bootstrap table


Kim Lindros, the chief ingredient at Gracie Ed, is a full-time content developer who writes about security, technology and business topics. Coming from a background in project management, she has run large multifunction teams to produce entire book series on security, along with elearning and classroom training courses. She has also written or contributed to numerous articles and books on Windows technologies and applications, IT certification and career development.

Kim regularly works with a cadre of highly talented writers, editors, graphic artists and other creative professionals to create a hand-picked team for projects that require extra resources.

The "Ed" in Gracie Ed was originally "Editorial." But things changed since our start in 2005, with education becoming an important part of our services.


Check out Kim's latest articles on Contently.


Hacker Techniques, Tools, and Incident Handling, 3e, Jones & Bartlett, 2018

Fundamentals of Information Systems Security, 3e, Jones & Bartlett, 2016

Security Strategies in Linux Platforms and Applications, 2e, Jones & Bartlett, 2016

Information Security Fundamentals, National CyberWatch Center, 2015

Linux Fundamentals, National CyberWatch Center, 2015

System Forensics, Investigation, and Response, 2e, Jones & Bartlett Learning, 2013

Workforce Training (10 three- and four-lesson courses), InfoSec Learning, 2012–2015

Skills Library (38 one-lesson courses), InfoSec Learning, 2013–2015

Wireless and Mobile Device Security, Jones & Bartlett Learning, 2014

Fundamentals of Communications and Networking, Jones & Bartlett Learning, 2014

Cyberwarfare: Information Operations in a Connected World, Jones & Bartlett Learning, 2014

CompTIA A+ I, II, and III courses, McGraw-Hill, 2012

Fundamentals of Information Security, Jones & Bartlett Learning, 2010

Network Security, Firewalls, and VPNs, Jones & Bartlett Learning, 2010


The Basics of API Management, GovLoop, 2018 [script]

The Roadmap to IT Modernization, GovLoop, 2017 [script]

Converged Infrastructures for Government, GovLoop, 2016 [script]

Hyperconvergence in Government, GovLoop, 2016 [script]

A variety of custom security awareness elearning courses for corporate clients, 2017-2018

Beginning, Intermediate, and Advanced Word

Beginning, Intermediate, Advanced, and Extreme Excel

Beginning, Intermediate, and Advanced Access

Beginning, Intermediate, and Advanced PowerPoint

Beginning, Intermediate, and Advanced Outlook

Digital Photography and Your Business

Take Your Small Business Online

Business Security Basics

Protect Your Data from Viruses, Spyware, and Spam

Data Disaster Recovery: A Practical Guide

Small Business Servers and Networking

Blade servers for SMBs


RedHat Cloud Strategy For Dummies, Wiley, 2018

Introduction to Computers and Application Software Custom, Jones & Bartlett Learning, 2015

Microsoft Excel 2013 Exam 77-420, Microsoft Official Academic Course, 2014

98-375 MTA HTML5 Application Development Fundamentals, Microsoft Official Academic Course, Wiley, 2012

PC Basics with Windows XP and Office 2007, Kaplan Edition, Jones & Bartlett Learning, 2012

IT Certification Success Exam Cram 2, Que Publishing, 2003

Guide to TCP/IP, 1st (2001) through 5th editions (2016), Course Technology (author team manager)

Exam Ref 70-482: Advanced Windows Store App Development Using HTML5 and JavaScript, O’Reilly, 2013

Exam Ref 70-484: Essentials of Developing Windows Store Apps Using C#, O’Reilly, 2013

Exam Ref 70-486: Developing ASP.NET MVC 4 Web Applications, O’Reilly, 2013

Exam Ref 70-485: Advanced Windows Store App Development Using C#, O’Reilly, 2013

HTML 4 for Dummies, 4th edition, Wiley,  (author team manager)

WEBINARS (thru Spiceworks)

SimpliVity and StorMagic (Lenovo)

Server Smackdown: Racks vs. Blades vs. Hyperconverged (AMD)

An Inside Look at Windows 10 (Microsoft UK)

Explain Like I’m 5: Hyperconvergence (Scale Computing)

The Case for Hybrid Laptops (That Can Take a Beating) (Panasonic)

How Anti-Virus Works During a Malware Attack (ESET)

Undead IT: Preventing E-Waste From Coming Back to Bite You (Iron Mountain UK)


Going Beyond Email: Using Microsoft Outlook to Call, and Fax (RingCentral)

The Secret to Easy Business Continuity (Carbonite)

How to Evaluate Cloud File Share Security (Citrix)

The Cybersecurity Survival Guide: Defending your company against cybercriminals (ESET)

Making Life Simpler for IT with a New Approach to Data Warehousing (Snowflake)

Top Tips to Protect Your Data Against Kaiju Attacks (and Other Disasters) (Seagate)