The 14 Best Pluralsight Cybersecurity Courses to Consider in 2021

The Top 14 Pluralsight Cybersecurity Courses To Consider in 2021

Cybersecurity skills are in high demand among organizations that are looking to secure their networks or defend users’ identities. The pandemic and subsequent ‘new normal’ of remote work are furthering demands for these skills. Many are turning to online learning platforms to up their game and acquire the cybersecurity skills most likely to help them stand out. And whether you are looking to acquire those skills for work or for play, this collection of Pluralsight cybersecurity courses will help you learn the ropes so you can pilot some of the most widely used tools in no time!

With this in mind, the editors at Solutions Review have compiled this list of top-rated Pluralsight cybersecurity courses to consider taking. This platform is perfect for those looking to take multiple courses or acquire skills in multiple different areas, or for those who want the most in-depth experience possible through access to entire course libraries or learning paths. In sum, Pluralsight offers more than 7,000 expert-led video courses.

Note: Our editors assembled this directory by listing top-rated Pluralsight cybersecurity courses in a number of different InfoSec coverage areas, including Endpoint Security, SIEM, Identity Management, Authentication, Firewalls, and Antivirus.

Click GO TO TRAINING to learn more and register.

The 14 Best Pluralsight Cybersecurity Courses to Consider in 2021

Building a Cybersecurity Home Lab Environment

Description: In this course, Building a CyberSecurity Lab Environment, you’ll learn how to create an environment that you can use to enhance your learning that is separate from your production network. If you’re be

First, you’ll explore reasons and motivation for creating this lab and the benefits you’ll gain by maintaining it.

Next, you’ll discover how to add several different target systems from the latest Windows platform to systems that are intentionally vulnerable. Having these targets will allow you to launch attacks, verify vulnerabilities, and conduct research projects without jeopardizing your production environment.

Finally, you’ll learn how to create your own “Attack Workstation” utilizing operating systems like Kali Linux.

GO TO TRAINING

Fear and Loathing in Cyber Security: An Analysis of the Psychology of Fear

Description: For too long, the cybersecurity industry has attempted to use fear, uncertainty, and doubt to engage with the human element. It’s time for us to see things differently. This engaging talk draws on extensive research in the sociology and psychology of fear, as well as real-world case studies, to explain why we can’t simply scare people into security, but how we can harness human bias to have a more positive impact on cybersecurity awareness, behavior and culture.

GO TO TRAINING

Cybersecurity Threats: Insider Threats

Description: Insider threats are growing and the impact from often over-looked insider threats can threaten organizations. You need to be on the lookout for an increasing number of accidental breaches by employees storing confidential data on unsecure cloud storage. In this course, Cybersecurity Threats: Insider Threats, you’ll learn how serious the risk is from insiders, how insiders can threaten an organization, and how to protect against them. First, you’ll explore how to detect both a malicious and an accidental insider threat. Next, you’ll discover how to respond and contain an insider incident. Finally, you’ll learn the best practices and countermeasures you can deploy to help protect your organization from insider threats. By the end of this course, you’ll have learned how to approach the insider threat, and be able to prepare your insider threat plan, including detection, containment, and prevention measures to protect your organization.

GO TO TRAINING

Cyber Security Essentials: Your Role in Protecting the Company

Description: Cyber risks can cause damage to organizations and individuals. In this course, Cyber Security Essentials: Your Role in Protecting the Company, you’ll learn to recognize cyber-attacks and know what to do. First, you’ll explore how to protect your user accounts on systems at work and at home. Next, you’ll discover the ways that criminals work and how simple things can stop them. Finally, you’ll learn how to look after your data and your organization’s data when you are not in the office. When you’re finished with this course, you’ll have the skills and knowledge of cyber risks and attacks needed to protect yourself and your organization.

GO TO TRAINING

Configuring Firepower Threat Defense (FTD) NetOps Features

Description: Firewalls have been the first line of defense in network security for over 20 years but in the face of constant attacks and breaches, they’ve had to evolve. This new breed of firewalls are commonly referred to as next-generation firewalls and have now become a necessity for many companies. In this course, Configuring Firepower Threat Defense (FTD) NetOps Features, you’ll learn to configure features that are most essential to the network team beyond the initial setup. First, you’ll explore the high available options in FTD and their configuration. Next, you’ll discover how to configure essential platform settings such as Quality of Service, Certificates, and so on. Finally, you’ll learn how to how to set up remote access and site-to-site VPN in Firepower. When you’re finished with this course, you’ll have the skills and knowledge of FTD needed to configure and tune these critical netops features.

