Michael Teske
PLURALSIGHT AUTHOR
Michael Teske is a principal security author with Pluralsight helping people build their skills toolkit. Michael has 25+ years of experience in the IT Ops/Cloud/Cybersecurity industry including 17 of those years as an IT instructor at a technical college, focusing on Microsoft server infrastructure, security and automation. Michael attained his MBA with an emphasis in Computer Information System Security several years ago. Michael still keeps up with the industry as an independent consultant in his spare time. Michael finds personal and professional growth by helping others discover the world of technology by sharing his passion as a tech enthusiast in all aspects. He understands the worker shortage in the cybersecurity space and continues to be an advocate for an industry that has provided a fulfilling career for himself.
Courses Authored
37
Topics Authored
IT Ops
Software Development
Security Professional
Total Ratings
345
Avg Course Ratings
4.5
Courses by Michael
-
CourseOpenPrinting CUPS Remote Code Execution Exploit Chain: What You Should KnowBeginner14mOct 03, 2024
-
CourseCVE-2024-43491 Windows Update Remote Code Execution: What You Should KnowBeginner7mOct 01, 2024
-
CourseWindows TCP/IP Remote Code Execution Vulnerability: What You Should KnowBeginner11mSep 06, 2024
-
CourseScripting for Security: WindowsBeginner40mAug 21, 2024
-
CourseSecurity Hot Takes: CrowdStrike Outage Post-mortemIntermediate31mAug 08, 2024
-
CourseSecurity Hot Takes: Aliquippa Water Authority BreachBeginner17mJul 31, 2024
-
CourseVolt Typhoon: Preventative ControlIntermediate12mJul 25, 2024
-
CourseSecurity Hot Takes: Mid-year Review 2024Beginner16mJul 23, 2024
-
CourseregreSSHion - an OpenSSH RCE Vulnerability: What You Should KnowBeginner13mJul 15, 2024
-
CourseVolt Typhoon: T1059.003 Command and Scripting Interpreter DetectionIntermediate10mJun 07, 2024
-
CourseVolt Typhoon: T1003.003 Credential Dumping DetectionIntermediate7mJun 07, 2024
-
CourseVolt Typhoon: T1070.003 Indicator Removal DetectionIntermediate8mJun 07, 2024
-
CoursePalo Alto PAN-OS RCE Vulnerability: What You Should KnowBeginner14mApr 17, 2024
-
CourseSecurity Hot Takes: Critical Infrastructure Advisory-Volt TyphoonBeginner17mMar 15, 2024
-
CourseConnectWise ScreenConnect Vulnerability: What You Should KnowBeginner18mFeb 27, 2024
-
CourseIvanti Connect Secure VPN Vulnerability: What You Should KnowBeginner11mJan 27, 2024
-
CourseIvanti Avalanche Vulnerability: What You Should KnowBeginner9mDec 28, 2023
-
CourseAtlassian RCE Vulnerabilities: What You Should KnowBeginner9mDec 15, 2023
-
CourseWindows Endpoint Security: LogsBeginner28mNov 29, 2023
-
CourseBuilding a Strong Cyber Security FoundationBeginner8mNov 03, 2023
-
CourseSecurity Hot Takes: ChatGPTBeginner14mOct 27, 2023
-
CourseTorchServe Vulnerabilities: What You Should KnowBeginner19mOct 05, 2023
-
CourseKubernetes on Windows Vulnerability: What You Should KnowBeginner12mSep 18, 2023
-
CourseVMWare ESXi Vulnerability: What You Should KnowBeginner4mAug 30, 2023
-
CourseWindows Endpoint Security: Scheduled TasksBeginner21mApr 28, 2023
-
CourseWindows Endpoint Security: NetworkingIntermediate21mJan 13, 2023
-
CourseEthical Hacking: Network and Perimeter HackingIntermediate1h 3mDec 06, 2022
-
CourseEthical Hacking: Cloud ComputingIntermediate48mNov 21, 2022
-
CourseMitigate Threats Using Microsoft SentinelIntermediate1h 50mMar 14, 2022
-
CourseMaintaining Deployment Security in Microsoft AzureAdvanced59mMay 20, 2020
-
CourseImplementing Microsoft Azure Subscription SecurityAdvanced1h 17mMay 20, 2020
-
CourseImplementing Host Security in Microsoft AzureIntermediate1h 45mMay 12, 2020
-
CourseRefactoring an App to Microsoft Azure AppsIntermediate1h 7mDec 11, 2019
-
CourseMigrating Workloads to Microsoft AzureIntermediate1h 20mOct 21, 2019
-
CourseAssessing and Planning Microsoft Azure MigrationIntermediate1h 36mSep 18, 2019
-
CourseSecuring Microsoft Azure NetworksBeginner1h 30mMay 28, 2019