- All
- Favorite
- Popular
- Most rated

Malware Analysis Fundamentals
The ability to analyze malware has become a necessary skill for anyone performing incident response. This course will teach the skills required to properly, quickly, and safely analyze malware by examining both its characteristics and behavior.

Conducting Network Vulnerability Analysis
This course will teach you how to find vulnerabilities in systems and software by teaching the process that a hacker uses when they target an organization.

Troubleshooting Security and Active Directory Issues with Sysinternals Tools
This course teaches you how the Windows security subsystem works and how you can manage and troubleshoot related issues with Sysinternals tools.

Analyzing Malware for .NET and Java Binaries
This course will teach the basics of Java and .NET runtimes, introduce tools and techniques for effectively reverse engineering these binary types, show you how to identify indicators of compromise, and get hands-on with real world malware.

Performing Network Vulnerability Scanning with Nexpose
In this course, you will learn how to deploy the Nexpose tool against a variety of different targets. You will create your own custom templates and tune them to create specific policies that match the target you are assessing.

Threat Intelligence: The Big Picture
This course provides a solid baseline for cyber threat intelligence. You will learn how to leverage intelligence to understand adversary behavior and make use of indicators of compromise to detect and stop malware.

Getting Started Analyzing Malware Infections
Malware infections are growing at an alarming rate. This course will teach you how to safely analyze malicious links, infected documents, and malicious archives with the focus on gathering indicators of compromise.

Vulnerability Analysis with Nessus
Nessus is one of the most popular vulnerability scanning tools on the market. In this course, you'll learn how to deploy Nessus and use it to conduct vulnerability scans.

Secure Coding: Preventing Insecure Deserialization
This course will teach you the basics of serialization and deserialization, including serialization file formats, what insecure deserialization is, and how to prevent that type of vulnerability from occurring in your code.

Modern Browser Security Reports
In this course, you’ll learn a number of browser security reporting features and how to implement them on any website.

Secure Coding: Preventing Insufficient Logging and Monitoring
Most security breaches start with a single incident. This course will teach you how to set up correct logging and monitoring for your application, as well as what to log and what not to log in order to detect those incidents on time.

Cyber Security: Executive Briefing
Every organization needs to protect itself from cyber threats. This course covers the essentials of cyber security, you will learn about threats, vulnerabilities and the protective, defensive and corrective controls deployed by organizations.

Threat Modeling Fundamentals
Threat modeling can help mitigate security risks in an application in a repeatable and efficient way. This course teaches you the fundamentals of threat modeling and what the different approaches and methodologies are.

Securing Java Web Applications Through Authentication
Your users' usernames and passwords are the keys to the kingdom. Watch and apply this course in order to approach authenticating and managing secure data in Java web applications with greater confidence.

Performing Threat Modeling with the Microsoft Threat Modeling Methodology
Tired of finding security bugs after the code is written? Finding bugs late is dangerous and expensive. In this course, you'll learn techniques for threat modeling, before it's too late.

Building and Implementing a Security Awareness Training Program
People are the weakest link in IT security and having an effective information security awareness training program can help reduce many of the associated risks. This course will teach you how to build your own program from start to finish.

IoT Device Security: Executive Briefing
This course is an overview of threats and defensive measures against cyber attacks on smart devices or "Internet of Things".

Secure Coding: Identifying and Mitigating XML External Entity (XXE) Vulnerabilities
This course will teach you what XML External Entity vulnerabilities are, how they are exploited, how you can identify the vulnerabilities in your code, and how you can protect your code against exploitation.

Getting Started with Reverse Engineering
Reverse engineering binary code is a core skill for software security engineers, malware analysts and penetration testers. This course will teach you techniques for reversing binary code to identify program characteristics and behavior.

Linux Host Security
Why should you be interested in Linux Host Security, Linux is secure, isn't it? Those of us who are a little more paranoid understand that "nothing is secure" and will benefit from understanding how to lock up your host more securely than the default.

