, 2024
(14)Labs
SecurityLab 2 - Ethical Hacking: Scanning NetworksSecurityIntermediate
3h 45m
Sep 08, 2023
(28)
-
Course
SecuritySelecting the Right Tool(s) for Your Red Team OperationRETIREDSecurityIntermediate
1h 30m 59s
Mar 19, 2024
(26)Course
SecurityAssessing Red Team Post Exploitation ActivityRETIREDSecurityIntermediate
1h 3m 13s
Mar 19, 2024
(18)Course
SecurityAssessing and Mitigating Security RisksRETIREDSecurityBeginner
3h 14m 5s
Feb 01, 2023
(19)Course
SecurityEthical Hacking: Penetration TestingRETIREDSecurityBeginner
4h 43m 12s
Feb 10, 2022
(65)Course
SecurityEthical Hacking: Hacking Mobile PlatformsRETIREDSecurityBeginner
4h 56m 44s
Feb 10, 2022
(137)Course
SecurityEthical Hacking: Hacking Wireless NetworksRETIREDSecurityBeginner
3h 15m 19s
Feb 10, 2022
(159)Course
SecurityEthical Hacking: Hacking the Internet of Things (IoT)RETIREDSecurityBeginner
2h 44m 18s
Feb 10, 2022
(37)Course
SecurityEthical Hacking: CryptographyRETIREDSecurityBeginner
2h 28m 42s
Feb 10, 2022
(48)Course
Core TechImplementing Windows Server 2012 R2 Essentials EditionRETIREDCore TechBeginner
3h 42m 25s
Apr 09, 2021
(68)Course
SecurityThe Issues of Identity and Access Management (IAM)RETIREDSecurityBeginner
2h 55m 38s
Nov 24, 2020
(57)