Browse  ›  Information & cyber security  ›  Secure by Design
Icon

Grow your Secure by Design skills

Learn how to build from the ground up with security in mind. Influence your IT security policy early on with effective, secure design from the get-go. Follow along as our expert authors walk you through secure by design best practices that enable you to build with security at the forefront.

Start a FREE 10-day trial
Learn on your own timelineLearn on your own timeline
Master your craftMaster your craft
Keep up with emerging trendsKeep up with emerging trends

Level up your Secure by Design skills

Learn the latest from experts with real-world experience.

Top Secure by Design paths

Top Secure by Design courses

Secure Coding: Preventing Sensitive Data Exposure
Course
Secure Coding: Preventing Sensitive Data Exposure
Timothy Ghanim
Intermediate
1h 23m
Secure Coding: Preventing Insecure Deserialization
Course
Secure Coding: Preventing Insecure Deserialization
Peter Mosmans
Intermediate
1h 2m
Modern C++ Secure Coding Practices: Const Correctness
Course
Modern C++ Secure Coding Practices: Const Correctness
Nick Cano
Intermediate
42m
Secure Coding: Preventing Broken Access Control
Course
Secure Coding: Preventing Broken Access Control
Gavin Johnson-Lynn
Intermediate
1h 57m
Secure Coding: Using Components with Known Vulnerabilities
Course
Secure Coding: Using Components with Known Vulnerabilities
Peter Mosmans
Intermediate
1h 13m
Secure Coding: Preventing Insufficient Logging and Monitoring
Course
Secure Coding: Preventing Insufficient Logging and Monitoring
Peter Mosmans
Intermediate
1h 23m
Secure Coding: Identifying and Mitigating XML External Entity (XXE) Vulnerabilities
Course
Secure Coding: Identifying and Mitigating XML External Entity (XXE) Vulnerabilities
Peter Mosmans
Intermediate
59m
Software Development Security
Course
Software Development Security
Kevin Henry
Intermediate
4h 36s
CSSLP®: Secure Software Implementation and Programming
Course
CSSLP®: Secure Software Implementation and Programming
Kevin Henry
Intermediate
2h 17m
Security Architecture and Design: The Big Picture
Course
Security Architecture and Design: The Big Picture
Christopher Rees
Beginner
4h 24m
Internet of Things (IoT) Security: The Big Picture
Course
Internet of Things (IoT) Security: The Big Picture
Cristian Pascariu
Beginner
1h 33m
Security for Hackers and Developers: Code Auditing
Course
Security for Hackers and Developers: Code Auditing
Dr. Jared DeMott
Intermediate
2h 2m
Securing Java Web Applications
Course
Securing Java Web Applications
Josh Cummings
Intermediate
2h 24m
Architecture and Design for CompTIA Security+
Course
Architecture and Design for CompTIA Security+
Christopher Rees
Beginner
4h 14m
Ethical Hacking: Buffer Overflow
Course
Ethical Hacking: Buffer Overflow
James D. Murray
Beginner
4h 2m
Getting Started Analyzing Malware Infections
Course
Getting Started Analyzing Malware Infections
Cristian Pascariu
Beginner
2h 17m
Understanding the Java Virtual Machine: Security
Course
Understanding the Java Virtual Machine: Security
Kevin Jones
Intermediate
1h 27m
Getting Started with Reverse Engineering
Course
Getting Started with Reverse Engineering
Josh Stroschein
Beginner
3h 40m
Secure Software Development
Course
Secure Software Development
Dale Meredith
Beginner
3h 14m
Security for Hackers and Developers: Overview
Course
Security for Hackers and Developers: Overview
Dr. Jared DeMott
Beginner
1h 9m
MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do
Course
MUwS, PHA, Vulnerabilities: A Walk through on What Not to Do
Pluralsight
Intermediate
41m
Managing Information Security Incidents (ISO/IEC 27002)
Course
Managing Information Security Incidents (ISO/IEC 27002)
Paul Gadbois
Beginner
1h 57m
Performing Threat Modeling with the Microsoft Threat Modeling Methodology
Course
Performing Threat Modeling with the Microsoft Threat Modeling Methodology
Justin Boyer
Intermediate
1h 46m
Security for Hackers and Developers: Reverse Engineering
Course
Security for Hackers and Developers: Reverse Engineering
Dr. Jared DeMott
Intermediate
2h 3m
What Happens When Your App Is Hacked: CodeMash
Course
What Happens When Your App Is Hacked: CodeMash
CodeMash
Intermediate
56m
Securing Data with Asymmetric Cryptography
Course
Securing Data with Asymmetric Cryptography
Edward Curren
Beginner
1h 40m
Malicious Code and Threats
Course
Malicious Code and Threats
Kevin Henry
Intermediate
1h 25m
Security for Hackers and Developers: Exploit Development
Course
Security for Hackers and Developers: Exploit Development
Dr. Jared DeMott
Intermediate
1h 47m
Securing Java Web Application Data
Course
Securing Java Web Application Data
Josh Cummings
Intermediate
2h 40m
Ethical Hacking: Understanding Ethical Hacking
Course
Ethical Hacking: Understanding Ethical Hacking
Dale Meredith
Beginner
7h 37m

The Technology Skills Platform

Pluralsight IQ

Pluralsight IQ

Validate skill levels with assessments that take 5 minutes or less.

Channels

Channels

Curate and share Pluralsight content to reach your learning goals faster.

Hands-on learning

Hands-on learning

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.

Thousands of courses

Thousands of courses

Keep up with the pace of change with expert-led, in-depth courses.

WHAT IS PLURALSIGHT?

Your career is defined by what you know and how well you know it. 

With our platform, you can benchmark and prove your knowledge, keep up with emerging trends and build in-demand skills in areas like DevOps, machine learning, cloud, security and infrastructure. 

What our customers are saying

Join
the Tech skills
revolution

Annual

Save {{annual-percent-savings}}%
$299.00
per year
Courses, paths and skill assessments for individuals.

Premium

$449.00
per year
Access to exams, projects and interactive courses.
Start with premium
Hide all features

Future proof
your skills