Threat Modeling with the Microsoft Threat Modeling Tool
This course teaches developers and security professionals how to use the Microsoft Threat Modeling Tool to perform application threat modeling.

Secure Coding: Using Components with Known Vulnerabilities
This course explains the risk of using components with known vulnerabilities. It outlines tools and strategies to reduce the overall risk. The course also discusses several methods to enhance the overall security when using third party components.

Introduction to AWS Cloud Security
Amazon Web Services is a leading cloud provider offering scalable cloud solutions worldwide. This course will teach you the basics of creating a secure cloud environment within AWS that can increase your data protection and application revenue.

Securing Data on AWS
This course will teach you how to encrypt your data at Amazon Web Services (AWS). Concepts include encryption and decryption, use of the Key Management Service (KMS), CloudHSM, and using Amazon Macie to manage and protect S3 storage.
Key Features of Pluralsight
- Skill Assessments Pluralsight's Skill IQ and Role IQ features allow learners to assess their current skills and determine which areas require improvement. These personalized assessments provide insights into where users stand compared to industry standards, guiding them toward the most suitable courses.
- Learning Paths The platform offers well-structured learning paths that guide learners through a series of courses designed to develop specific skills. Whether you're aiming for certification or mastering a new programming language, Pluralsight’s learning paths ensure that you systematically achieve your learning objectives.
- On-Demand Courses Pluralsight’s courses are available on demand, which gives learners the flexibility to study at their own pace. This allows working professionals to balance their learning with their job responsibilities.
- Enterprise Solutions In addition to individual learning, Pluralsight provides enterprise solutions that help organizations manage and track the learning progress of their teams. Companies can benefit from tailored learning paths, assessments, and analytics to ensure that their workforce stays competitive.
- Offline Viewing Learners can download courses and view them offline using Pluralsight's mobile app, making it convenient for users to continue learning even without an internet connection.
- Certification Preparation Pluralsight offers courses that prepare learners for a wide range of professional certifications in areas such as AWS, Microsoft, Google Cloud, and CompTIA. These courses help professionals gain the credentials they need to advance in their careers.
- Interactive Learning Pluralsight's hands-on learning experience allows users to practice what they learn in real-world scenarios. The platform offers interactive labs and projects where learners can apply their skills in simulated environments.
Pluralsight Pricing and Plans
Pluralsight offers a variety of pricing plans to accommodate both individual learners and enterprises.- Individual Plans: Starting with a free trial, individuals can subscribe to the monthly or annual plan. The annual subscription provides significant savings and access to the entire course library.
- Team Plans: For businesses, Pluralsight offers team and enterprise-level solutions with advanced analytics, reporting features, and role-based learning pathways. These plans ensure that teams can collaborate and learn efficiently while tracking their progress through in-depth analytics.
Why Choose Pluralsight?
- Expert-Led Content All courses on Pluralsight are created by industry experts who bring real-world experience and knowledge to the table. This ensures that learners get the most up-to-date and relevant information.
- Constantly Updated Courses Pluralsight continuously updates its course content to reflect the latest industry trends, ensuring that learners always have access to the most current skills and knowledge.
- Diverse Range of Topics From cybersecurity and IT operations to creative topics like video production and design, Pluralsight offers courses across a diverse range of subjects, making it a one-stop solution for tech professionals and creatives alike.
- Personalized Learning Pluralsight provides a personalized learning experience with its skill assessments and role-specific learning paths. This feature ensures that learners only focus on areas they need to improve, saving time and effort.
Popular Courses Offered by Pluralsight
Some of the most popular courses on Pluralsight include:- JavaScript: Getting Started Ideal for beginners, this course provides a comprehensive introduction to one of the most widely used programming languages in web development.
- AWS Certified Solutions Architect - Associate This course prepares learners for the AWS certification exam and equips them with the skills needed to design robust cloud architectures.
- Python Fundamentals Perfect for learners new to Python, this course covers the basics of programming in one of the most versatile programming languages.
- CISSP Certification Prep Aimed at cybersecurity professionals, this course prepares learners for the CISSP certification, covering critical areas of information security.