Browse  ›  Information & cyber security
Icon

Grow your Information & cyber security skills

Empower your entire org to safeguard against rising security threats.

Start a FREE 10-day trial
Learn on your own timelineLearn on your own timeline
Master your craftMaster your craft
Keep up with emerging trendsKeep up with emerging trends

Face security scares head on

Learn the latest from experts with real-world experience.

Top Information & cyber security paths

Top Information & cyber security courses

Designing and Implementing Security Policies
Course
Designing and Implementing Security Policies
Daniel Lachance
Beginner
2h 6m
OWASP Top 10 Web Application Security Risks for ASP.NET
Course
OWASP Top 10 Web Application Security Risks for ASP.NET
Troy Hunt
Intermediate
8h 6m
Security Management: The Big Picture
Course
Security Management: The Big Picture
Bobby Rogers
Beginner
2h 59m
Identity and Access Management for CompTIA Security+
Course
Identity and Access Management for CompTIA Security+
Christopher Rees
Beginner
1h 39m
Security for Hackers and Developers: Reverse Engineering
Course
Security for Hackers and Developers: Reverse Engineering
Dr. Jared DeMott
Intermediate
2h 3m
Play by Play: Website Security Review with Troy Hunt and Lars Klint
Course
Play by Play: Website Security Review with Troy Hunt and Lars Klint
Troy Hunt
Intermediate
1h 42m
Play by Play: Modern Web Security Patterns
Course
Play by Play: Modern Web Security Patterns
Lars Klint
Beginner
1h 24m
Internet of Things (IoT) Security: The Big Picture
Course
Internet of Things (IoT) Security: The Big Picture
Cristian Pascariu
Beginner
1h 33m
Security Engineering
Course
Security Engineering
Kevin Henry
Intermediate
53m
Security Event Triage: Operationalizing Security Analysis
Course
Security Event Triage: Operationalizing Security Analysis
Aaron Rosenmund
Beginner
54m
Network Security Monitoring (NSM) with Security Onion
Course
Network Security Monitoring (NSM) with Security Onion
Guillaume Ross
Beginner
2h 19m
Security Architecture
Course
Security Architecture
Kevin Henry
Intermediate
1h 27m
Security Operations
Course
Security Operations
Kevin Henry
Intermediate
2h 19m
Physical Security
Course
Physical Security
Kevin Henry
Intermediate
1h 19m
Information Security Manager: Information Security Program Management
Course
Information Security Manager: Information Security Program Management
Bobby Rogers
Intermediate
4h 11m
Running the Business of Information Security
Course
Running the Business of Information Security
Bobby Rogers
Advanced
1h 58m
What's New in the OWASP Top 10 for 2013
Course
What's New in the OWASP Top 10 for 2013
Troy Hunt
Intermediate
1h 34m
Ethical Hacking: Cloud Computing
Course
Ethical Hacking: Cloud Computing
Troy Hunt
Beginner
2h 58m
Getting Started with Nmap
Course
Getting Started with Nmap
Matt Glass
Beginner
1h 25m
Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
Course
Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
Mike Woolard
Intermediate
1h 46m
Web App Hacking: Hacking Authentication
Course
Web App Hacking: Hacking Authentication
Dawid Czagan
Beginner
1h 30s
Introduction to Penetration Testing Using Metasploit
Course
Introduction to Penetration Testing Using Metasploit
Keith Watson
Beginner
3h 37m
GDPR: The Big Picture
Course
GDPR: The Big Picture
John Elliott
Beginner
3h 6m
Reverse Engineering Malware with Ghidra
Course
Reverse Engineering Malware with Ghidra
Josh Stroschein
Intermediate
1h 34m
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Course
Operationalizing Cyber Threat Intel: Pivoting & Hunting
Ryan Chapman
Intermediate
2h 34m
Ethical Hacking: Buffer Overflow
Course
Ethical Hacking: Buffer Overflow
James D. Murray
Beginner
4h 2m
USB Forensics: Fundamentals
Course
USB Forensics: Fundamentals
Philip Polstra
Beginner
2h 9m
Providing Secure Cloud Applications
Course
Providing Secure Cloud Applications
Kevin Jackson
Intermediate
2h 16m
Software Development Security
Course
Software Development Security
Kevin Henry
Intermediate
4h 36s
Setting Up a Malware Analysis Lab
Course
Setting Up a Malware Analysis Lab
Aaron Rosenmund
Intermediate
1h 25m

The Technology Skills Platform

Pluralsight IQ

Pluralsight IQ

Validate skill levels with assessments that take 5 minutes or less.

Channels

Channels

Curate and share Pluralsight content to reach your learning goals faster.

Hands-on learning

Hands-on learning

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.

Thousands of courses

Thousands of courses

Keep up with the pace of change with expert-led, in-depth courses.

WHAT IS PLURALSIGHT?

Your career is defined by what you know and how well you know it. 

With our platform, you can benchmark and prove your knowledge, keep up with emerging trends and build in-demand skills in areas like DevOps, machine learning, cloud, security and infrastructure. 

What our customers are saying

Join
the Tech skills
revolution

Annual

Save {{annual-percent-savings}}%
$299.00
per year
Courses, paths and skill assessments for individuals.

Premium

$449.00
per year
Access to exams, projects and interactive courses.
Start with premium
Hide all features

Future proof
your skills