Kevin Beaver's Profile:

Name:Kevin Beaver
Location:Atlanta, GA
Job Title:IT Security Consultant
Bio: I am an information security consultant with Principle Logic, LLC ( I focus my work on independent security assessments revolving around compliance and minimizing business risks. I'm also a professional speaker and author of over 600 articles and 11 books including Hacking For Dummies. I'm also the creator/producer of Security On Wheels providing security learning for IT professionals on the go (
Area of Expertise:Information Security, Compliance, BYOD, Cloud Computing, IT and Security Careers
Knowledge Points:17,970 pts.   ( How do I earn points? )

Recent Activity by Kevin Beaver:

Cross-platform tools for security, monitoring last updated: 2008-11-29 21:57:44 GMT commented by: Kevin Beaver Debian Integration Linux administration Monitoring Network monitoring

Firewall last updated: 2008-11-29 21:54:49 GMT commented by: Kevin Beaver Firewall configuration Firewalls Unified Threat Management

What type of hardware needs for setup firewall last updated: 2008-11-29 21:52:54 GMT commented by: Kevin Beaver Firewall management Firewalls

Enabling Administrative privileges last updated: 2008-11-29 21:46:06 GMT commented by: Kevin Beaver Administrative privileges

Using switch or router ACL to block streaming traffic last updated: 2008-11-29 21:44:13 GMT commented by: Kevin Beaver ACL Cisco IOS Firewalls Internet NetScreen Network traffic management PIX Routers Security WAN Cure for Malware Antivirus 2009 last updated: 2008-11-29 21:38:16 GMT commented by: Kevin Beaver Antivirus malware

Active Dir. Web Based Password Reset Tool? last updated: 2008-11-03 16:38:28 GMT commented by: Kevin Beaver Compliance CRM DataCenter Desktop security Disaster Recovery IT architecture Microsoft Windows Microsoft Windows Server 2003 Microsoft Windows XP Networking Policies Risk management Security Security management Security Program Management Servers Vendors Windows client administration and maintenance Which security certifications are most accepted? last updated: 2008-10-31 15:18:38 GMT commented by: Kevin Beaver IT careers Security careers

How much access do you give users? last updated: 2008-10-31 14:26:07 GMT commented by: Kevin Beaver Access Rights Data Management User access

Segmenting question last updated: 2008-10-31 14:22:23 GMT answered by: Kevin Beaver Bandwidth Network performance Network Segmenting Network Topology Networking

Badges Earned:
Experience by Topic
[ rank ]
[ rank ]
[ rank ]
Microsoft Exchange
[ rank ]
Microsoft Windows
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
Windows Server
[ rank ]

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: