Cybersecurity is one of the fastest-growing fields in IT, and having experienced practitioners write educational content is crucial. Ethan Marshall brings over 15 years of enterprise security experience to his Dargslan titles, covering everything from network security fundamentals to advanced penetration testing techniques.
From Network Engineer to Security Architect
Ethan's journey into cybersecurity wasn't planned. Starting as a network engineer in London, he discovered his passion for security during an incident response — a breach at his company that took weeks to contain. "That experience changed my career direction entirely," Ethan recalls. "I realized that building networks wasn't enough; someone had to defend them."
He transitioned into security operations, working his way from SOC analyst to security architect over the next decade. His roles spanned financial services, healthcare, and technology companies, each teaching him different aspects of enterprise security.
Experience That Shapes His Writing
Real Incident Response
Having responded to dozens of security incidents — from ransomware attacks to insider threats — Ethan brings authentic, battle-tested knowledge to his books. His incident response chapters aren't theoretical; they reflect actual procedures he's used under pressure.
Compliance Frameworks
Working in regulated industries taught Ethan the practical side of compliance. His books connect security practices to real-world requirements like GDPR, PCI-DSS, and ISO 27001.
Certification Expertise
Holding CISSP, OSCP, CEH, and multiple GIAC certifications, Ethan understands the certification landscape intimately. His Security+ Certification Guide has helped thousands of candidates pass on their first attempt.
Writing Philosophy
"Security isn't about tools — it's about thinking. I teach readers to think like attackers so they can defend like experts."
Ethan's books stand out for several reasons:
- Attack-defense pairing — Every defensive technique is paired with the attack it defends against
- Lab exercises — Hands-on labs that readers can set up in virtual environments
- Real-world scenarios — Case studies from actual security incidents (anonymized)
- Tool-agnostic principles — Focus on concepts that apply regardless of specific tools
Most Popular Titles
Cybersecurity Fundamentals
The comprehensive introduction to cybersecurity that covers the entire landscape — from network security to application security, from threat intelligence to incident response.
Ethical Hacking & Penetration Testing
A hands-on guide to offensive security techniques, written for both aspiring penetration testers and defensive security professionals who need to understand attacker methodologies.
Network Security Fundamentals
Focused on securing network infrastructure — firewalls, VPNs, IDS/IPS, network segmentation, and wireless security.
Current Projects
Ethan is currently developing content on cloud security architecture and zero-trust networking. "The perimeter is gone," he says. "Modern security must assume breach and verify everything. That's a fundamental shift in how we design secure systems."