Pluralsight CEU-Eligible Courses for CompTIA Network+ updated March 2018 Access Control Lists (ACLs) for Cisco CCNA 200-125/100-105 Advanced Access Control with Cisco ISE for CCNP Security (300-208) SISAS Advanced Malware Analysis: Combating Exploit Kits Advanced Persistent Threats: The Big Picture Advanced Security for CCNA Security (210-260) IINS Advanced Web Application Penetration Testing with Burp Suite Applying SQL Server 2016 Features to Real-world Data Problems Architecting and Implementing Azure Networking Architecting Azure Solutions (70-534): Application Storage and Data Access Strategy Architecting Azure Solutions (70-534): Design an Advanced Application Architecting Azure Solutions (70-534): Management, Monitoring, and Business Continuity Architecting Azure Solutions (70-534): Secure Resources Architecting Microsoft Azure Solutions (70-534): Design Web Apps Assessing and Mitigating Security Risks Automating Deployment and Scale of Azure IaaS Solutions AWS Certified Solutions Architect - Professional AWS Security Fundamentals AWS Security Operations: Designing for Acceptable Risk and Compliance AWS Security Operations: Securing Access to Object Storage AWS Security Operations: Securing Core AWS Infrastructure Services AWS Security Operations: Securing Managed Services Azure Resource Manager Deep Dive Azure Site Recovery: IaaS Migration and Disaster Recovery Azure SQL Data Warehouse: First Look Azure SQL Database for the SQL Server DBA Cisco ACI Programmability Cisco Data Center Network Design for CCDA DESGN (200-310) Cisco Edge Network Design for CCDA DESGN (200-310) Cisco ISE Guest Access for CCNP Security (300-208) SISAS Cisco Network Design Blocks for CCDA DESGN (200-310) CISSP - Communications and Network Security CISSP - Identity and Access Management CISSP - Security and Risk Management CISSP - Security Engineering CISSP - Security Operations CISSP : Security Assessment and Testing Citrix Networking Deep Dive Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Maintaining Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Managing Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Monitoring Citrix XenDesktop/XenApp 7.6 LTSR CCA-V: Troubleshooting Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Configuring Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Installing Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Introduction Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Pre-installation Citrix XenDesktop/XenApp 7.6 LTSR CCP-V: Testing 1
Computing, Communication, and Business Integration for CASP (CAS-002) Conducting Network Vulnerability Analysis Configuring a Cisco Router for Cisco CCNA 200-125/100-105 Create and Manage Virtual Machines on Microsoft Azure Creating a DMZ in Azure Cryptography: The Big Picture CSSLP : Secure Software Concepts CSSLP : Secure Software Requirements Cyber Security Awareness: Backing up Your Data Cyber Security Awareness: Digital Data Protection Cyber Security Awareness: Electronic Commerce Security Cyber Security Awareness: Identifying Personally Identifiable Information (PII) Cyber Security Awareness: Malware Explained Cyber Security Awareness: Mobile Device Security Cyber Security Awareness: Pairing Physical and Digital Security Cyber Security Awareness: Phishing and Whaling Cyber Security Awareness: Safer Digital Communications Cyber Security Awareness: Security by Geolocation Cyber Security Awareness: Security for Cloud Services Cyber Security Awareness: Security Overview Cyber Security Awareness: Social Engineering Cyber Security Awareness: Social Networking at Work Cyber Security Awareness: The Importance of Identity Protection Cyber Security Awareness: The Internet of Things (IoT) Cyber Security Awareness: The Protection and Destruction of Portable Data Cybersecurity Threats: Ransomware Data Center Infrastructure for CCNA Data Center (200-150/200-155) Deploy Azure Virtual Networks, VPNs, and Gateways Deploying and Integrating Azure AD Deploying and Managing Azure IaaS Virtual Machines Design a Database Environment with SQL Server 2014 (70-465) Design a Database Structure with SQL Server 2014 (70-465) Designing a Hybrid Cloud in Azure Designing and Implementing Security Policies Digital Forensics: Getting Started with File Systems Disaster Recovery for CompTIA Server+ (SK0-004) Enterprise Campus Design for CCDA DESGN (200-310) Enterprise IP Routing Design for CCDA DESGN (200-310) Enterprise IPv4/IPv6 Design for CCDA DESGN (200-310) Enterprise LAN Switching for Cisco CCNA 200-125/200-105 Enterprise Security for CASP (CAS-002) Enterprise Security for CASP (CAS-002) Enterprise Security: Policies, Practices, and Procedures Enterprise Security: Policies, Practices, and Procedures Enterprise WAN Network Design for Cisco CCDP ARCH (300-320) Ethical Hacking: Buffer Overflow Ethical Hacking: Cloud Computing Ethical Hacking: Cryptography 2
Ethical Hacking: Denial of Service Ethical Hacking: Evading IDS, Firewalls, and Honeypots Ethical Hacking: Hacking Mobile Platforms Ethical Hacking: Hacking Wireless Networks Ethical Hacking: Penetration Testing Ethical Hacking: Sniffing Ethical Hacking: Social Engineering Exam Review for CCNP R&S 300-135 TSHOOT Exploit Development and Execution with the Metasploit Framework Exploitation: Evading Detection and Bypassing Countermeasures External Footprinting: Reconnaissance and Mapping Firewalls for CCNA Security (210-260) IINS Fundamentals of Cloud Computing Fundamentals of Using Cisco ACI Getting Started Analyzing Malware Infections Getting Started with Azure Automation Getting Started with Azure Machine Learning Getting Started with Azure Operational Insights Getting Started with Citrix NetScaler Gateway 11 for XenDesktop Administrators Getting Started with OWASP Zed Attack Proxy (ZAP) for Web Application Penetration Testing Getting Started: Hybrid Identity with Microsoft Azure Google Cloud Platform Fundamentals Hands-On Incident Response Fundamentals How to Stop Man-in-the-Middle and Downgrade Attacks in Your Apps Implement Active Directory Domain Services in Windows Server 2016 Implement Windows Server 2016 IP Address Management (IPAM) Implementing a Security Assessment and Authorization Process Implementing Active Directory Certificate Services in Windows Server 2016 Implementing and Managing Azure Multi-factor Authentication Implementing and Securing Windows Server 2016 Core Networking Implementing Azure Application Services Implementing Containers on Windows Server 2016 Implementing High Availability in Windows Server 2016 Implementing Microsoft Azure Networking Implementing Physical Security Implementing Windows Server 2016 Connectivity and Remote Access Implementing Windows Server 2016 DHCP Implementing Windows Server 2016 Distributed Networking Services Implementing Windows Server 2016 DNS Implementing Windows Server 2016 Hyper-V Implementing Windows Server 2016 Identity Federation and Access Implementing Windows Server 2016 Software Defined Networking Implementing Windows Server 2016 Storage Solutions Importing and Exporting Oracle Data for DBAs Information Security Manager: Information Security Governance Information Systems Auditing: The Big Picture Information Systems Auditor: Acquisition and Development Information Systems Auditor: Governance and Management 3
Information Systems Auditor: Operations, Maintenance, and Service Information Systems Auditor: Protection of Information Assets Information Systems Auditor: The Process of Auditing Infrastructure Security for CCNP Routing & Switching 300-115 SWITCH Installing Windows Server 2016 Introduction to Penetration Testing Using Metasploit IPv6 and Microsoft Windows ISE Posture Services for CCNP Security (300-208) SISAS ISE Profiling Services for CCNP Security (300-208) SISAS ISO/IEC 27001 Information Security: The Big Picture Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Security Juniper Networks JNCIS-ENT (JN0-343): Layer 2 Switching and VLANs Juniper Networks JNCIS-ENT (JN0-343): Open Shortest Path First Juniper Networks JNCIS-ENT (JN0-343): Protocol-independent Routing Juniper Networks JNCIS-ENT (JN0-343): Spanning Tree Juniper Networks JNCIS-ENT: Intermediate System to Intermediate System Layer 2 Security for CCNA Security (210-260) IINS LFCE: Advanced Linux Networking LFCE: Advanced Network and System Administration LFCE: Linux Service Management - HTTP Services LFCE: Network and Host Security Linux Network Programming Linux Network Security (LPIC-3 303) Maintaining and Monitoring Windows Server 2016 Malware Analysis Fundamentals Malware Analysis: The Big Picture Manage and Maintain Active Directory Domain Services in Windows Server 2016 Managing and Supporting DirectAccess with Windows Server 2016 Managing AWS Security and Identity Managing Azure AD Managing Azure IaaS with PowerShell Managing Certificates with AWS Certificate Manager Managing Configurations with Azure Automation DSC Managing Configurations with Azure Automation DSC Managing Information Security Incidents (ISO/IEC 27002) Managing Information Security Threats & Risks (ISO/IEC 27002) Managing Infrastructure with Microsoft Azure - Getting Started Mastering Microsoft Azure Resource Manager Microsoft Azure Administration for AWS Administrators Microsoft Azure Architecture - Getting Started Microsoft Azure Architecture for AWS Architects Microsoft Azure IaaS Monitoring and Management - Getting Started Microsoft Azure Security - Getting Started Microsoft Azure Virtual Machines - Getting Started Network Fundamentals and Protocols Network Interface Layer and Ethernet Operation for Cisco CCNA 200-125/100-105 Network Penetration Testing Using Python and Kali Linux Network Services for Cisco CCNA 200-125/200-105 4
Network Vulnerability Scanning with OpenVAS Networking for CompTIA Server+ (SK0-004) OPSEC for Penetration Testers Payment Card Security, Processing, and the PCI Standards PCI DSS: The Big Picture Penetration Testing Automation Using Python and Kali Linux Penetration Testing Life Cycle Explained Penetration Testing OSINT Gathering with Recon-ng Penetration Testing SharePoint Penetration Testing: Setting the Scope and Rules of Engagement Penetration Testing: The Big Picture Performing and Analyzing Network Reconnaissance Performing OSINT Gathering on Corporate Targets Planning and Designing Microsoft Azure Compute Solutions Planning and Designing Microsoft Azure Networking Solutions Planning and Designing Microsoft Azure Security Solutions Play by Play: Enterprise Data Encryption with Azure Revealed Play by Play: Ethical Hacking - Deconstructing the Hack Play by Play: Exploring the Internet of Vulnerabilities Play by Play: Social Engineering with Troy Hunt and Lars Klint Post Exploitation: Performing Infrastructure Analysis Practical SQL Server In-Memory OLTP Tables and Objects Practical SQL Server Security, Compliance, and Auditing Pre 2017 - Create and Manage Virtual Machines for Azure Solutions (70-532) Pre 2017 - Design and Implement Web Apps for Azure Solutions (70-532) Pre 2017 - Implementing Active Directory for Azure Infrastructure (70-533) Pre 2017 - Implementing Storage for Azure Infrastructure (70-533) Pre 2017 - Implementing Virtual Machines for Azure Infrastructure (70-533) Pre 2017 - Implementing Virtual Networks for Azure Infrastructure (70-533) Pre 2017 - Implementing Web Apps for Azure Infrastructure (70-533) Pre 2017 - Prepare to Pass the Azure Solutions (70-532) Exam Pre 2017 - Preparing to Pass the Microsoft Azure (70-533) Exam Providing Disaster Recovery with Azure Services Research and Analysis for CASP (CAS-002) Risk Management and Incident Response for CASP (CAS-002) Risk Management and Information Systems Control: Introduction to Risk Risk Management and Information Systems Control: IT Risk Assessment Risk Management and Information Systems Control: Risk and Control Monitoring and Reporting Risk Management and Information Systems Control: Risk Identification Risk Management and Information Systems Control: Risk Response and Mitigation Risks, Vulnerabilities, and Threats Routing IPv4 and IPv6 for Cisco CCNA 200-125/100-105 Secure Software Development Securing AWS Using CIS Foundations Benchmark Security Standard Securing Linux Servers Securing Multi-tenant ASP.NET Web Apps Securing Network Devices for CCNA Security (210-260) IINS Securing Virtual Machines with Azure Key Vault 5
Securing Your Node.js Web App Security Concepts for CCNA Security (210-260) IINS Security for CompTIA Server+ (SK0-004) Security for Hackers and Developers: Code Auditing Security for Hackers and Developers: Exploit Development Security for Hackers and Developers: Fuzzing Security for Hackers and Developers: Overview Security for Hackers and Developers: Reverse Engineering Security Management: The Big Picture Server Administration for CompTIA Server+ (SK0-004) Server Architecture for CompTIA Server+ (SK0-004) Solving Real World Problems with SQL Server 2016 Query Store SQL Server 2016 New Features for Developers SQL Server Reporting Services Playbook SQL Server Standard Edition Survival Guide SQL Server: Analyzing Query Performance for Developers SQL Server: Building Simple Asynchronous Applications SQL Server: Consolidation Tactics and Best Practices SQL Server: Improving Storage Subsystem Performance SQL Server: Indexing for Performance SQL Server: Installing and Configuring SQL Server 2016 SQL Server: Introduction to Query Store SQL Server: Replacing Profiler with Extended Events SQL Server: Scaling SQL Server 2012 and 2014: Part 2 SQL Server: Understanding and Using Azure SQL Database SQL Server: Understanding and Using DBCC Commands SQL Server: Upgrading and Migrating to SQL Server 2016 Storage for CompTIA Server+ (SK0-004) Technical Integration of Enterprise Components for CASP (CAS-002) The Information Security Big Picture The Issues of Identity and Access Management (IAM) Threat Intelligence: The Big Picture Threat Modeling Fundamentals Threat Modeling: The Big Picture Troubleshooting and Exam Prep for Cisco CCNA 200-125/200-105 Troubleshooting Cisco Networks: Infrastructure Services for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: Internet Security for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: IPv4 Routing Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: IPv6 Routing Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Cisco Networks: Layer 2 Protocols for CCNP R&S 300-135 TSHOOT Troubleshooting Essentials for Cisco CCNA 200-125/100-105 Understanding and Using Azure Storage USB Forensics: Duplication USB Forensics: Writeblocking and Impersonation Using Cisco ACI with VMware vsphere Integration Using Failover Clusters in Windows Server 2016 VPNs for CCNA Security (210-260) IINS Web App Hacking: Caching Problems 6
Web App Hacking: Cookie Attacks Web App Hacking: Hacking Authentication Web App Hacking: Hacking Password Reset Functionality Web App Hacking: Sensitive Data Exposure Web Application Penetration Testing Fundamentals Web Application Penetration Testing with Burp Suite What's New in SQL Server 2016 Reporting Services Windows Server 2016 Security Hardening Windows Server Administration Fundamentals Using PowerShell Windows: How It's Hacked, How to Protect It Wireless Network Penetration Testing Wireless Network Penetration Testing Advanced Techniques Writing Penetration Testing Reports 7