- All
- Favorite
- Popular
- Most rated

OAuth2 and OpenID Connect: Easy Now
In this session, Roland Guijt will explain the OAuth2 and OpenID Connect duo in a very easy-to-get way and show you how to set up the most simple OAuth/OpenID Connect environment possible.

Threat Hunting with PySpark
In this demo, you'll learn how to perform advanced graph analytics on disparate windows log data to identify anomalies.

Securing SSRS Reporting Solutions
SSRS uses a role-based security architecture for administrative tasks and access to items published to the report server. This course will teach you how to use all SSRS security features for a native mode report server.

Specialized Hunts: Threat Hunting within Active Directory
Active Directory is used in most medium and large companies, making it a significant target for abuse. This course will teach you how to hunt for threats in Active Directory to uncover malicious activity rapidly, allowing you to respond faster

Identity Management, Authentication and Access Control with pfSense
pfSense provides network firewall, VPN, and other services to users and network operators. In this course, you'll learn the setup, configuration, and validation of pfSense in an enterprise environment.

Execution with Unicorn
Are you looking for a tool that simplifies the process of exploiting Windows hosts using a variety of techniques? In this course, you will learn execution using Unicorn.

Cryptography in .NET 6
In this course, you will learn how to use .NET 6 to protect your data to satisfy confidentiality, integrity, non-repudiation, and authentication.

Threat Intelligence with MSTICPy
This course will focus on using MSTICPy in notebooks to detect adversary logons, decode obfuscated scripting attacks, and attempts to establish persistence.

Certificate in Cybersecurity Analysis (IIBA®-CCA): Data Security Concepts
This course will teach you essential data security concepts required to build technological solutions that address cybersecurity needs.

Impact with Caldera
Impact is the last step on a red team simulation, where adversaries cause disruption in the system to accomplish their objectives. In this course, you will learn impact using Caldera.

Security for Hackers and Developers: Code Auditing
Did you know that bugs in software costs the economy billions of dollars a year? In this course, you are going to help turn the tide as you learn how to find and fix critical bugs quicker.

Security for Hackers and Developers: Exploit Development
Developers are busy, but understanding how to exploit software will help you properly prioritize security critical bugs. This course will teach you basic exploits, shellcoding, and return-oriented programming (ROP).

Security for Hackers and Developers: Fuzzing
Fuzzing is a critical part of the security development lifecycle. This particular technique is used by hackers to find bugs. In this course, software makers will learn how to fuzz - before the bad guys do.

Security for Hackers and Developers: Overview
Enterprises around the world are concerned about cyber security. This course will teach you the fundamentals of information security applicable in any software development discipline.

Security for Hackers and Developers: Reverse Engineering
In this course, you will learn to reverse engineer. That will allow you to protect intellectual property, find vulnerabilities, and pull apart malware. Join me in making the world a little safer.

Advanced Malware Analysis: Combating Exploit Kits
Cyber-crime is rampant, and it's only getting worse. This hands-on course will show you how to analyze the most difficult cyber intrusions so that you can understand and better protect your data from exploit kits, an advanced form of malware.

Protective Technology with Apache Kafka
Apache Kafka is one of the most popular streaming platforms nowadays. In this course, you will learn the setup, configuration, and validation of Apache Kafka in an enterprise environment.

Specialized Attacks: OT and ICS
This course will teach you how to perform reconnaissance, analyze network protocols, and conduct attacks against Operational Technology. This will show how weak cyber security in OT environments can significantly disrupt manufacturing operations.

Detecting Anomalies and Events with Winlogbeat
Winlogbeat is an open-source log collector that ships Windows Event Logs to Elasticsearch or Logstash. In this course, you will learn the setup, configuration, and validation of Winlogbeat in an enterprise environment.

Technical Information Gathering with Recon-ng 5
Recon-ng automates technical information gathering to drastically reduce the time spent conducting reconnaissance during Red Team engagements. Streamline your methodology with the next generation of open source information gathering capability.

Securing Application Secrets in ASP.NET Core 3
Learn how to protect your passwords, API Keys, and other application secrets in your ASP.NET applications. The secure development practices you will learn make it easier to keep production environments safe from malicious or accidental harm.

