• How do I create a repeatable patch testing methodology?
  • Troubleshooting a VPN that won't connect over ADSL
  • Creating security policies for an enterprise customer
  • Patch management system post-deployment considerations for VARs and consultants
  • Defining the scope of a security assessment
  • Implementing third-party patches on customer systems
  • IPsec vs. SSL VPNs: Choosing the best virtual private network for your customer
  • How can I connect several locations that use different protocols?
  • Connecting sites with dynamic IP addresses across the Internet
  • The best backup software
  • The cost of iSCSI storage systems and Fibre Channel arrays
  • Defining spyware
  • WAFS, WADS, and WAAS
  • Alternative storage vendors
  • The truth about tape
  • SMB backup and recovery
  • Competitive analysis of new products
  • Why major vendors change value-added reseller (VAR) programs
  • Protecting customers from HTML spam
  • The value of product certification for VARs and consultants
  • Recommended CISSP books
  • How to secure PCs against phishing attacks
  • Best practices for taking the CISSP exam
  • Choosing which services to sell
  • Convincing a customer to purchase from me rather than go direct
  • Specialize in one or generalize in many products