
Troy Hunt
Pluralsight Author
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight—a leader in online training for technology and creative professionals. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable
explanations. This has led Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses for Pluralsight. Currently, Troy is heavily involved in Have I been pwned? (HIBP) a free service that aggregates data breaches and helps people establish potential impacts from malicious web activity. Troy blogs regularly about web security and is a frequent speaker at industry
conferences across the globe and throughout the media to discuss a wide range of technologies. Troy has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech. Aside from technology and security, Troy is an avid snowboarder, windsurfer and tennis player
Topics Authored
Software Development
Security Professional
IT Ops
Technology Leader
Business Professional
Courses Authored
47
Total Ratings
11058
Avg Course Ratings
4.6
Courses by Troy
-
No labs authored.
-
Course
The Role of Shadow IT and How to Bring it out of the DarknessRETIREDBeginner
39m
Jul 31, 2025
(56)Course
Modern Browser Security ReportsRETIREDBeginner
57m
Jun 27, 2025
(69)Course
Defending Against JavaScript Keylogger Attacks on Payment Card InformationRETIREDBeginner
1h 3m
Oct 11, 2024
(41)Course
Modernizing Your Websites with Azure Platform as a ServiceRETIREDIntermediate
5h 26m
Jul 31, 2024
(277)Course
Hack Your API FirstRETIREDIntermediate
4h 7m
Jun 26, 2024
(430)Course
ASP.NET Security Secrets RevealedRETIREDIntermediate
3h 24m
Jun 26, 2024
(483)Course
Secure Account Management FundamentalsRETIREDIntermediate
7h 1m
Jun 26, 2024
(214)Course
Play by Play: Azure Beyond WebsitesRETIREDBeginner
1h 16m
Jun 06, 2024
(55)Course
Play by Play: Care and Maintenance of Development VMsRETIREDIntermediate
49m
May 10, 2024
(42)Course
The State of GDPR: Common Questions and MisperceptionsRETIREDBeginner
1h 24m
Mar 19, 2024
(70)Course
Adapting to the New Normal: Embracing a Security Culture of Continual ChangeRETIREDBeginner
37m
Mar 19, 2024
(45)Course
Managing the Modern Software Dependency EcosystemRETIREDIntermediate
29m
Mar 19, 2024
(43)Course
Creating a Security-centric CultureRETIREDBeginner
52m
Mar 19, 2024
(129)Course
Play by Play: Bug Bounties for ResearchersRETIREDBeginner
36m
Mar 19, 2024
(21)Course
Play by Play: Bug Bounties for CompaniesRETIREDBeginner
48m
Mar 19, 2024
Course
AngularJS Security FundamentalsRETIREDIntermediate
2h 27m
Feb 16, 2024
(483)Course
Play by Play: JavaScript SecurityRETIREDBeginner
1h 13m
Feb 16, 2024
(53)Course
Play by Play: What You Need to Know About HTTPS TodayRETIREDBeginner
1h 11m
Feb 16, 2024
(85)Course
Play by Play: Website Security Review with Troy Hunt and Lars KlintRETIREDIntermediate
1h 42m
Feb 16, 2024
(363)Course
Play by Play: Modern Web Security PatternsRETIREDBeginner
1h 24m
Feb 16, 2024
(145)Course
What's New in the OWASP Top 10 for 2013RETIREDIntermediate
1h 34m
May 31, 2023
(253)Course
The Information Security Big PictureRETIREDBeginner
2h 17m
Feb 16, 2023
(252)Course
Play by Play: OWASP Top 10 2017RETIREDBeginner
1h 12m
Feb 16, 2023
(228)Course
What Every Developer Must Know About HTTPSRETIREDBeginner
3h 24m
Jan 13, 2023
(382)Course
OWASP Top 10 Web Application Security Risks for ASP.NETRETIREDIntermediate
8h 6m
Jan 13, 2023
(1090)Course
Introduction to Browser Security HeadersRETIREDIntermediate
3h 4m
Jan 13, 2023
(267)Course
Hack Yourself First: How to go on the Cyber-OffenseRETIREDIntermediate
9h 25m
Jan 13, 2023
(938)Course
Play by Play: Crafting a Brand for Growth and ProsperityRETIREDBeginner
1h 2m
Aug 10, 2022
(73)Course
Ethical Hacking: Social EngineeringRETIREDBeginner
4h 36m
Jul 15, 2022
(160)Course
Web Security and the OWASP Top 10: The Big PictureRETIREDIntermediate
2h 3m
Jun 16, 2022
(1407)Course
Ethical Hacking: Hacking Web ServersRETIREDBeginner
2h 25m
Feb 10, 2022
(273)Course
Ethical Hacking: Hacking Web ApplicationsRETIREDBeginner
4h 49m
Feb 10, 2022
(397)Course
Ethical Hacking: Denial of ServiceRETIREDBeginner
2h 49m
Feb 10, 2022
(129)Course
Ethical Hacking: Evading IDS, Firewalls, and HoneypotsRETIREDBeginner
3h
Feb 10, 2022
(77)Course
Ethical Hacking: SQL InjectionRETIREDBeginner
5h 25m
Feb 10, 2022
(487)Course
Ethical Hacking: Cloud ComputingRETIREDBeginner
2h 59m
Feb 10, 2022
(104)Course
Ethical Hacking: Session HijackingRETIREDBeginner
3h 27m
Feb 10, 2022
(279)Course
Play by Play: Ethical Hacking - Deconstructing the HackRETIREDBeginner
1h 29m
Jan 28, 2022
(58)Course
Play by Play: Exploring the Internet of VulnerabilitiesRETIREDBeginner
58m
Jan 28, 2022
(85)Course
Play by Play: Emerging Threats in IoTRETIREDBeginner
57m
Jan 26, 2022
(44)Course
Understanding the Shellshock Bash BugRETIREDIntermediate
33m
Jul 31, 2021
(211)Course
Getting Started with Cloudflare SecurityRETIREDBeginner
1h 38m
Jul 31, 2021
(134)Course
Play by Play: Social Engineering with Troy Hunt and Lars KlintRETIREDBeginner
1h 2m
Jul 31, 2021
(94)Course
Play by Play: Ethical Hacking with Troy HuntRETIREDBeginner
1h 2m
Jul 31, 2021
(406)Course
Play by Play: Modernizing Your Deployment Strategy with Octopus DeployRETIREDBeginner
58m
Apr 09, 2021
(68)Course
Global Impacts of GDPR: Executive BriefingRETIREDBeginner
10m
Apr 13, 2020
(26)Course
Global Behaviors Post-GDPR: Executive BriefingRETIREDBeginner
27m
Apr 13, 2020
(22)