GO TO TRAINING

Cybersecurity Maturity Model Certification (CMMC): First Look

Description: Over the past several years, damaging breaches of government data in defense contractor systems have resulted in the unauthorized disclosure of a wide range of sensitive information. In this course, Cybersecurity Maturity Model Certification (CMMC): First Look, you’ll gain fundamental knowledge about the Cybersecurity Maturity Model Certification (CMMC) requirement recently levied by the U.S. Government on its defense contractors, to protect Controlled Unclassified Information (CUI). First, you’ll explore what the CMMC is, and why it was created. Next, you’ll discover the key US Government regulations involved with imposing the CMMC on Department of Defense contractors, including the Defense Federal Acquisition Regulations, as well as the NIST Special Publication 800-171 series. You’ll understand the structure of the CMMC model, including its domains, capabilities, processes, and practices. Finally, you’ll learn about the 5 Levels of the CMMC Maturity Model. When you’re finished with this course, you’ll understand how the CMMC will apply to the various scenarios in which defense contractors may be situated.

GO TO TRAINING

Introduction to Threat Intelligence

Description: Threat intelligence is a critical component of cybersecurity and a tool that many companies don’t fully utilize. In this course, Introduction to Threat Intelligence, you will understand how critical threat intelligence analysis is to a company’s overall security posture. Additionally, you will learn how threat intelligence analysts provide vitally important data that enables defenders, managers, and executives to make timely and accurate decisions.

First, you will understand what threat intelligence is, how it enhances all facets of a company’s cyber-security program, and how it can be a major differentiator in today’s hyper-competitive global marketplace. Next, you will learn the phases of the intelligence life cycle and how each phase is used to provide intelligence to the teams and leaders that need it most. Finally, you will learn about the various frameworks typically used and how they help guide decisions, shorten the information aggregation and dissemination timelines, and ultimately help organizations defend their networks from attack.

When you are finished with this course, you will have a good understanding of what threat intelligence is, why every company needs skilled, competent analysts, and who could (and should) be consuming the information.

GO TO TRAINING

Malware Analysis: The Big Picture

Description: Every day a new breach occurs at companies large and small. Some impact tens of millions of customers, destroy a company’s reputation, consumer trust, or investor confidence. Some breaches go unnoticed for months or years and quietly leak sensitive information, company secrets, customer data, and more. In this course, Malware Analysis: The Big Picture, you will learn the basics of what malware is, and how it gets into your networks and infects your systems. First, you will delve into what skills, tools, and teams you’ll need in place to effectively combat these breaches. Next, you will dive into types of malware analysis and which is best suited for a particular situation. Finally, you will learn about gap analysis; ensuring holes are being filled and resources directed in the proper areas. When you’re finished with this course, you’ll have the knowledge necessary to make effective decisions regarding what resources are required, legal considerations during and after a breach, and best practices to minimize the effect of malware breaches within your environment.

GO TO TRAINING

Getting Started Analyzing Malware Infections

Description: Computer virus outbreaks are becoming more complex and use clever deployment tactics that trick people into getting infected, even without their knowledge. Traditional antivirus technologies have a hard time keeping up. There is a need for security analysts that are able to tackle these infections and stop them from infecting other computers. In this course, Getting Started Analyzing Malware Infections, you’ll learn how to safely contain and analyze suspicious files and URLs. Next, you learn to extract malicious scripts from documents, deobfuscate them, and extract indicators that lead to other malware components. Finally, you will learn to investigate virus deployment techniques that bypass modern security controls. When you’re finished with this course, you will have the skills and the knowledge to build layered defenses that will disrupt the infection chain at multiple stages protecting your data and your company.

GO TO TRAINING

Access Control and Identity Management

Description: Access Controls and Identity Management are the heart of Information Security. In this course, Access Control and Identity Management, you will learn about the risks and challenges associated with access control concepts that a security professional must understand. First, you will discover the various access control attacks. Then, you will explore the methods of implementing and monitoring an access control system. Finally, you will learn about access control models and techniques. By the end of this course, you will know and understand the foundation of information security – access control.

