Pluralsight Courses
Pluralsight connects technology professionals with the best learning resources to develop in-demand skills and stay competitive.
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Flogos%2Fproviders%2Fpluralsight-hz.png?auto=format&ixlib=php-4.1.0&s=be01e61bc05520836c8c6d0a7cf5f18d)
![](https://ccweb.imgix.net/https%3A%2F%2Fwww.classcentral.com%2Fimages%2Flogos%2Fproviders%2Fpluralsight-hz.png?auto=format&ixlib=php-4.1.0&s=be01e61bc05520836c8c6d0a7cf5f18d)
Pluralsight Courses
Pluralsight connects technology professionals with the best learning resources to develop in-demand skills and stay competitive.
Penetration Testing: Setting the Scope and Rules of Engagement
IBM Certified Deployment Professional - Security QRadar SIEM V7.4.3 (C1000-140)
Malware Detection and Analysis with Python
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Splunk 9: Introduction to Splunk for Security Detection and Monitoring
Splunk 9: Employing the Splunk Common Information Model (CIM)
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Splunk 9: Configuring and Administering Splunk Indexer Clusters
Web Application Penetration Testing: Business Logic Testing
Identity Management, Authentication, and Access Control with Squid
Identity Management, Authentication and Access Control with pfSense
Splunk 8: Configuring and Administering Splunk Indexer Clusters
Malware Trends Report: 01 - XLM Macros Still Making the Rounds
Application Analysis with Endlessh
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Configuring Threat Intelligence in Splunk Enterprise Security
Interview with Troy Hunt, Creator of Have I Been Pwned, Web Security Expert & Pluralsight Author
Cisco Data Center Core: Applying Network, Compute, and Storage Security
EU Panel: The Joys of Integrating Security Testing into Your Pipeline
Cisco Core Security: Email Security with Cisco ESA
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Cisco Enterprise Networks: First Hop Redundancy Protocols
Designing Cisco Enterprise Networks: IPv4 and IPv6 Addressing Design
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Cisco Core Security: Secure Network Access, Visibility, and Enforcement
Splunk Enterprise Administration: Managing Users and Authentication
Building and Implementing an Enterprise-level Phishing Program
Designing and Creating Add-ons for Splunk Enterprise Security
Collection Is Not Detection and Other Rules for Modernising Sec Ops
From Developer to Security: Looking at Security from a Developer Lens
Americas Panel: Lessons Learned from the DevSecOps Trenches
The Biggest Security Talent Pool Youโve Never Heard Of
Adopting DevSecOps: The Holy Grail of Sustainable Security
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Security Event Triage: Monitoring Network Application Services
Enumerating the Network Infrastructure as a Forensics Analyst
Splunk Enterprise Administration: Monitoring and Creating Inputs
Splunk Enterprise Administration: Managing Data and Forwarders
Information Systems Asset Protection: Securing System Components
Security Orchestration, Automation and Response (SOAR): The Big Picture
Building and Implementing a Security Awareness Training Program
Splunk Enterprise Administration: Parsing and Manipulating Data
Security Champion: OWASP Top 10
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Cisco Core Security:ย Endpoint Protection and Detection with Cisco AMP
Security Operations: Provision, Baseline, and Monitor for CISSPยฎ
Security Event Triage: Statistical Baselining with SIEM Data Integration
People Information Gathering with the Social Engineering Toolkit (SET)
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Initial Access with King Phisher
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Planning, Deploying, and Configuring Splunk Enterprise Security
Software-Defined Perimeter (SDP): Leveraging Zero Trust to Create a New Network and Security Architecture
Planning, Deploying, and Maintaining QRadar
Security Architecture and Engineering: Build Defenses for CISSPยฎ
Web Application Penetration Testing: Information Gathering
Cisco Core Security: Content Security with Cisco WSA & Cisco Umbrella
Web Application Penetration Testing: Configuration and Deployment Management Testing
Securing the Vote: Everything You Need to Know About Election Security
Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Developing and Implementing Vulnerability Management Programs
Penetration Testing with Red, Blue, and Purple Teams: Executive Briefing
Defeating Anti-reverse Engineering and Anti-debugging Techniques
Tuning and Creating Correlation Searches in Splunk Enterprise Security
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Web Application Penetration Testing: Insecure Error Handling
Security Event Triage: Detecting Network Anomalies with Behavioral Analysis
Malware Analysis: Identifying and Defeating Code Obfuscation
Zero Trust Architecture (ZTA): Use Case Identification and Implementation
Protecting Endpoints with Microsoft Defender Advanced Threat Protection
