We may earn an affiliate commission when you visit our partners.
Pluralsight LIVE

Safeguard your organization from threats by leveling up your security know-how.

Nobody can afford to sit back and relax when it comes to security. Make sure you have the skills you need to protect yourself and your organization with these security-focused sessions from LIVE 2018.

Enroll now

What's inside

Syllabus

Ethical Hacking: DIY Mobile Security Workstation for Cheap with Dale Meredith
How to Conduct a Product Security Test and How It Fits into the Larger Security Strategy with Jared Demott
Read more
Understanding How HTTPS Protects Your Data with Ross Bagurdes
Reconnaissance: How Hackers Decide if Your Company Is a Target with Dale Meredith
Rating Risks: Why and How to Triage Your Software Vulnerabilities with Peter Mosmans
SSO for Your Fridge: IoT Security with the OAuth Device Flow with Scott Brady

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Covers a range of topics relevant to security professionals, including ethical hacking, product security testing, HTTPS protection, reconnaissance, risk rating, and IoT security
Features expert instructors from LIVE 2018, providing learners with access to industry knowledge and insights
Suitable for security professionals seeking to enhance their skills and stay up-to-date with industry best practices
Participants gain hands-on experience through real-world case studies and demonstrations, promoting practical application of concepts
Requires a solid understanding of security principles and practices, making it more suitable for intermediate-level learners
May necessitate additional learning resources or prerequisites for those new to security concepts

Save this course

Save Pluralsight LIVE 2018: Get Your Geek On (Security) to your list so you can find it easily later:
Save

Activities

Be better prepared before your course. Deepen your understanding during and after it. Supplement your coursework and achieve mastery of the topics covered in Pluralsight LIVE 2018: Get Your Geek On (Security) with these activities:
Review Basic Cryptography
Prepare for success in this security-focused course by refreshing your cryptography knowledge
Browse courses on Cryptographic Algorithms
Show steps
  • Look through notes and textbooks
  • Solve practice problems with encryption, symmetric ciphers, and hashes
Hack This!! Ethical Hacking Challenges
Hone your security skills with ethical hacking challenges and exercises
Browse courses on Ethical Hacking
Show steps
  • Set up a safe practice environment
  • Go through exercises in a virtual environment
Build a Security Awareness Toolkit
Develop practical resources and materials to enhance organizational understanding of security best practices
Browse courses on Security Awareness
Show steps
  • Identify the target audience and define learning objectives
  • Gather relevant information on security best practices
  • Organize and present the information in a clear and engaging format
Five other activities
Expand to see all activities and additional details
Show all eight activities
Seek Mentorship from Security Experts
Build valuable connections while enriching your security knowledge through mentorship
Show steps
  • Attend industry events and conferences
  • Reach out to professionals in your network
Curate a Collection of Security Best Practices
Strengthen your security knowledge by compiling a comprehensive resource of best practices
Browse courses on Security Best Practices
Show steps
  • Gather resources from reliable sources, such as industry reports, whitepapers, and standards documents
  • Organize and categorize the information logically
  • Create a summary or table of contents for easy navigation
Read: 'The Art of Deception: Controlling the Human Element of Security'
Build a deeper understanding of human vulnerabilities in security by reading this insightful book
Show steps
  • Read each chapter thoroughly
  • Summarize the main ideas of each chapter
  • Apply these lessons to improve your security knowledge and practices
Follow Tutorials on Network Security Monitoring
Expand your understanding of network security by exploring comprehensive tutorials
Show steps
  • Search for reputable sources of tutorials
  • Identify tutorials that cover relevant topics
  • Follow the tutorials and complete the exercises
Contribute to Open Source Security Projects
Enhance your understanding and skills by contributing to open source projects that focus on security
Browse courses on Open Source Security
Show steps
  • Identify a suitable project that aligns with your interests and skill level
  • Set up a development environment and familiarize yourself with the project codebase
  • Make meaningful contributions to the project

