Featured resource
2026 Tech Forecast
2026 Tech Forecast

Stay ahead of what’s next in tech with predictions from 1,500+ business leaders, insiders, and Pluralsight Authors.

Get these insights
  • Course

Play by Play: Ethical Hacking - Deconstructing the Hack

In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.

Beginner
1h 29m
(58)

Created by Gary Eimerman and Troy Hunt

Last Updated Jan 28, 2022

Course Thumbnail
  • Course

Play by Play: Ethical Hacking - Deconstructing the Hack

In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. We don't just talk, we take these incidents and explore the mechanics of how the underlying risks are exploited.

Beginner
1h 29m
(58)

Created by Gary Eimerman and Troy Hunt

Last Updated Jan 28, 2022

Get started today

Access this course and other top-rated tech content with one of our business plans.

Try this course for free

Access this course and other top-rated tech content with one of our individual plans.

This course is included in the libraries shown below:

  • Security
What you'll learn

Attacks against information systems have become the established norm for online assets these days. Hacktivists, career criminals, and nation states are all actively compromising our systems with unprecedented regularity, but for many technology professionals, the risks to them remain hypothetical; they hear about these incidents on the news but don't get exposure to how the attacks are actually executed. In this Play by Play, we talk through a number of real world hacking incidents that align to courses within the Ethical Hacking series. But we don't just talk, we take these incidents and explore the mechanics of how the underlying risks are actually exploited. It's a real world, very practical look at the state of online security as we deconstruct the hacks.

Play by Play: Ethical Hacking - Deconstructing the Hack
Beginner
1h 29m
(58)
Table of contents

About the author
Gary Eimerman - Pluralsight course - Play by Play: Ethical Hacking - Deconstructing the Hack
Gary Eimerman
7 courses 4.4 author rating 1301 ratings

Gary Eimerman is VP of IT Pro Content at Pluralsight. He brought his expertise over from TrainSignal, where he spent eight years helping to grow the company into the leader in online IT training.

About the author
Troy Hunt - Pluralsight course - Play by Play: Ethical Hacking - Deconstructing the Hack
Troy Hunt
47 courses 4.6 author rating 11058 ratings

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.

Get started with Pluralsight