Information & Cyber Security

With a new hack or data breach happening almost daily, information and cyber security have never been more important to companies, and to security professionals, IT professionals and developers. With Pluralsight’s cyber security training, your team will learn the tools and best practices that protect sensitive information, maintain business-critical systems and keep you in compliance. Courses cover everything from the fundamentals of security and security auditing to the latest in digital forensics and malware analysis techniques.

Courses
Newest Courses
This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the...
There is a reason that criminals steal payment card data. It is because they can turn the stolen data into money. In this course, Payment Card Security, Processing, and the PCI Standards, you'll discover how a payment card transaction gets from the store to your statement and in the process...
One of the critical things for anyone who wants to learn either how to defend or even attack a network, is the ability to find and analyze system or network vulnerabilities. In this course, Conducting Network Vulnerability Analysis, you will learn to how to follow a systematic process and use...
Bugs in software costs the economy billions of dollars each year. In this course, Security for Hackers and Developers: Fuzzing, you are going to turn the tide by learning how to find and fix critical bugs quicker. Hackers have long used a technique called fuzzing to find bugs and software...
A typical application these days consists of (at least) a client application and an API. In this practical, demo-driven course, you'll learn how to work with authorization and authentication using today's widely-used standards: OAuth2 and OpenID Connect. The focus of this course is security,...
All the penetration testing in the world won't amount to much if the software and routing configurations used in your infrastructure are buggy. But scanning systems for the tens of thousands of known vulnerabilities - and the dozens more that surface each week - would be simply...
Security on the web is becoming an increasingly important topic for organisations to grasp. Recent years have seen the emergence of the hacktivist movement, the increasing sophistication of online career criminals and now the very real threat posed by nation states compromising personal and...
Access controls lie at the very heart of an information security program. After all, information security is all about access control - who can get on our systems, networks, and our buildings and what can they do when they gain access? In this course, CISSP® - Identity and Access Management,...
The main feature focus of ASP.NET Web API v2 was security. There's a brand new authentication system and support for popular authentication methods, like OAuth2 tokens, that is already built-in. Additionally, it is now much easier to use Web APIs from JavaScript clients and the new security...
Today's computing devices are always connected to a network. While increasing productivity, this also increases the risk of malicious activity. This course, Network Fundamentals and Protocols, begins by introducing you to network topologies and network equipment. Subsequently, you will learn...