Information & Cyber Security

With a new hack or data breach happening almost daily, information and cyber security have never been more important to companies, and to security professionals, IT professionals and developers. With Pluralsight’s cyber security training, your team will learn the tools and best practices that protect sensitive information, maintain business-critical systems and keep you in compliance. Courses cover everything from the fundamentals of security and security auditing to the latest in digital forensics and malware analysis techniques.

Courses
One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use...
There is a reason that criminals steal payment card data. It is because they can turn the stolen data into money. In this course, Payment Card Security, Processing, and the PCI Standards, you'll discover how a payment card transaction gets from the store to your statement and in the process...
Bugs in software costs the economy billions of dollars each year. In this course, Security for Hackers and Developers: Fuzzing, you are going to turn the tide by learning how to find and fix critical bugs quicker. Hackers have long used a technique called fuzzing to find bugs and software...
All the penetration testing in the world won't amount to much if the software and routing configurations used in your infrastructure are buggy. But scanning systems for the tens of thousands of known vulnerabilities - and the dozens more that surface each week - would be simply...
This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the...
A typical application these days consists of (at least) a client application and an API. In this practical, demo-driven course, you'll learn how to work with authorization and authentication using today's widely-used standards: OAuth2 and OpenID Connect. The focus of this course is security,...
Today's computing devices are always connected to a network. While increasing productivity, this also increases the risk of malicious activity. This course, Network Fundamentals and Protocols, begins by introducing you to network topologies and network equipment. Subsequently, you will learn...
While many organizations are focusing their resources on implementing internal security controls, few turn their attention to the open source intelligence (OSINT) that attackers exploit in an effort to circumvent those controls. In this course, Performing OSINT Gathering on Corporate Targets,...
With so much of technology today dependent on cloud computing, it is important to ensure that your business has cloud security in mind. In this course, you will be learning about the basics of cloud computing, security best practices for clouds, and other cloud security considerations that will...
When engaged in a penetration test for a client, after you successfully breach the perimeter, you may find yourself asking 'What next?' What are the steps that you need to perform before you can close the penetration test? In this course, Post Exploitation: Performing Infrastructure Analysis,...