- All
- Favorite
- Popular
- Most rated
Password and Wireless Attacks with Kali Linux
Kali Linux includes a plethora of tools. This course will focus on the various methods and tools that Kali includes to ethically hack your passwords and wireless networks.
Pen Testing: Planning, Scoping, and Recon
This course will teach you how to begin a penetration testing engagement.
Ethical Hacking: Social Engineering
This course will teach you the social engineering skills needed for EC-Council’s Certified Ethical Hacker certification.
Ethical Hacking: Web Application Hacking
Want to learn more about hacking web servers, web applications, and performing SQL injection attacks? This course will teach you all about web application hacking needed for the CEH exam
Specialized Hunts: Threat Hunting within Mail Servers
This course will teach you how you can perform threat hunting analysis on email servers.
Specialized Attacks: Wireless
This course will teach you to identify the vectors and techniques used by threat actors to gain access to networks and systems via wireless technologies.
Talking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell Exploit
This course is a technical post-mortem of the Log4Shell vulnerability, discussing the impact that has been seen to date, new developments in the remediation, and what to expect in the future.
Web App Hacking: Hacking Authentication
This course helps to understand different types of vulnerabilities in an authentication mechanism. You'll learn how to test web applications for various authentication flaws and how to provide countermeasures for these problems.
Web App Hacking: Hacking XML Processing
This course helps to understand different types of vulnerabilities in XML processing. You'll learn how to test web applications for various XML processing flaws and how to provide countermeasures for these problems.
Ethical Hacking: Cloud Computing
Welcome to Ethical Hacking: Cloud Computing. This course will teach you cloud security concepts needed for the Certified Ethical Hacking Exam.
Ethical Hacking: Understanding Ethical Hacking
A Certified Ethical Hacker is a security professional who understands how to look for weaknesses in target systems and uses the same knowledge and tools as a malicious hacker. This course will teach you the foundations of this knowledge needed for the CEH 312-50 exam.
Privilege Escalation with PEASS-NG
Adversaries frequently use unprivileged access to enter and browse a network, but they need privileged access to complete their tasks. In this course, you will learn privilege escalation using the PEASS-NG suite.
Ethical Hacking: Reconnaissance/Footprinting
Reconnaissance/Footprinting is the first phase attackers perform. This course will teach you the skills attackers use, which is needed for the CEH Exam.
Ethical Hacking: Scanning Networks
This course will teach you the skills attackers use for scanning and that are needed for the CEH Exam.
Ethical Hacking: Sniffing
Sniffing is a skill that attackers use to monitor and capture data that is passing through a network. This course will teach you the skills required to successfully gather data from a target as well as the information needed for the CEH 312-50 exam.
Ethical Hacking: Malware Threats
Malware is specifically designed to gain access or damage systems without the knowledge of the victim. This course will teach you how malware is created, utilized, and detected. You’ll learn all that is needed for the CEH 312-50 exam concerning malware.
Ethical Hacking: Enumeration
The third phase attackers perform on a target is enumerating accounts and services. This course will teach you skills attackers use for enumeration that needed for the Certified Ethical Hacking exam.
Ethical Hacking: Hacking Wireless Networks
Wireless provides one of the biggest attack vectors for hackers. This course will teach you how to secure wireless networks needed for the CEH 312-50 exam.
Ethical Hacking: Vulnerability Analysis
Vulnerability assessment plays a major role in providing security to any organization’s resources and infrastructure from various internal and external threats. This course will teach you vulnerability analysis techniques needed for the Certified Ethical Hackers exam
Ethical Hacking: Hacking Mobile Platforms
Mobile devices are the next big attack vector for attackers. This course will teach you [how to secure these devices and the challenges they present to organizations needed for the CEH 312-50 Exam.
