Pluralsight Courses

Courses

Students Taught

Rating

Selecting the Right Tool(s) for Your Red Team Operation

In this course, you’ll learn from Cyber-Security experts Dale Meredith and Aaron Rosenmund as they discuss the importance of choosing the right tool for your red team engagements, as well as their own favorite tools that they recommend to not only recon a target but obtaining access.

Assessing Red Team Post Exploitation Activity

In this course, you will explore the mindset and techniques used by red team operators and common cyber adversaries, and the ways the defensive teams can detect and even get ahead of these malicious actions.

Information Gathering and Vulnerability Identification for CompTIA PenTest+

This course is a part 5 of the CompTIA PenTest+ series. You have identified the vulnerabilities, now you will use your toolset to identify how to exploit said vulnerabilities to prepare to for exploitation.

Conducting Active Reconnaissance for CompTIA PenTest+

Active reconnaissance is a necessary evil. It can sometimes alert defense teams and systems that you’re snooping around, but it also helps you to see and document everything about each note on the network. Learn how to active recon the right way.

Ethical Hacking: Understanding Ethical Hacking

Pluralsight is not an official partner or accredited training center of EC-Council. This course will significantly benefit security officers, network administrators, and anyone who is concerned about the integrity of their network infrastructure.

Performing Non-Technical Tests for CompTIA PenTest+

As a security professional, you need to test non-technical attack vectors within our engagement. We’ll look at different tools that we can use to bypass locks, motion sensors and even users themselves.

Conducting Passive Reconnaissance for CompTIA PenTest+

Reconnaissance is the process of discovering information about the target before you engage. Passive Reconnaissance is doing this in a matter that leaves no trace, which helps to keep your identity under the hacker hoodie you’re wearing.

Laying the Foundation for Penetration Testing for CompTIA PenTest+

So, you want to start a career in penetration testing but don’t know where to start? Maybe you’ve got some great hacking skills, and want to become a security professional? Look no further, this course starts you on your new and exciting path by diving into pentesting!

Ethical Hacking: Hacking Mobile Platforms

Pluralsight is not an official partner or accredited training center of EC-Council. Your company has decided to start allowing BYOD, plus upper management just purchased multiple mobile devices. You’ll learn how to make sure everything stays secure.

Secure Software Development

One of the weakest links in cyber-security are the attack vectors that sometimes get created with applications. In this course, you’ll learn how to evaluate and integrate security and software development to protect your environment.

Performing Incident Response and Handling

In this course, you’ll explore and investigate into the countless aspects of incident response and how you can plan and design a process for responding to that breach that is coming sooner or later to your organization.

Implementing and Performing Vulnerability Management

Today cyber-crime is forcing organizations to pay more attention to information security. You’ll learn that Vulnerability Management Programs helps detect and mitigate issues in your environment and help stop attackers from accessing your resources.

Performing and Analyzing Network Reconnaissance

Seeing what is currently being exposed about your networks and company resources is vital. This course will provide a fundamental understanding of both reconnaissance and scanning and how it can affect your security posture.

Ethical Hacking: Enumeration

Pluralsight is not an official partner or accredited training center of EC-Council. Now that we’ve found out “live” systems and hopefully determined the OS by fingerprinting, our next phase of Ethical Hacking is to now extrapolate data.

Ethical Hacking: Cryptography

The Internet is an insecure medium, and attackers can see a lot of what you are sending. This is where cryptography comes in to play. Looking at cryptography from the attackers point a view is the best way to start protecting your resources.

Ethical Hacking: Hacking the Internet of Things (IoT)

The Internet of Things (IoT) is one of the most talked about trends in technology. There are a plethora of devices being released daily (some a need, some a joke). The real issue is each device opens a new attack vector that you never saw coming.

Ethical Hacking: Sniffing

Pluralsight is not an official partner or accredited training center of EC-Council. You need to keep your network protected from attackers. This course will help you to understand how network sniffing works and how to keep your information secure.

Ethical Hacking: Hacking Wireless Networks

Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you’ll learn the hacking methods that can be used to gain access to your network and how to best lower that security risk.

Ethical Hacking: Scanning Networks

Pluralsight is not an official partner or accredited training center of EC-Council. You know how to recon your target, now it’s time to learn how to dig around what you’ve found for important, relevant data in preparation for your attack.

Ethical Hacking: Malware Threats

Pluralsight is not an official partner or accredited training center of EC-Council. This course will take you deep into the dark alley of how malware is used and deployed. We’ll also dive into how Trojans and backdoors work.

Ethical Hacking: Reconnaissance / Footprinting

Pluralsight is not an official partner or accredited training center of EC-Council. This course covers the process of probing a system with the intent of compromising the target. The goal is to gather as much data as possible about a would-be target.

Ethical Hacking: System Hacking

Pluralsight is not an official partner or accredited training center of EC-Council. You’ve done your homework; now it’s time to totally and completely “pwn” your target and yet make no one the wiser that you’ve made it in.

Ethical Hacking: Vulnerability Analysis

Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you’ll learn how important it is to not only scan your networks for any red flags but also how to analyse those results.

Preparing for and Executing Incident Recovery

Whenever an incident happens, you have to figure out the “Who, What, Where, When”. This course will help you understand how to conduct an investigation, eradicate the incident and how to build out your own CSI (Cyber-Security Investigator) Jump-Bag.

The Issues of Identity and Access Management (IAM)

In this course, you’ll learn how to look at IAM in the proper perspective, as well as the security issues that you should be aware of in your own organization.

Enterprise Security: Policies, Practices, and Procedures

The security market is changing rapidly, and these changes have made security management significantly more difficult. This course will teach you how to get ahead of the bad guys by looking at your infrastructure in a different light.

Assessing and Mitigating Security Risks

The capacity to perform risk management is crucial for anyone hoping to defend their networks and resources. This course will teach you about risk policy, assessment, analysis, and mitigation of your networks.

Ethical Hacking: Penetration Testing

Pluralsight is not an official partner or accredited training center of EC-Council. In this course, you will learn the ins and outs of planning and executing a penetration test against your own or your clients network.

Implementing Windows Server 2012 R2 Essentials Edition

This course introduces you to the world of Microsoft Server 2012 R2 features that are designed to help small businesses take advantage of technologies that enterprise level servers have been providing for years. You, as a small business owner, or small business IT manager or consultant, will learn how to utilize the Essentials services and roles to help modernize your office environment.