Dregier - CISSP, CEH, CISM, CHFI & More Trainer - Towson, MD, USA

Leo Dregier

Towson, MD, USA


Computer Security, Social Networking, Growing Businesses with Web 2.0


CISSP, CEH, CISM, CHFI & More Trainer

  • Full time
  • Part time
  • One time
  • Contract
  • Temp


Feel free to take advantage of all of my years as a Computer Security Trainer. I'm put all my notes in an online classroom for all to enjoy. Visit my Website!

Work History

CEO / Problem Solver / Trainer


January 2010 - January 2010

CISSP Training & Development. I love to get inside the head of the CISSP student! I love watching the Light Bulb turn on while they finally have a paradigm shift and realize how easy and fun CISSP can be to learn. Visit our website at www.TheCodeOfLearning.com

Trainer | Mentor

The Profit Cycle

November 2009 - November 2009

Twitter | LinkedIn | Facebook | Real Estate Trainer focusing on Short Sales, Lease Options, Business Development and Investing. We help professionals use technology to develop their business by working together. We train professionals on foreclosure, lease options, bankruptcy, loss mitigation, investing and investments.

One of our most popular classes for short sale is our Loss Mitigation Class. This is where we show you how to effecively work with Loss Mitigators to get Short Sale Approvals! Commercial Short Sale Training and Short Sale Process Improvement

CISSP, CEH, Security+ Trainer

Large Training Company

January 2009 - January 2009

CEH, CISSP, Security+, CISM, CISA, EC-Council Trainer

Chief Executive Officer


From October 2008

Chief Executive Officer


From October 2008

Sr. Solutions Provider / Acquisition and Private Lending Director


February 2006 - February 2006

We solve real estate problems and turn financially distressed homeowners into responsible borrowers.

We specialize in Private Money Investments, Lease Options, Foreclosure, Short Sales, Payment Modifications and Wholesaling.

Visit us at www.Sell2DayBuy2Day.com for a complete tour of what we do! For more information on Short Sales, Short Sale Expertise, visit www.TheProfitCycle.com

Computer Security Incident Response Team Lead

Lockheed Martin

December 2005 - October 2008

Serve as the CSIRC Team Lead responsible for the development of the incident response (IR) phases and establishing an IR capability. Reactive Services include alerts and warnings, forensic evidence collection, packet analysis, incident analysis, evidence tracking in addition to incident response coordination, support, vulnerability handling and artifact analysis. Proactive services include announcements, System Hardening of Windows and Open Source platforms, technology watch, security information dissemination, audits, infrastructure review, and implementation of best practices, scanning, development of security tools, management of IDS, all reporting and policy and procedure development.

Computer Security Incident Handler

Internal Revenue Service

February 2005 - December 2005

Manage 150 Network Intrusion Detection Sensors (NIDS) and several hundred Host Intrusion Detection Sensors (HIDS) through ArcSight Manager and Internet Security Systems Scanners data mining tools for graphical analysis. Perform Snort IDS rule sets along with firewall analysis and log management. Perform cyber incident management through triage. Cyber incident consists of malicious code, probe scans, phishing scams, spam filtering (WebSense), and NetCache analysis. Daily responsibilities consist of management of computer security incident response center directly related to NIST 800-3. Participated in information sharing with several agencies based on any number of well known computer security information sources to include NSA, Department of Treasury, Tax Inspector General for Tax Administration (TIGTA), NetSec and many others. Extensive hands on implementation of Firewalls, IDS’s, Proxy Servers, Routing Access Control Lists and perimeter defense technologies.

Operational Security Officer

U.S. Department of Labor

July 2003 - April 2004

Primary responsibility included the implementation, management and effectiveness of Polices, Procedures, and Guidelines for all Operational and Research & Development strategies. This included server hardening, firewall ACL review, Vulnerability Scanning & Penetration testing with Retina and ISS. Group Policy Review, Intrusion Detection Management, Password effectiveness, Backup Strategy, Virus Mitigation management, Incident Response Help Desk Center and Certification and Accreditation of systems to federal regulations and legislations. Coordinated with Senior Management and Contracting Managers.

Network Security Analyst 1

U.S. Department of State

July 2002 - June 2003

Daily responsibilities include software and hot fix upgrades, monitoring with analysis to baseline performance measures via NetIQ for a 77,000-user network. Resolve trouble tickets. Address security needs for Intranet and Extranet. Assist with the migration from a hybrid Exchange 5.5 and FADS (Foreign Affairs Directory Service) to a native mode Active Directory and Exchange 2000 infrastructure. Provide recommendations based on the NIST and DS standards. Present MCSE level material. Documentation of change requests, network & security policy changes; in addition to presenting areas of concern to upper management.

Computer Instructor

Advanced Computer Technology Training

November 1999 - August 2000

Tested hardware and software for an enterprise networking infrastructure; Used automated methods of install to include Norton Ghost, unattended and imaging IntelliMirror technology; Built servers and clients; Installed and upgraded applications which included but were not limited to Office, Adobe Photoshop Suite, and Visio; Installed and Configured VPN polices with Routing and Remote Access Service (RAS & RRAS) for 9.x & NT clients; RIP, IGRP, OSPF, Static, Dynamic and Default routes on several Cisco Platforms.

Chief Executive Officer


From July 1995

Sr. Engineer

The Security Matrix

January 1995 - January 1995

Training, Consulting, Certification & More... LPIC, CISSP, Linux, CentOS, Intrusion Detection Systems / Deployment, Linux+, LPI


In 2013 I will create 10 Millionaires! Will you be one?

My project for 2013 is to create 10 Millionaires. Think this is a lot? Actually its not, Money is being printed and inflated. You better start to think in terms of Millions or Billions because Thousands will classify you as poor. Decide Now! Which Group do you want to be in?

Have you taken the ISSEP Course?

This is by far the hardest ISC2 certification out there! Its nice to know that we were the first ones to complete the curriculum and certification resources. Try to find material or a class for this, I dare you!

Major Updates to TheCodeOfLearning.com

We have added thousands of hours of content to www.TheCodeOfLearning.com/Classroom Get Certified and Get Ahead Today!

Qualifications & Certifications


Capella University

National Defense University

Computer Science

Capella University

Information Assurance

National Defense University

National Defense University, Washington D.C.

Capella University

Johns Hopkins University


Essex Community College

General Engineering Studies

Essex Community College

Joppatowne High School


The Johns Hopkins University


The Johns Hopkins University

Joppatowne Rules

Skillpages has been acquired by Bark.com!

Bark.com is pioneering the way people find local services. Skillpages is the world’s premier directory of service providers.

Find out more

Supported Countries
Choose your country