We may earn an affiliate commission when you visit our partners.
Course image
Pluralsight Live
Nobody can afford to sit back and relax when it comes to security. Make sure you have the skills you need to protect yourself and your organization with these security-focused sessions from LIVE 2019.
Enroll now

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Taught by experts in the security industry, these sessions will provide practical skills for protecting yourself and your organization
Covers the latest security trends and threats, ensuring learners stay up-to-date on industry best practices
Suitable for individuals and organizations seeking to enhance their security
Focuses on real-world scenarios, providing learners with practical knowledge
Part of a series of 2019 LIVE events, offering a comprehensive and up-to-date approach to security

Save this course

Save Pluralsight LIVE 2019: Breakouts (Security) to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Pluralsight LIVE 2019: Breakouts (Security). These are activities you can do either before, during, or after a course.

Career center

Learners who complete Pluralsight LIVE 2019: Breakouts (Security) will develop knowledge and skills that may be useful to these careers:
Information Security Analyst
An Information Security Analyst is responsible for protecting an organization's information systems from unauthorized access, use, disclosure, disruption, modification, or destruction. They may also develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for an Information Security Analyst since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Security Engineer
A Security Engineer is responsible for designing, implementing, and maintaining an organization's security systems. They may also develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Security Engineer since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Security Analyst
A Security Analyst is responsible for maintaining computer systems and networks. They monitor, detect, and respond to potential security threats. They may also develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Security Analyst since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Cybersecurity Analyst
A Cybersecurity Analyst is responsible for monitoring and analyzing an organization's security systems and data. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Cybersecurity Analyst since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Security Consultant
A Security Consultant is responsible for providing security advice and guidance to organizations. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Security Consultant since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Incident Responder
An Incident Responder is responsible for responding to security incidents. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for an Incident Responder since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Penetration Tester
A Penetration Tester is responsible for simulating attacks on an organization's systems to identify vulnerabilities. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Penetration Tester since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Computer Forensics Analyst
A Computer Forensics Analyst is responsible for investigating computer crimes. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Computer Forensics Analyst since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Chief Information Security Officer (CISO)
A Chief Information Security Officer (CISO) is responsible for overseeing an organization's entire security program. They may also develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a CISO since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Ethical Hacker
An Ethical Hacker is responsible for using their hacking skills to identify vulnerabilities in an organization's systems. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for an Ethical Hacker since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Security Researcher
A Security Researcher is responsible for researching and developing new security technologies. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Security Researcher since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Threat Intelligence Analyst
A Threat Intelligence Analyst is responsible for collecting and analyzing information about potential security threats. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Threat Intelligence Analyst since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Security Manager
A Security Manager is responsible for overseeing an organization's security program. They may also develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Security Manager since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Security Auditor
A Security Auditor is responsible for auditing an organization's security systems and procedures. They may also help organizations to develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Security Auditor since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response
Cybersecurity Architect
A Cybersecurity Architect is responsible for designing, implementing, and maintaining an organization's cybersecurity infrastructure. They may also develop and implement security plans and procedures. The "Pluralsight LIVE 2019: Breakouts (Security)" course may be useful for a Cybersecurity Architect since the course covers topics such as: - Network security - Endpoint security - Cloud security - Incident response

Reading list

We haven't picked any books for this reading list yet.
Comprehensive overview of security awareness, and provides guidance for organizations on how to develop and implement a successful security awareness program.
Provides a comprehensive overview of cybersecurity awareness, and is written in a non-technical style that is easy to understand for everyone.
Comprehensive guide to the CEH exam, and includes a section on security awareness.
Provides a comprehensive overview of threat intelligence, covering the entire threat intelligence lifecycle, from collection and analysis to dissemination and consumption. It is written by two experienced security professionals who have worked in the field for many years.
Provides a step-by-step guide to threat modeling. It covers the different types of threat models, how to create a threat model, and how to use threat models to improve your organization's security. It is written by a leading expert in the field of threat modeling.
Provides a comprehensive overview of threat intelligence, covering the entire threat intelligence lifecycle, from collection and analysis to dissemination and consumption. It is written by two experienced security professionals who have worked in the field for many years.
Provides a practical guide to threat intelligence for security analysts. It covers the different types of threat intelligence, how to collect and analyze threat intelligence, and how to use threat intelligence to investigate advanced threats. It is written by two experienced security professionals who have worked in the field for many years.
Provides a unique perspective on threat intelligence by focusing on the human element of security. It covers the different types of social engineering attacks, how to defend against them, and how to use deception to protect your organization. It is written by Kevin Mitnick, one of the world's most famous hackers.
Classic in the field of computer security. It tells the story of how Clifford Stoll, a young systems administrator, discovered a spy ring operating inside his computer network. It fascinating and suspenseful account of one of the first major cyberattacks.
Provides a practical guide to malware analysis. It covers the different types of malware, how to analyze malware, and how to use malware analysis to protect your organization. It is written by two experienced security professionals who have worked in the field for many years.
Provides a comprehensive overview of incident response and computer forensics. It covers the different types of incidents, how to respond to incidents, and how to conduct computer forensics investigations. It is written by two experienced security professionals who have worked in the field for many years.
Provides a step-by-step guide to the threat intelligence process. It covers the different steps in the process, from collection and analysis to dissemination and consumption. It is written by two experienced security professionals who have worked in the field for many years.
Provides a comprehensive overview of network security. It good resource for anyone who wants to learn more about network security and how to protect their networks.
Provides a broad overview of computer networking, including a chapter on network security. It good resource for anyone who wants to understand the basics of network security.
Provides a comprehensive overview of cryptography and network security. It good resource for anyone who wants to learn more about these topics.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Similar courses are unavailable at this time. Please try again later.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser