Information & Cyber Security

With a new hack or data breach happening almost daily, information and cyber security have never been more important to companies, and to security professionals, IT professionals and developers. With Pluralsight’s cyber security training, your team will learn the tools and best practices that protect sensitive information, maintain business-critical systems and keep you in compliance. Courses cover everything from the fundamentals of security and security auditing to the latest in digital forensics and malware analysis techniques.

Courses
One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use...
A typical application these days consists of (at least) a client application and an API. In this practical, demo-driven course, you'll learn how to work with authorization and authentication using today's widely-used standards: OAuth2 and OpenID Connect. The focus of this course is security,...
This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the...
All the penetration testing in the world won't amount to much if the software and routing configurations used in your infrastructure are buggy. But scanning systems for the tens of thousands of known vulnerabilities - and the dozens more that surface each week - would be simply...
There is a reason that criminals steal payment card data. It is because they can turn the stolen data into money. In this course, Payment Card Security, Processing, and the PCI Standards, you'll discover how a payment card transaction gets from the store to your statement and in the process...
Bugs in software costs the economy billions of dollars each year. In this course, Security for Hackers and Developers: Fuzzing, you are going to turn the tide by learning how to find and fix critical bugs quicker. Hackers have long used a technique called fuzzing to find bugs and software...
Today's computing devices are always connected to a network. While increasing productivity, this also increases the risk of malicious activity. This course, Network Fundamentals and Protocols, begins by introducing you to network topologies and network equipment. Subsequently, you will learn...
Web applications today are being hacked with alarming regularity by hacktivists, online criminals and nation states. Very frequently, it is the same prevalent security risks being exploited which is why the Open Web Application Security Project (OWASP) developed their list of Top 10 Most...
Security on the web is becoming an increasingly important topic for organisations to grasp. Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and...
While many organizations are focusing their resources on implementing internal security controls, few turn their attention to the open source intelligence (OSINT) that attackers exploit in an effort to circumvent those controls. In this course, Performing OSINT Gathering on Corporate Targets,...