Security Certifications

Start preparing for successful certification with Pluralsight's sought-after information and cyber security training. Our online courses will prepare you for top security professional certifications, from vendors like CompTIA, (ISC)², and EC-Council. Learn new skills or add to pre-existing knowledge to become a certified security expert.

Certifications by Vendor

Courses
Newest Courses
This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the...
Web applications today are being hacked with alarming regularity by hacktivists, online criminals and nation states. Very frequently, it is the same prevalent security risks being exploited which is why the Open Web Application Security Project (OWASP) developed their list of Top 10 Most...
The prevalence of online attacks against websites has accelerated quickly in recent years and the same risks continue to be readily exploited. However, these are very often easily identified directly within the browser; it's just a matter of understanding the vulnerable patterns to look for....
CompTIA Security+ (2014 Objectives) prepares networking and IT professionals with the required knowledge and skills to understand the concepts and technologies involved with encryption, cryptography, PKI, and the associated benefits and risks.
Deep dive into the Security Engineering domain of the Certified Information Systems Security Professional (CISSP®) certification, including Secure Design Principles and Processes, Fundamental Concepts of Security Models, Security Evaluation Models, Security Capabilities of Information Systems,...
User data, company secrets, intellectual property, critical infrastructure, and more are all vulnerable if not secured and constantly maintained. In this course, Enterprise Security for CASP (CAS-002), you'll first learn all about cryptographic concepts and encryption methods. Next, you will...
The Java and .NET frameworks contain all the algorithms you need to keep your users' data secret from prying eyes. Web servers like Apache, Tomcat, and IIS, combined with tools like OpenSSL, keep your users secure online. But to use these tools correctly, and to avoid mistakes of the past, you...
Web based APIs have grown enormously popular in recent years. This is in response to a couple of key changes in the industry: firstly, the enormous growth of mobile apps which frequently talk to back ends over the web. Secondly, the rapidly emerging 'Internet of Things' which promises to bring...
In this course, Risk Management and Information Systems Control: Introduction to Risk, you'll have the opportunity to gain a high-level understanding of the risk management process. This includes delving into knowledge of threats and attacks and exploring the mysteries and terminologies of risk...
Demand is growing for organizations to demonstrate their adherence to best practice for Information Security. If you're considering the ISO/IEC 27001 certification for your organization, completing this course will give you the confidence to achieve this security milestone. In ISO/IEC 27001...