Featured Security Authors
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable explanations. This has lead Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses for Pluralsight. Currently, Troy is heavily involved in Have I been pwned? (HIBP) a free service that aggregates data breaches and helps people establish potential impacts from malicious web activity. Troy blogs regularly about web security and is a frequent speaker at industry conferences across the globe and throughout the media to discuss a wide range of technologies.
Chad Russell has been in the Cyber Security industry for over 15 years. He's taught Microsoft Engineering courses as a Certified trainer. He's managed teams of security engineers and analysts for an Internet banking provider and he's been an information security consultant working for companies including SAP, Microsoft and Oracle. Over the past 15 years he's held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications.
Featured Incident Responder Authors
Richard Harpur is a highly experienced technology leader with a remarkable career ranging from software development, project management through to C-level roles as CEO, CIO, and CISO. Richard is highly rated and ranked in Ireland's top 100 CIOs. As an author for Pluralsight - a leader in online training for technology professionals - Richard's courses are highly-rated in the Pluralsight library and focus on teaching critical skills in cybersecurity including ISO27001 and Ransomware. As a Certified Information Security Manager (CISM) Richard is ideally positioned and passionate about sharing his extensive knowledge and experience to empower others to be successful. Richard also writes extensively on technology and security leadership and regularly speaks at conferences.
Like the Dark Knight, Dale Meredith swoops in and saves the day when no one else can. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge on the course material. Along with his 17 years of experience as a Microsoft Certified Trainer, Dale also has an additional 7 years of Senior IT Management experience. Dale's priority to maintain personal knowledge and understanding of current trends in training, technology, and applications has led to many opportunities such as: training various divisions at the Department of Homeland Security during their Novell to Microsoft transition and implementing and managing networks using Microsoft's Server Platform, Exchange, SharePoint, SCCM and others for many Fortune 500 companies. Dale also specializes in Active Directory, Exchange, Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud. Dale, also became a Certified Ethical Hacker and Certified EC-Council Instructor in 2006.
Featured Penetration Testing Authors
Sunny Wear is the author of several security-related books including her most recent entitled Secure Coding Field Manual: A Programmer's Guide to OWASP Top 10 and CWE/SANS Top 25 which assists programmers in more easily finding mitigations to commonly-identified vulnerabilities within applications. She conducts security talks and classes locally and at conferences like BSides Tampa and AtlSecCon.
Mike Wollard is an information security manager who has worked in the IT field for 17+ years. A broad background from helpdesk to sysadmin, system engineer, networking, DB and development work. Most of Mike's work now centers around pentests and risk assessments, but an integral part will always be awareness training. An active member in various local security groups, Mike volunteers, speaks, or attends various information security cons.
Skills Detail Category Definitions
Foundation - Requisite knowledge that is essential to developing related skills.
Application - Skills needed to create, build, and execute on the most common or useful scenarios for a particular topic.
Composition - Specialized knowledge needed to combine independent skills, enhance them and create something greater than the sum of its parts.
Strategic - Often acquired through years of experience, these skills allow you to make effective, business critical decisions.