- All
- Favorite
- Popular
- Most rated

Technical Information Gathering with theHarvester
The first and most important part of a red team engagement is reconnaissance. In this course, you will learn to gather technical information such as DNS subdomains and IP addresses, as well as people information, using theHarvester.

Credential Access with Cain & Abel
From manipulating network traffic to cracking user credentials, this course will give you the skills and understanding to further your red teaming objectives towards exploitation, credential access, and lateral movement.

Initial Access with Luckystrike
Malicious office documents are an effective way to gain an initial foothold into a network. In this course, you will learn how to use Luckystrike to create custom malicious office documents, manage multiple payloads, and utilize custom templates.

People Information Gathering with the Social Engineering Toolkit (SET)
Social Engineering is one of the most common attack vectors. Unfortunately, in this digital age, many people still fall victim to these attacks. In this course, you will learn Initial Access using the Social Engineering Toolkit.

Initial Access with Gophish
Gophish is an open source phishing tool written in the Go programming language for use by businesses and penetration testers to test for phishing awareness in their organization. In this course, you will learn Initial Access using Gophish.

Lateral Movement with Infection Monkey
Learn to map and compromise vulnerable network paths with a real propagating payload and correlate lateral movement testing with MITRE ATT&CK and Zero Trust Principles.

Credential Access with THC Hydra
THC Hydra is a fast and powerful parallelized network login cracker with support for a wide variety of network protocols. Skill up your brute forcing techniques by leveraging THC Hydra to identify weak passwords.

Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
The OWASP Zed Attack Proxy is an open source way of testing your web applications manually. This course walks through the basic functions of ZAP, giving you a look at ways this tool makes taking advantage of web application vulnerabilities possible.

Exfiltration with Dnscat2
Maintaining access into a targeted network requires multiple C2 channels. In this course, you will learn data exfiltration using dnscat.

Command and Control with Empire
PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to leverage Empire to perform command and control techniques during a red team engagement.

Discovery with ADRecon
In this course, we cover the ADRecon tool, which allows you to extract valuable information from the Active Directory, including users, security groups, computers, security policies, and even Kerberos tickets.

Credential Access with Responder
After getting initial access in a network, your next task is to move laterally and escalate privileges. In this course, you will see the Responder tool which allows you to exploit vulnerabilities on the LLMNR and NBT-NS protocols to get credentials

The Hacker Hippocampus
How does our brain process gamification and threats as hackers? This talk shares the answer.

Lateral Movement with PsExec
Learn to use PsExec to execute commands, programs, and laterally move to remote Windows hosts without installing additional software.

Lateral Movement with WMIOps
WMIOps is a PowerShell script that penetration testers and ethical hackers can use to execute commands, gather information, and run other PowerShell scripts on remote Windows machines. In this course, you will learn lateral movement using WMIOps.

Command and Control with Pupy
Learn how to use the Pupy server to connect to exploited clients over different encryption protocols and use these sessions to run additional attacks, dump credentials, and collect information.

Discovery with Kismet
In this course, you will learn Discovery using Kismet.

Initial Access with sqlmap
sqlmap is a powerful automation tool for identifying and exploiting SQL injection flaws. Add another tool to your toolbox by using sqlmap to exfiltrate data and gain initial access.

Initial Access with King Phisher
King Phisher is a feature-rich tool for coordinating and monitoring successful phishing campaigns to further red teaming objectives towards initial access. In this course, you will learn initial access using King Phisher.

Command and Control with PoshC2
PoshC2 is a powerful tool that uses PowerShell to control a victim system toward furthering red teaming objectives beyond exploitation throughout the remaining life of an engagement. In this course, you will learn Command and Control using PoshC2.

Persistence with Empire
PowerShell has quickly become the standard in enterprise networks. In this course you will learn how to obtain persistence using Empire.

Enumerating the Network Infrastructure as a Forensics Analyst
This course will teach you how to apply your theoretical knowledge of networking to both real time and post incident forensic analysis of network based data.

Command and Control with Covenant
Covenant C2 command and control uses just-in-time, in-memory, .NET compilation, and dynamic profiles to fool defensive detections. Skill up your red team techniques by leveraging the next generation of adversary command and control capabilities.

Leverage PowerShell Tools for Pen Testing
This course will teach you to leverage one of the most powerful built-in tools, PowerShell, for penetration testing.
Key Features of Pluralsight
- Skill Assessments Pluralsight's Skill IQ and Role IQ features allow learners to assess their current skills and determine which areas require improvement. These personalized assessments provide insights into where users stand compared to industry standards, guiding them toward the most suitable courses.
- Learning Paths The platform offers well-structured learning paths that guide learners through a series of courses designed to develop specific skills. Whether you're aiming for certification or mastering a new programming language, Pluralsight’s learning paths ensure that you systematically achieve your learning objectives.
- On-Demand Courses Pluralsight’s courses are available on demand, which gives learners the flexibility to study at their own pace. This allows working professionals to balance their learning with their job responsibilities.
- Enterprise Solutions In addition to individual learning, Pluralsight provides enterprise solutions that help organizations manage and track the learning progress of their teams. Companies can benefit from tailored learning paths, assessments, and analytics to ensure that their workforce stays competitive.
- Offline Viewing Learners can download courses and view them offline using Pluralsight's mobile app, making it convenient for users to continue learning even without an internet connection.
- Certification Preparation Pluralsight offers courses that prepare learners for a wide range of professional certifications in areas such as AWS, Microsoft, Google Cloud, and CompTIA. These courses help professionals gain the credentials they need to advance in their careers.
- Interactive Learning Pluralsight's hands-on learning experience allows users to practice what they learn in real-world scenarios. The platform offers interactive labs and projects where learners can apply their skills in simulated environments.
Pluralsight Pricing and Plans
Pluralsight offers a variety of pricing plans to accommodate both individual learners and enterprises.- Individual Plans: Starting with a free trial, individuals can subscribe to the monthly or annual plan. The annual subscription provides significant savings and access to the entire course library.
- Team Plans: For businesses, Pluralsight offers team and enterprise-level solutions with advanced analytics, reporting features, and role-based learning pathways. These plans ensure that teams can collaborate and learn efficiently while tracking their progress through in-depth analytics.
Why Choose Pluralsight?
- Expert-Led Content All courses on Pluralsight are created by industry experts who bring real-world experience and knowledge to the table. This ensures that learners get the most up-to-date and relevant information.
- Constantly Updated Courses Pluralsight continuously updates its course content to reflect the latest industry trends, ensuring that learners always have access to the most current skills and knowledge.
- Diverse Range of Topics From cybersecurity and IT operations to creative topics like video production and design, Pluralsight offers courses across a diverse range of subjects, making it a one-stop solution for tech professionals and creatives alike.
- Personalized Learning Pluralsight provides a personalized learning experience with its skill assessments and role-specific learning paths. This feature ensures that learners only focus on areas they need to improve, saving time and effort.
Popular Courses Offered by Pluralsight
Some of the most popular courses on Pluralsight include:- JavaScript: Getting Started Ideal for beginners, this course provides a comprehensive introduction to one of the most widely used programming languages in web development.
- AWS Certified Solutions Architect - Associate This course prepares learners for the AWS certification exam and equips them with the skills needed to design robust cloud architectures.
- Python Fundamentals Perfect for learners new to Python, this course covers the basics of programming in one of the most versatile programming languages.
- CISSP Certification Prep Aimed at cybersecurity professionals, this course prepares learners for the CISSP certification, covering critical areas of information security.