Security Event Triage: Analyzing Live System Process and Files
Performing Threat Modeling with the Microsoft Threat Modeling Methodology
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Payment Card Industry Data Security Standard (PCI DSS): Executive Briefing
Splunk Enterprise Administration: Working with Configuration Files and Indexes
Manage Palo Alto Firewalls with Panorama and Implement High Availability
Implementing the NIST Framework for Improving Critical Infrastructure Cybersecurity in Your Organization
Web Application Penetration Testing: Session Management Testing
Blue Team Tools: Defense against Adversary Activity Using MITRE Techniques
Secure Coding: Identifying and Mitigating XML External Entity (XXE) Vulnerabilities
Password and Wireless Attacks with Kali Linux
Threat Modeling with the Microsoft Threat Modeling Tool
Android Security: Inter-app and Network Communication Security
Working with Memory Dumps and Debugging Using Sysinternals Tools
Testing Security Controls and Detecting Vulnerabilities with Nmap
Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing
Adapting to the New Normal: Embracing a Security Culture of Continual Change
Defending Against JavaScript Keylogger Attacks on Payment Card Information
Penetration Testing of Identity, Authentication and Authorization Mechanism
Deploying, Administering, and Securing Palo Alto Firewalls
Deploy, Administer, and Secure Palo Alto Firewalls
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Getting Started with Reverse Engineering
Notice: Undefined offset: 0 in /home/u615934359/domains/moocable.com/public_html/app/controllers/ApiController.php on line 108
๐
Notice: Trying to access array offset on value of type null in /home/u615934359/domains/moocable.com/public_html/app/views/partials/provider/view.php on line 180
Ethical Hacking: Reconnaissance/Footprinting
Information Security Manager: Information Security Incident Management
Information Security Manager: Information Security Program Management
Introduction to Information Security within Cloud Computing
Information Security Manager: Information Security Governance
Routing for CCNA Data Center (200-150/200-155)
Introduction to the Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Exam
Microsoft Security, Compliance, and Identity Fundamentals (SC-900): Exam Prep
LFCS Additional Essential Commands Topics
Optimize Enterprise-scale Data Models - DP-500
Certificate in Cybersecurity Analysis (IIBAยฎ-CCA): Cybersecurity Operational Components
Ingest and Transform Data by Using Power BI - DP-500
Certificate in Cybersecurity Analysis (IIBAยฎ- CCA): User Access Controls
Certificate in Cybersecurity Analysis (IIBAยฎ- CCA): Certification Overview and Study Plan
Introduction to the Configuring and Operating Microsoft Azure Virtual Desktop (AZ-140) Exam
Introduction to the Microsoft Identity and Access Administrator (SC-300) Exam
Certificate in Cybersecurity Analysis (IIBAยฎ-CCA): Data Security Concepts
Certificate in Cybersecurity Analysis (IIBAยฎ- CCA): Cybersecurity Risks and Controls
Certificate in Cybersecurity Analysis (IIBAยฎ- CCA): Cybersecurity Analysis Techniques
AWS SysOps Admin: Implement High Availability and Resilient Environments
AWS SysOps Admin: Implement Networking Features and Connectivity
AWS SysOps Admin: Remediate Issues Based on Monitoring and Availability Metrics
Introduction to Exam AZ-801: Configuring Windows Server Hybrid Advanced Services
Security Operations and Administration for SSCPยฎ
Microsoft 365 Messaging: Implementing a Hybrid Configuration and Migration
Introduction to the SC-300: Microsoft Identity and Access Administrator Exam
Certification in Business Data Analytics (IIBAยฎ- CBDA): The Domain Areas
AWS SysOps Admin: Implement Performance Optimization Strategies
AWS SysOps Admin: Implement Data and Infrastructure Protection Strategies
Certification in Business Data Analytics (IIBAยฎ-CBDA): Applying to the Organization
Introduction to Linux Foundation Certified System Administrator (LFCS) Certification
Introduction to the SC-400: Microsoft Information Protection Administrator Exam
AWS SysOps Admin: Configure Domains, DNS Services, and Content Delivery
Certification in Business Data Analytics (IIBAยฎ-CBDA): Essential Data Analytics Concepts
High Availability and Disaster Recovery on AWS for DevOps Engineers
Introduction to Exam AZ-800: Administering Windows Server 2022 Hybrid Core Infrastructure
Getting Started with Agile Business Analysis and the IIBA-AAC Certification
Microsoft Security, Compliance, and Identity Fundamentals: Compliance Solutions
Microsoft Security, Compliance, and Identity Fundamentals: Security Solutions
Enterprise LAN Switching for Cisco CCNA 200-125/200-105
Microsoft Security, Compliance, and Identity Fundamentals: Identity and Access Management Solutions
Introduction to the Microsoft Security, Compliance, and Identity Fundamentals (SC-900) Exam
Introduction to Microsoft Modern Desktop Administrator MD-100 and MD-101 Exams
Preparing Your Organization for ISO 27001:2013 Compliance/Certification