Kevin Beaver's Profile:

Name:Kevin Beaver
Location:Atlanta, GA
Job Title:IT Security Consultant
Bio: I am an information security consultant with Principle Logic, LLC ( I focus my work on independent security assessments revolving around compliance and minimizing business risks. I'm also a professional speaker and author of over 600 articles and 11 books including Hacking For Dummies. I'm also the creator/producer of Security On Wheels providing security learning for IT professionals on the go (
Area of Expertise:Information Security, Compliance, BYOD, Cloud Computing, IT and Security Careers
Knowledge Points:21,250 pts.   ( How do I earn points? )

Recent Activity by Kevin Beaver:

What certification do i go for? last updated: 2009-08-31 15:50:37 GMT commented by: Kevin Beaver Career Development Microsoft certifications Microsoft Windows Server 2003

Prefered book for CCNP Switching last updated: 2009-08-31 15:48:23 GMT commented by: Kevin Beaver CCNP IT Books Networking Networking certifications

Is an associates in Computer Networking + CCNA cert going to get me a job? last updated: 2009-08-28 20:48:22 GMT commented by: Kevin Beaver CCIE CCNA CCNP CompTIA computer networking Network+ Networking certifications VoIP

ip addressing and subnetting… last updated: 2009-08-28 20:43:17 GMT commented by: Kevin Beaver Calculating and understanding subnetting IP address Subnets

Network infrastructure maps last updated: 2009-08-28 20:37:09 GMT commented by: Kevin Beaver Network infrastructure Network Topology Network troubleshooting

Network Diagram and Documentation last updated: 2009-08-28 20:33:49 GMT commented by: Kevin Beaver Network Diagram Network documentation

Developer to Tester Ratio last updated: 2009-08-28 20:32:03 GMT answered by: Kevin Beaver Developers

Can a remote access install LoJack to recover a stolen laptop? last updated: 2009-08-28 20:29:35 GMT commented by: Kevin Beaver Information security Laptop Security Network security Networking Remote access

What analysts firms do you like? last updated: 2009-08-28 20:25:31 GMT answered by: Kevin Beaver analysts CIO Strategic Planning

How do you monitor your virtual machines for security breaches? last updated: 2009-08-28 20:24:32 GMT commented by: Kevin Beaver Virtual Machine Security Virtual Machines VM

Badges Earned:
Experience by Topic
[ rank ]
[ rank ]
[ rank ]
Microsoft Windows
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
[ rank ]
Windows Server
[ rank ]
Microsoft Exchange
[ rank ]

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: