Ethical Hacking

By Don Jones on May 20, 2015

Ethical hacking is becoming a popular skill for IT operations personnel to have, and an important checkmark for many IT ops positions. By taking the "attacker's perspective," it becomes easier to see the weaknesses in your own environment, and to start shoring up those environments. The EC-Council's Certified Ethical Hacker (CEH) is, for many, their first milestone on a career in ethical hacking and security, and Pluralsight has created this series of courses to help guide you through the core material that an entry-level ethical hacker needs.

It's important to understand that this material is entry-level. It's meant to be the first set of courses you watch on this subject - certainly not the last. You'll gain an understanding of core concepts, common techniques, and the basic "lingo" of the field. After this starting point, you'll definitely want to continue your studies by pursuing deeper material, practical techniques, and real-world case study and experience.

There are a whole bunch of courses in this series, reinforcing the complexity of this field and the importance of getting a solid foundation under yourself before you dig deeper. Our courses are:


  • Ethical Hacking: Penetration Testing

We've lined up four authors to produce this enormous amount of content, all of whom have deep roots in the security and ethical hacking field: Dale Meredith, Troy Hunt, James Murray, and Jason Helmick. All of them thought back to remember what it was like to get started in this field, and to bring you the benefit of their years of experience since then. None of them were content to merely help you study for an exam, so while they keep the content firmly on the entry-level playing field, they also make sure you'll thoroughly understand these fundamentals.

Get our content first. In your inbox.

Loading form...

If this message remains, it may be due to cookies being disabled or to an ad blocker.


Don Jones

Don Jones' broad IT experience comes from 20 years in the business, with a strong focus on Microsoft server technologies. He's the author of more than 45 technology books, including titles on administration and software development, and writes monthly columns for the industry's leading periodicals. He's an in-demand speaker at technical conferences and symposia worldwide, and is widely recognized as one of the top trainers in the Microsoft sector.