Hans Study. Independent network and security consultant and advisor.
I am a sole practitioner based in Ontario, Canada. CISSP credentialed. My work is boutique:
enterprise networks, OT and ICS, controls and security systems, and the infrastructure underneath
them. I specialize in hardening and tuning systems where the stakes are high and the margin for
error is small. Microsoft Windows, Cisco, Aruba, and Genetec Security Center are my primary
stacks. Federal, defence, public safety, critical infrastructure, and enterprise. Canada and
the United States.
Controls, security, and critical infrastructure. Small portfolio, deep engagement, no time spent juggling a hundred unrelated accounts. The work fits where the stakes are high and the cost of getting it wrong is real.
Design networks and physical security systems
Greenfield and brownfield. Topology, segmentation, routing, wireless, and security architecture. Camera, access control, and intercom systems specified for the environment rather than copied from a previous job.
Solve complex integration and technical problems
The systems that should work but do not. Cross-vendor integration issues. Performance and reliability problems that nobody else has been able to nail down. Pre-RFP technical review and owner representative work during deployment.
Harden and tune infrastructure and organizations
Windows server and workstation baselines. Switch and firewall hardening. Genetec deployments where Defender exclusions and service accounts have to be exactly right. Tuning for VMS and access control workloads under audit.
Mentor practitioners and integrators
Free, time-permitting. Junior practitioners moving into network or security work, integrator teams bidding their first complex project, and IT generalists handed a Genetec environment they did not design. Asynchronous over email when that fits, scheduled calls when the question is bigger.
Primary stacks
Microsoft Windows (server and workstation)
Hardening, baselines, Active Directory design and tiering, Defender tuning for VMS and access control workloads, Group Policy at scale.
Cisco
IOS, Catalyst 9000 series, ISE. Routing, switching, and the security tracks taught at the post-secondary level.
Aruba
AOS-CX and CX switching. ClearPass on the policy side. Field-experienced in deployments where Aruba is on the bill of materials.
Genetec Security Center
Architecture, deployment, troubleshooting. Directory, Archiver, Synergis, ConfigTool, Security Desk. The reference platform for VMS work on this site.
Adjacent stacks
Axis, Bosch, Milestone, Avigilon, C-CURE 9000, Fortinet, Palo Alto, Juniper EX, and Alcatel-Lucent OmniSwitch. Selected when they are the right fit for the deployment.
How this started
I started the way a lot of people in this field do. Fixing computers for friends and family in the early 2000s. A part-time job at a local computer shop installing small business networks and CCTV systems. By 2010, that had grown into my own IT firm.
What followed over the next fifteen years is where the depth comes from.
Where the depth comes from
I have spent my career working across public sector, defence, public safety, and critical infrastructure environments, designing and integrating the technology those organizations depend on. That includes years working directly in the federal space on mission-critical networks where failure was not an option and operational continuity was a daily responsibility, not a theoretical goal.
The consistent thread has been curiosity. Taking systems apart to understand how they actually work, pushing security controls to their limits, and applying what that reveals to stronger designs.
That curiosity also led to teaching at the post-secondary level: Cisco CCNA, Introductory and Advanced Networking, Information Security, and Microsoft Windows Server and Workstation. Hundreds of students went on to careers in IT and networking. Teaching is where you find out how well you actually understand something. You cannot fake it when someone asks you to explain why, not just how.
Credentials, training, and platform experience
My active credential is CISSP (Certified Information Systems Security Professional), maintained through ISC2. It is the one that carries weight in government, defence, and regulated environments where the credential is part of the contract requirement.
Beyond that, my work draws on training and field experience across a wider set of disciplines than a single credential reflects.
Networking platforms
Cisco: trained and field-experienced across Cisco's routing, switching, and security tracks. Taught CCNA at the post-secondary level for multiple years to hundreds of students. Field experience across Catalyst, Nexus, Meraki, ASA, and FTD platforms.
