Information & Cyber Security

With a new hack or data breach happening almost daily, information and cyber security have never been more important to companies, and to security professionals, IT professionals and developers. With Pluralsight’s cyber security training, your team will learn the tools and best practices that protect sensitive information, maintain business-critical systems and keep you in compliance. Courses cover everything from the fundamentals of security and security auditing to the latest in digital forensics and malware analysis techniques.

Courses
Newest Courses
This course introduces ethical hackers and penetration testers to Kali Linux. This course will show IT professionals how to use the ethical hacking techniques and how to conduct a professional penetration test workflow using the Swiss Army Knife operating system Kali Linux.
This course will start you down the path of becoming an Ethical Hacker, or in other words; become a "Security Profiler." You will learn to start thinking and looking at your network through the eyes of malicious attackers. You will learn to understand the motivation of an attacker. It is the...
Web applications today are being hacked with alarming regularity by hacktivists, online criminals and nation states. Very frequently, it is the same prevalent security risks being exploited which is why the Open Web Application Security Project (OWASP) developed their list of Top 10 Most...
USB devices have become part of many forensic investigations and penetration tests. In this course, USB Forensics: Writeblocking and Impersonation, you'll learn USB forensics and penetration testing with the USB forensics writeblocking and impersonation. First, you'll explore easily and cheaply...
In this course, Web Application Penetration Testing with Burp Suite, you will learn hands-on techniques for attacking web applications and web services using the Burp Suite penetration testing tool. This course is designed to expand your knowledge of the Burp Suite beyond just capturing...
If you are looking to begin your journey towards the highly respected CISSP credential, then you have come to the right place! This course covers a broad range of topics listed in ISC2's Certified Information System Security Professional (CISSP) Common Body of Knowledge (CBK) - Security and...
CompTIA Security+ (2014 Objectives) prepares networking and IT professionals with the knowledge and skills required to identify risk, to participate in risk mitigation activities, and to provide infrastructure, application, information, and operational security. In addition, the successful...
The prevalence of online attacks against websites has accelerated quickly in recent years and the same risks continue to be readily exploited. However, these are very often easily identified directly within the browser; it's just a matter of understanding the vulnerable patterns to look for....
Access controls lie at the very heart of an information security program. After all, information security is all about access control - who can get on our systems, networks, and our buildings and what can they do when they gain access? In this course, CISSP® - Identity and Access Management,...
Did you know Burp Suite makes automation, data exfiltration, and customization techniques possible to help make you an even better pentester? This advanced course, Advanced Web Application Penetration Testing with Burp Suite, is designed to expand your knowledge of the Burp Suite product to...