Protecting Sensitive Data From Exposure in ASP.NET 3 and ASP.NET Core 3 Applications
Keeping personal, financial, or other sensitive data secure from theft or exposure takes active management. This course will teach you how to identify sensitive data in your applications and the protection measures that can be used to keep it secure.

Android 5 Security: Inter-app and Network Communication Security
This course will give you a better understanding of how you can ensure that your app’s interaction with other apps is secure and how to configure your app so that the network requests being made from it are not prone to attacks by malicious entities.

Android 4 Security: Effective Permission Handling
Permissions play a key role in guarding user privacy and data for Android apps. This course will give you a deep understanding of how permissions work, how to request permissions, and how to avoid accidental data leaks when using permissions.
Key Features of Pluralsight
- Skill Assessments Pluralsight's Skill IQ and Role IQ features allow learners to assess their current skills and determine which areas require improvement. These personalized assessments provide insights into where users stand compared to industry standards, guiding them toward the most suitable courses.
- Learning Paths The platform offers well-structured learning paths that guide learners through a series of courses designed to develop specific skills. Whether you're aiming for certification or mastering a new programming language, Pluralsight’s learning paths ensure that you systematically achieve your learning objectives.
- On-Demand Courses Pluralsight’s courses are available on demand, which gives learners the flexibility to study at their own pace. This allows working professionals to balance their learning with their job responsibilities.
- Enterprise Solutions In addition to individual learning, Pluralsight provides enterprise solutions that help organizations manage and track the learning progress of their teams. Companies can benefit from tailored learning paths, assessments, and analytics to ensure that their workforce stays competitive.
- Offline Viewing Learners can download courses and view them offline using Pluralsight's mobile app, making it convenient for users to continue learning even without an internet connection.
- Certification Preparation Pluralsight offers courses that prepare learners for a wide range of professional certifications in areas such as AWS, Microsoft, Google Cloud, and CompTIA. These courses help professionals gain the credentials they need to advance in their careers.
- Interactive Learning Pluralsight's hands-on learning experience allows users to practice what they learn in real-world scenarios. The platform offers interactive labs and projects where learners can apply their skills in simulated environments.
Pluralsight Pricing and Plans
Pluralsight offers a variety of pricing plans to accommodate both individual learners and enterprises.- Individual Plans: Starting with a free trial, individuals can subscribe to the monthly or annual plan. The annual subscription provides significant savings and access to the entire course library.
- Team Plans: For businesses, Pluralsight offers team and enterprise-level solutions with advanced analytics, reporting features, and role-based learning pathways. These plans ensure that teams can collaborate and learn efficiently while tracking their progress through in-depth analytics.
Why Choose Pluralsight?
- Expert-Led Content All courses on Pluralsight are created by industry experts who bring real-world experience and knowledge to the table. This ensures that learners get the most up-to-date and relevant information.
- Constantly Updated Courses Pluralsight continuously updates its course content to reflect the latest industry trends, ensuring that learners always have access to the most current skills and knowledge.
- Diverse Range of Topics From cybersecurity and IT operations to creative topics like video production and design, Pluralsight offers courses across a diverse range of subjects, making it a one-stop solution for tech professionals and creatives alike.
- Personalized Learning Pluralsight provides a personalized learning experience with its skill assessments and role-specific learning paths. This feature ensures that learners only focus on areas they need to improve, saving time and effort.
Popular Courses Offered by Pluralsight
Some of the most popular courses on Pluralsight include:- JavaScript: Getting Started Ideal for beginners, this course provides a comprehensive introduction to one of the most widely used programming languages in web development.
- AWS Certified Solutions Architect - Associate This course prepares learners for the AWS certification exam and equips them with the skills needed to design robust cloud architectures.
- Python Fundamentals Perfect for learners new to Python, this course covers the basics of programming in one of the most versatile programming languages.
- CISSP Certification Prep Aimed at cybersecurity professionals, this course prepares learners for the CISSP certification, covering critical areas of information security.