GO TO TRAINING

Ethical Hacking: Hacking Web Applications

Description: The security profile of web applications is enormously important when it comes to protecting sensitive customer data, financial records, and reputation. Yet, web applications are frequently the target of malicious actors who seek to destroy these things by exploiting vulnerabilities in the software. Most attacks against web applications exploit well-known vulnerabilities for which tried and tested defenses are already well-established. Learning these patterns – both those of the attacker and the defender – is essential for building the capabilities required to properly secure applications on the web today. In this course, we’ll look a range of different security paradigms within web applications both conceptually and in practice. They’ll be broken down into detail, exploited, and then discussed in the context of how the attacks could have been prevented.

GO TO TRAINING

Security Event Triage: Detecting System Anomalies

Description: Developing the skills necessary for a security analyst to properly detect and triage advanced attacker intrusion tactics and techniques requires experience and the use of advanced detection capabilities. Neither of which are easily obtained. In this course, Security Event Triage: Detecting System Anomalies, you will learn foundational knowledge required to baseline different machine performance data and triage deviations from that baseline that can indicate a stealthy adversary’s presence in your environment when all other methods have failed. First, you will learn about CPU, RAM, and Hard drive metric data and how it can be used to detect anything from botnets to the use of hard drives as microphones for side-channel espionage. Next, you will discover the techniques used for “in-browser” crypto-jacking or malware delivered crypto mining activity by monitoring browser activity and GPU usage that stands out from the established baseline for normal applications. Finally, you will look at fan speeds and power usage to identify air-gapped network hopping techniques and hardware supply chain compromise. When you are finished with this course, you will have the skills and knowledge of not only how a multitude of advanced attacker techniques are performed, but also what they look like in a realistic environment and how to identify them as part of your security analyst operations.

GO TO TRAINING

Security Event Triage: Statistical Baselining with SIEM Data Integration

Description: As businesses innovate and make ground-breaking developments in the markets they operate within, successes can become reasons for advanced cyber threats to target your organization. In this course, Security Event Triage: Statistical Baselining with SIEM Data Integration, you will gain the ability to perform detection and analysis of threats at scale. First, you will learn which leg events to look for to identify suspicious activity. Next, you will discover how to pivot between indicators to find the root cause of the incident. Finally, you will explore how to correlate events from multiple sources across your estate to identify the actions on objective of the attacker as well as the impact. When you’re finished with this course, you will have the skills and knowledge of data analysis and baselining needed to detect threats at scale.

GO TO TRAINING

Security Architecture and Design: The Big Picture

Description: Every day we hear of another company that’s been hacked many with millions of user records stolen, leaked to the dark web, or sold to the highest bidder. Understanding what makes an effective security posture is essential to combating this ever-changing threat.

In this course, Security Architecture and Design: The Big Picture, you’ll learn the essential foundations of what makes an effective information security program along with what infrastructure and applications are required. First, you’ll learn about installing and configuring network components, then you’ll learn about secure protocols. Next, you’ll explore implementing secure network architecture and troubleshooting common security issues. Finally, you’ll discover secure systems design, application development and deployment, and physical security controls.

When you’ve finished this course, you’ll have a good understanding of the various pieces that make up a solid security posture. Not only will you understand all major components of information security, but also how they fit together, and how to architect them according to best practices, to protect a company’s data and digital assets.

GO TO TRAINING

Those were our picks of the top 14 Pluralsight Cybersecurity Courses to consider in 2021. Remember, get 33 percent off top-rated cybersecurity courses this week when you sign up for one of Pluralsight’s annual or premium subscriptions.

Also, consider downloading our Buyer’s Guide.

Solutions Review participates in affiliate programs. We may make a small commission from products purchased through this resource.

Ben Canner

Ben Canner is an enterprise technology writer and analyst covering Identity Management, SIEM, Endpoint Protection, and Cybersecurity writ large. He holds a Bachelor of Arts Degree in English from Clark University in Worcester, MA. He previously worked as a corporate blogger and ghost writer. You can reach him via Twitter and LinkedIn.
Ben Canner