Ethical Hacking: Hacking IoT and OT
The past few years have seen the explosion in IoT and OT devices that connect us to the internet, and hackers took notice. This course will teach you the ethical hacking skills needed for the CEH 312-50 exam
Ethical Hacking: Cryptography
Cryptography isn’t as secure as you think. This course will teach you how attackers look at cryptography for the CEH 312-50 exam.
Ethical Hacking: Exam Review and Tips
Achieving a passing score on the CEH® exam requires knowledge, experience, and preparation. In this course, Ethical Hacking: Exam Review and Tips, you’ll learn the steps to prepare yourself for the CEH 312-50 Exam.
Information Gathering with Kali Linux
This course is all about introducing the learner to the 01 Information Gathering section of Kali . You'll learn about about a few of the tools available on the Kali platform and how they can be used to gather key information on your target.
Key Features of Pluralsight
- Skill Assessments Pluralsight's Skill IQ and Role IQ features allow learners to assess their current skills and determine which areas require improvement. These personalized assessments provide insights into where users stand compared to industry standards, guiding them toward the most suitable courses.
- Learning Paths The platform offers well-structured learning paths that guide learners through a series of courses designed to develop specific skills. Whether you're aiming for certification or mastering a new programming language, Pluralsight’s learning paths ensure that you systematically achieve your learning objectives.
- On-Demand Courses Pluralsight’s courses are available on demand, which gives learners the flexibility to study at their own pace. This allows working professionals to balance their learning with their job responsibilities.
- Enterprise Solutions In addition to individual learning, Pluralsight provides enterprise solutions that help organizations manage and track the learning progress of their teams. Companies can benefit from tailored learning paths, assessments, and analytics to ensure that their workforce stays competitive.
- Offline Viewing Learners can download courses and view them offline using Pluralsight's mobile app, making it convenient for users to continue learning even without an internet connection.
- Certification Preparation Pluralsight offers courses that prepare learners for a wide range of professional certifications in areas such as AWS, Microsoft, Google Cloud, and CompTIA. These courses help professionals gain the credentials they need to advance in their careers.
- Interactive Learning Pluralsight's hands-on learning experience allows users to practice what they learn in real-world scenarios. The platform offers interactive labs and projects where learners can apply their skills in simulated environments.
Pluralsight Pricing and Plans
Pluralsight offers a variety of pricing plans to accommodate both individual learners and enterprises.- Individual Plans: Starting with a free trial, individuals can subscribe to the monthly or annual plan. The annual subscription provides significant savings and access to the entire course library.
- Team Plans: For businesses, Pluralsight offers team and enterprise-level solutions with advanced analytics, reporting features, and role-based learning pathways. These plans ensure that teams can collaborate and learn efficiently while tracking their progress through in-depth analytics.
Why Choose Pluralsight?
- Expert-Led Content All courses on Pluralsight are created by industry experts who bring real-world experience and knowledge to the table. This ensures that learners get the most up-to-date and relevant information.
- Constantly Updated Courses Pluralsight continuously updates its course content to reflect the latest industry trends, ensuring that learners always have access to the most current skills and knowledge.
- Diverse Range of Topics From cybersecurity and IT operations to creative topics like video production and design, Pluralsight offers courses across a diverse range of subjects, making it a one-stop solution for tech professionals and creatives alike.
- Personalized Learning Pluralsight provides a personalized learning experience with its skill assessments and role-specific learning paths. This feature ensures that learners only focus on areas they need to improve, saving time and effort.
Popular Courses Offered by Pluralsight
Some of the most popular courses on Pluralsight include:- JavaScript: Getting Started Ideal for beginners, this course provides a comprehensive introduction to one of the most widely used programming languages in web development.
- AWS Certified Solutions Architect - Associate This course prepares learners for the AWS certification exam and equips them with the skills needed to design robust cloud architectures.
- Python Fundamentals Perfect for learners new to Python, this course covers the basics of programming in one of the most versatile programming languages.
- CISSP Certification Prep Aimed at cybersecurity professionals, this course prepares learners for the CISSP certification, covering critical areas of information security.