Aruba (HPE): trained on and field-experienced with Aruba CX, Aruba OS, and ClearPass.
Alcatel-Lucent Enterprise: field-experienced with the OmniSwitch family in security network deployments.
Juniper: field-experienced with the EX series for security and enterprise environments.
Palo Alto Networks and Fortinet: field-experienced on next-generation firewall design and operation.
Wireless
Ekahau training for predictive site survey design, validation survey, and troubleshooting on enterprise Wi-Fi deployments.
CWNP coursework on the wireless administration and design tracks.
Field experience across Cisco, Aruba, and Meraki wireless platforms in airports, transit, government, and enterprise environments.
Physical security platforms
Genetec: trained and field-experienced across Security Center, Omnicast, Synergis, and AutoVu.
Software House C-CURE 9000, Milestone XProtect, Avigilon Control Center, Axis Communications, and Axon Body and Fleet.
Microsoft
Multiple Microsoft training programs across Windows Server, Active Directory, and the security-focused tracks.
Field experience hardening Windows Server 2016, 2019, 2022, and 2025 in production environments.
Forensics
Trained in mobile device forensics and computer forensics.
Field experience handling evidence networks and isolated investigative environments for law enforcement and corporate investigations.
A note on certs versus practice
I took the courses, sat the exams, and did the work. Maintaining every credential annually has not been the priority. The priority has been doing the work, teaching it, and writing about it. The credentials required for specific contracts and engagements stay current. Others lapse and get renewed when a project demands it.
The teaching credential is the one worth highlighting separately. I taught Cisco CCNA, Introductory and Advanced Networking, Information Security, and Microsoft Windows Server and Workstation at the post-secondary level for multiple years. Hundreds of students went through those programs. That is a different kind of credential than a paper cert. It is the credential of having to explain the material to people learning it for the first time, every term, in a way they can actually use.
Compliance frameworks I work in
I advise organizations operating under:
CMMC 2.0US Department of Defense
CPCSCCanadian Programme for Cyber Security Certification
ISO/IEC 27001Information security management
NIST SP 800-171Controlled unclassified information
NIST SP 800-53Federal information systems
NERC CIPCritical infrastructure protection
GO-ITSGovernment of Ontario IT Standards
ITSG-33Government of Canada
TIA-942Data centre infrastructure
Compliance work is not about applying frameworks as written. It is about helping organizations understand what each framework actually requires, given the technical and organizational constraints they are already operating under.
What I do, in plain terms
I work independently. No equipment sales. No reseller relationships. No vendor partner programs. No margin on hardware or licensing. The recommendation reflects what the environment requires. That is the only thing it reflects.
Enterprise and control network architecture
Industrial and OT network design
Genetec Security Center, Software House C-CURE, Axis, Milestone, Avigilon, Axon
ICAT (Integrated Communications, Access, and Technology) design
Data centre and structured cabling advisory
CMMC, CPCSC, NIST 800-171, ISO 27001 compliance support
Owner's representative and project advisory
Mentorship and technical guidance for security integrators and IT teams
Speaking and writing
I have presented on cybersecurity resilience and infrastructure security at industry conferences and events.
The Study Byt3s blog at hans.study/study-byt3s/ is my working library of technical articles on switch hardening, Windows server hardening, Genetec deployment, OT and ICS security, and integration practices for security networks. The StudyByt3s podcast covers the work that sits between IT, physical security, and OT, in the format of a conversation rather than a tips-and-tricks show.
Where I work
Based in Ontario, Canada. Engagements span Canada and the United States. Federal, provincial, municipal, and private sector. Virtual and on-site.
Connect
For project work and general inquiries, send a note via the contact page or directly to contact@hans.study. For book questions, review copies, errata, or bulk orders, use book@hans.study. For media, podcast, and speaking inquiries, reach out at media@hans.study. Mentorship is free and time-permitting; the form on the mentorship page is the right starting point for that.