Browse  ›  Information & cyber security  ›  Security Auditing
Icon

Grow your Security Auditing skills

Expand your security auditing skills with expert-led training that helps you confirm key systems, processes and documentation for your organization. Improve your team’s ability to perform cyber and IT security audits with know-how on the latest cyber security tools and processes. Learn from authors with real-world cyber security auditing experience and work toward leading security certifications.

Start a FREE 10-day trial
Learn on your own timelineLearn on your own timeline
Master your craftMaster your craft
Keep up with emerging trendsKeep up with emerging trends

Level up your Security Auditing skills

Learn the latest from experts with real-world experience.

Top Security Auditing paths

Top Security Auditing courses

Maximizing Nmap for Security Auditing
Course
Maximizing Nmap for Security Auditing
Matt Glass
Intermediate
1h 3m
How CTF Competitions Make You a Better Developer: CodeMash
Course
How CTF Competitions Make You a Better Developer: CodeMash
CodeMash
Beginner
58m
Security for Hackers and Developers: Code Auditing
Course
Security for Hackers and Developers: Code Auditing
Dr. Jared DeMott
Intermediate
2h 3m
The Information Systems Auditing Process: Conducting an Audit
Course
The Information Systems Auditing Process: Conducting an Audit
Kevin Henry
Intermediate
1h 43m
The Information Systems Auditing Process: Audit Planning
Course
The Information Systems Auditing Process: Audit Planning
Kevin Henry
Intermediate
2h 31m
Information Systems Auditing: Information Systems Acquisition and Development
Course
Information Systems Auditing: Information Systems Acquisition and Development
Kevin Henry
Intermediate
2h 28m
Information Systems Auditing: The Big Picture
Course
Information Systems Auditing: The Big Picture
Kevin Henry
Beginner
1h 34m
Information Systems Auditing: Implementation
Course
Information Systems Auditing: Implementation
Kevin Henry
Intermediate
1h 45m
Information Systems Operations: Monitoring
Course
Information Systems Operations: Monitoring
Kevin Henry
Intermediate
1h 50m
ISO/IEC 27001 Information Security: The Big Picture
Course
ISO/IEC 27001 Information Security: The Big Picture
Richard Harpur
Beginner
2h 20m
Information Systems Auditor: Protection of Information Assets
Course
Information Systems Auditor: Protection of Information Assets
Kevin Henry
Intermediate
6h 26m
The Information Systems Auditing Process: IT Governance
Course
The Information Systems Auditing Process: IT Governance
Kevin Henry
Intermediate
2h 17m
Information Systems Auditor: The Process of Auditing
Course
Information Systems Auditor: The Process of Auditing
Kevin Henry
Intermediate
3h 51m
The Information Systems Auditing Process: IT Management
Course
The Information Systems Auditing Process: IT Management
Kevin Henry
Intermediate
1h 38m
Information Systems Auditor: Operations, Maintenance, and Service
Course
Information Systems Auditor: Operations, Maintenance, and Service
Kevin Henry
Intermediate
3h 7m
Information Systems Auditor: Acquisition and Development
Course
Information Systems Auditor: Acquisition and Development
Kevin Henry
Intermediate
3h 26m
Information Systems Auditor: Governance and Management
Course
Information Systems Auditor: Governance and Management
Kevin Henry
Intermediate
5h 8m
Keep Your Data Lake from Getting Hadooped
Course
Keep Your Data Lake from Getting Hadooped
Big Data LDN
Intermediate
27m
CCSP: Cloud Governance, Data Privacy, and Audit
Course
CCSP: Cloud Governance, Data Privacy, and Audit
Lyron Andrews
Intermediate
1h 12m
CSSLP®: Supply Chain and Software Acquisition
Course
CSSLP®: Supply Chain and Software Acquisition
Kevin Henry
Intermediate
45m
Network Fundamentals and Protocols
Course
Network Fundamentals and Protocols
Daniel Lachance
Beginner
1h 54m
Introduction to Information Security
Course
Introduction to Information Security
Keith Watson
Beginner
2h 54m
CSSLP®: Secure Software Concepts
Course
CSSLP®: Secure Software Concepts
Kevin Henry
Intermediate
4h 36m
Security for Hackers and Developers: Fuzzing
Course
Security for Hackers and Developers: Fuzzing
Dr. Jared DeMott
Intermediate
2h 9m
Implementing the 20 CIS Critical Security Controls
Course
Implementing the 20 CIS Critical Security Controls
Taylor Jones
Beginner
3h 15m
Implementing a Security Assessment and Authorization Process
Course
Implementing a Security Assessment and Authorization Process
Richard Harpur
Intermediate
2h 27m
Evaluating Your Organization’s Security Posture
Course
Evaluating Your Organization’s Security Posture
Paul Mealus
Intermediate
3h 23m
Preventing Threats Using Palo Alto Firewalls
Course
Preventing Threats Using Palo Alto Firewalls
Craig Stansbury
Intermediate
2h 47m
Assessing and Mitigating Security Risks
Course
Assessing and Mitigating Security Risks
Dale Meredith
Beginner
3h 14m
Securing Java Web Applications Through Authentication
Course
Securing Java Web Applications Through Authentication
Josh Cummings
Intermediate
2h 21m

The Technology Skills Platform

Pluralsight IQ

Pluralsight IQ

Validate skill levels with assessments that take 5 minutes or less.

Channels

Channels

Curate and share Pluralsight content to reach your learning goals faster.

Hands-on learning

Hands-on learning

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.

Thousands of courses

Thousands of courses

Keep up with the pace of change with expert-led, in-depth courses.

WHAT IS PLURALSIGHT?

Your career is defined by what you know and how well you know it. 

With our platform, you can benchmark and prove your knowledge, keep up with emerging trends and build in-demand skills in areas like DevOps, machine learning, cloud, security and infrastructure. 

What our customers are saying

Join
the Tech skills
revolution

Premium

$449.00
per year
Access to exams, projects and interactive courses.
Hide all features

Future proof
your skills