Ethical Hacking

By Don Jones on May 20, 2015

Ethical hacking is becoming a popular skill for IT operations personnel to have, and an important checkmark for many IT ops positions. By taking the "attacker's perspective," it becomes easier to see the weaknesses in your own environment, and to start shoring up those environments. The EC-Council's Certified Ethical Hacker (CEH) is, for many, their first milestone on a career in ethical hacking and security, and Pluralsight has created this series of courses to help guide you through the core material that an entry-level ethical hacker needs.

It's important to understand that this material is entry-level. It's meant to be the first set of courses you watch on this subject - certainly not the last. You'll gain an understanding of core concepts, common techniques, and the basic "lingo" of the field. After this starting point, you'll definitely want to continue your studies by pursuing deeper material, practical techniques, and real-world case study and experience.

There are a whole bunch of courses in this series, reinforcing the complexity of this field and the importance of getting a solid foundation under yourself before you dig deeper. Our courses are:

 

 
  • Ethical Hacking: Penetration Testing
 

We've lined up four authors to produce this enormous amount of content, all of whom have deep roots in the security and ethical hacking field: Dale Meredith, Troy Hunt, James Murray, and Jason Helmick. All of them thought back to remember what it was like to get started in this field, and to bring you the benefit of their years of experience since then. None of them were content to merely help you study for an exam, so while they keep the content firmly on the entry-level playing field, they also make sure you'll thoroughly understand these fundamentals.

Get our content first. In your inbox.

Contributor

Don Jones

is a multiple-year recipient of Microsoft’s MVP Award, and is Curriculum Director for IT Ops Content at Pluralsight. Don has worked with Microsoft business technologies for more than two decades. Follow him on Twitter @concentratedDon.