Skills Brief

Information & Cyber Security

Empower your entire org to safeguard against rising security threats.

Creating a security-centric culture

Security can't be an afterthought. To really keep your organization secure, everyone needs to get on board and make security best practices a company-wide priority. 

Pluralsight’s technology learning platform helps organizations create a security-centric culture by developing the skills required to safeguard against, prepare for, detect and recover from potential breaches. Give your organization a fighting chance with content authored by industry experts who have real-world experience in both offensive and defensive security.

Skills Detail: Security

Ensure every employee — from technologist to supporting role — understands how to identify and protect against security threats.

Foundation
Application
Composition
Strategic
    • End User Security
    • Hardware
    • Platforms
    • Networking
    • Cloud
    • Data Security
    • Security Operations
    • Programming
    • Governance
    • Compliance
    • Identity Security
    • Physical Security
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Cryptography
    • Data Security
    • Security Operations
    • Digital Forensics
    • Incident Response
    • Programming
    • Developer Security
    • Security Testing
    • Compliance
    • Security Assessments
    • Disaster Recovery & Business Continuity
    • Identity Security
    • Physical Security
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Cryptography
    • Data Security
    • Security Operations
    • Digital Forensic Analysis
    • Incident Response
    • Architecture
    • Developer Security
    • Security Testing
    • Compliance
    • Risk
    • Security Assessments
    • Disaster Recovery & Business Continuity
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Data Security
    • Security Engineering
    • Incident Response
    • Architecture
    • Developer Security
    • Governance
    • Compliance
    • Risk
    • Disaster Recovery & Business Continuity

Featured Security Authors

Troy Hunt

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable explanations. This has lead Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses for Pluralsight. Currently, Troy is heavily involved in Have I been pwned? (HIBP) a free service that aggregates data breaches and helps people establish potential impacts from malicious web activity. Troy blogs regularly about web security and is a frequent speaker at industry conferences across the globe and throughout the media to discuss a wide range of technologies.

Chad Russell

Chad Russell has been in the Cyber Security industry for over 15 years. He's taught Microsoft Engineering courses as a Certified trainer. He's managed teams of security engineers and analysts for an Internet banking provider and he's been an information security consultant working for companies including SAP, Microsoft and Oracle. Over the past 15 years he's held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications.

Skills Detail: Incident Responder

Every organization will experience some type of security incident. Your response to incidents determines the impact on your organization. Learn the skills required to detect and respond to security incidents before they create significant damage.

Foundation
Application
Composition
Strategic
    • End User Security
    • Hardware
    • Platforms
    • Networking
    • Cloud
    • Data Security
    • Security Operations
    • Programming
    • Governance
    • Compliance
    • Identity Security
    • Physical Security
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Cryptography
    • Data Security
    • Security Operations
    • Digital Forensics
    • Incident Response
    • Programming
    • Developer Security
    • Security Testing
    • Compliance
    • Security Assessments
    • Disaster Recovery & Business Continuity
    • Identity Security
    • Physical Security
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Cryptography
    • Data Security
    • Security Operations
    • Digital Forensic Analysis
    • Incident Response
    • Architecture
    • Developer Security
    • Security Testing
    • Compliance
    • Risk
    • Security Assessments
    • Disaster Recovery & Business Continuity
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Data Security
    • Security Engineering
    • Incident Response
    • Architecture
    • Developer Security
    • Governance
    • Compliance
    • Risk
    • Disaster Recovery & Business Continuity

Featured Incident Responder Authors

Richard Harpur

Richard Harpur is a highly experienced technology leader with a remarkable career ranging from software development, project management through to C-level roles as CEO, CIO, and CISO. Richard is highly rated and ranked in Ireland's top 100 CIOs. As an author for Pluralsight - a leader in online training for technology professionals - Richard's courses are highly-rated in the Pluralsight library and focus on teaching critical skills in cybersecurity including ISO27001 and Ransomware. As a Certified Information Security Manager (CISM) Richard is ideally positioned and passionate about sharing his extensive knowledge and experience to empower others to be successful. Richard also writes extensively on technology and security leadership and regularly speaks at conferences.

Dale Meredith

Like the Dark Knight, Dale Meredith swoops in and saves the day when no one else can. Dale's expertise is in explaining difficult concepts and ensuring his students have an actionable knowledge on the course material. Along with his 17 years of experience as a Microsoft Certified Trainer, Dale also has an additional 7 years of Senior IT Management experience. Dale's priority to maintain personal knowledge and understanding of current trends in training, technology, and applications has led to many opportunities such as: training various divisions at the Department of Homeland Security during their Novell to Microsoft transition and implementing and managing networks using Microsoft's Server Platform, Exchange, SharePoint, SCCM and others for many Fortune 500 companies. Dale also specializes in Active Directory, Exchange, Server, IIS, PowerShell, SharePoint, System Center/Desktop Deployment, and Private Cloud. Dale, also became a Certified Ethical Hacker and Certified EC-Council Instructor in 2006.

Skills Detail: Penetration Testing

Businesses are creating, collecting and managing larger volumes of customer data than ever before. But with more data come more opportunities for critical information to be compromised or stolen. Strengthen your organization’s security posture by detecting and mitigating vulnerabilities before attackers can exploit them.

Foundation
Application
Composition
Strategic
    • End User Security
    • Hardware
    • Platforms
    • Networking
    • Cloud
    • Data Security
    • Security Operations
    • Programming
    • Governance
    • Compliance
    • Identity Security
    • Physical Security
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Cryptography
    • Data Security
    • Security Operations
    • Digital Forensics
    • Incident Response
    • Programming
    • Developer Security
    • Security Testing
    • Compliance
    • Security Assessments
    • Disaster Recovery & Business Continuity
    • Identity Security
    • Physical Security
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Cryptography
    • Data Security
    • Security Operations
    • Digital Forensic Analysis
    • Incident Response
    • Architecture
    • Developer Security
    • Security Testing
    • Compliance
    • Risk
    • Security Assessments
    • Disaster Recovery & Business Continuity
    • Platforms
    • Networking
    • Network Security
    • Cloud Security
    • Data Security
    • Security Engineering
    • Incident Response
    • Architecture
    • Developer Security
    • Governance
    • Compliance
    • Risk
    • Disaster Recovery & Business Continuity

Featured Penetration Testing Authors

Sunny Wear

Sunny Wear is the author of several security-related books including her most recent entitled Secure Coding Field Manual: A Programmer's Guide to OWASP Top 10 and CWE/SANS Top 25 which assists programmers in more easily finding mitigations to commonly-identified vulnerabilities within applications. She conducts security talks and classes locally and at conferences like BSides Tampa and AtlSecCon.

Mike Woolard

Mike Wollard is an information security manager who has worked in the IT field for 17+ years. A broad background from helpdesk to sysadmin, system engineer, networking, DB and development work. Most of Mike's work now centers around pentests and risk assessments, but an integral part will always be awareness training. An active member in various local security groups, Mike volunteers, speaks, or attends various information security cons.

Skills Detail Category Definitions

Foundation - Requisite knowledge that is essential to developing related skills.

Application - Skills needed to create, build, and execute on the most common or useful scenarios for a particular topic.

Composition - Specialized knowledge needed to combine independent skills, enhance them and create something greater than the sum of its parts.

Strategic - Often acquired through years of experience, these skills allow you to make effective, business critical decisions.

Contact sales

Loading form...

If this message remains, it may be due to cookies being disabled or to an ad blocker.