Career center

Learners who complete Pluralsight LIVE 2018: Get Your Geek On (Security) will develop knowledge and skills that may be useful to these careers:
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for overseeing the security of an organization's entire IT infrastructure. They may also be responsible for developing and implementing security policies and procedures. This course may be helpful because it provides an overview of different security topics and how to apply them to real-world scenarios.
Security Architect
Security Architects design and implement security solutions for organizations. This course may be helpful because it provides an overview of different security technologies and how to apply them to real-world scenarios.
Cybersecurity Engineer
Cybersecurity Engineers design, implement, and maintain security systems to protect organizations from cyberattacks. This course may be helpful because it provides hands-on experience with different security technologies.
Cloud Security Engineer
Cloud Security Engineers design, implement, and maintain security systems for cloud-based applications and services. This course may be helpful because it provides an overview of different cloud security technologies.
Penetration Tester
Penetration Testers help organizations identify and fix security vulnerabilities by simulating attacks on their systems. This course may be useful because it provides hands-on experience with different hacking techniques.
Information Security Manager
Information Security Managers are responsible for overseeing the security of an organization's information assets. They may also be responsible for developing and implementing security policies and procedures. This course may be helpful because it provides an overview of different security topics and how to apply them to real-world scenarios.
Application Security Engineer
Application Security Engineers design, implement, and maintain security systems for software applications. This course may be helpful because it provides an overview of different application security technologies.
Network Security Engineer
Network Security Engineers design, implement, and maintain security systems for computer networks. This course may be helpful because it provides an overview of different network security technologies.
Vulnerability Manager
Vulnerability Managers identify and manage security vulnerabilities in software and hardware. This course may be helpful because it provides an overview of different vulnerability management techniques.
Security Researcher
Security Researchers identify and exploit security vulnerabilities in software and hardware. This course may be helpful because it provides hands-on experience with different hacking techniques.
Security Auditor
Security Auditors assess the security of organizations' information systems. This course may be helpful because it provides an overview of different security auditing techniques.
Forensic Analyst
Forensic Analysts investigate computer crimes and cyberattacks. This course may be helpful because it provides an overview of different forensic techniques.
Incident Responder
Incident Responders respond to and handle security incidents. This course may be helpful because it provides an overview of different incident response procedures.
Security Consultant
Security Consultants help organizations develop and implement security plans and procedures. They may also be responsible for providing security training to employees. This course may be helpful because it provides an overview of different security topics and how to apply them to real-world scenarios.
Security Analyst
Security Analysts help organizations protect their information assets by developing and implementing security controls. They may also be responsible for monitoring security systems and investigating security breaches. This course may be helpful because it provides an overview of different security threats and how to protect against them.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Pluralsight LIVE 2018: Get Your Geek On (Security).
For learners who want to dive deep into cryptography, this book will teach you the engineering side of cryptography, with lots of math.
This great reference book for people who are interested in application security. It provides a comprehensive overview of the field and is considered to be one of the leading books on the subject.
This college-level textbook that great resource for advanced learners who want to learn more about the engineering side of security. It provides a comprehensive overview of the field and is considered to be one of the leading textbooks on the subject.
Provides a comprehensive overview of cloud security and is considered to be one of the leading books on the subject.
Is excellent for teaching social engineering tips & techniques. It will help you understand the mindset of attackers and hackers.
Good resource for learning how to analyze malware and reverse engineer. If you are interested in malware this book is an excellent addition to your library.
Focuses on how to secure larger networks and is geared toward more advanced security learners. This great book for people who want to learn more about real-world security.
This great book on buffer overflow and other software security exploits. It bit dated but still contains information that is relevant to security.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Pluralsight LIVE 2018: Get Your Geek On (Security).
Building and Implementing a Security Awareness Training...
Basic Network and Database Security
IT Professional Fundamentals: Security
Cyber Security: Executive Briefing
Cybersecurity Roles and Operating System Security
Vulnerability Management for CySA+
How to Be a SOAR Winner
Security Orchestration, Automation and Response (SOAR):...
Implementing and Managing Microsoft 365 Information...
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser