
Brandon DeVault
Pluralsight Author
Brandon DeVault is a Security Researcher focused on threat hunting at CrowdStrike. He is also a member of the Florida Air National Guard with a variety of offensive and defensive experience. Prior to joining CrowdStrike, Brandon worked full-time as an author with Pluralsight and at Elastic, creating and delivering security content. He also worked with Special Operations Command, where he had two deployments to Afghanistan on deployable communications teams. His experience spans incident response, threat hunting, penetration testing, satellite communications, and system/network administration.
Topics Authored
Security Professional
Contents Authored
42
Total Ratings
1298
Avg Course Ratings
4.5
Courses by Brandon
-
Labs
SecurityLab - Incident Response: Network AnalysisSecurityIntermediate
6h 15m
Mar 01, 2025
(43)Labs
SecurityNetwork Protocols for Security: SMBSecurityBeginner
50m
Nov 04, 2024
(34)Course
SecuritySecurity Operations for CompTIA SecurityXSecurityIntermediate
1h 50m 10s
Oct 01, 2024
Course
SecuritySecurity Engineering: Secure Network Implementation for CompTIA SecurityXSecurityIntermediate
1h 29m 41s
Oct 01, 2024
Course
SecuritySecurity Engineering: Troubleshooting IAM and Networks for CompTIA SecurityXSecurityIntermediate
42m 28s
Oct 01, 2024
Course
SecuritySecurity Architecture: Secure Network Integrations for CompTIA SecurityXSecurityIntermediate
52m 4s
Oct 01, 2024
Course
SecuritySecurity Engineering: Automation for CompTIA SecurityXSecurityIntermediate
1h 4m 9s
Oct 01, 2024
Course
SecurityExam Review and Tips for CompTIA SecurityXSecurityIntermediate
23m 19s
Oct 01, 2024
Course
SecuritySecurity Architecture: Secure Network Design for CompTIA SecurityXSecurityIntermediate
41m 25s
Oct 01, 2024
Course
SecurityGovernance, Risk, and Compliance for CompTIA SecurityXSecurityIntermediate
1h 29m 6s
Oct 01, 2024
Labs
SecurityNetwork Protocols for Security: ICMPSecurityBeginner
2h 5m
Sep 17, 2024
(36)Labs
SecurityLab - Threat Hunting: Network HuntingSecurityIntermediate
2h 5m
Sep 11, 2024
(45)Labs
SecurityNetwork Protocols for Security: IPv4 and ARPSecurityBeginner
2h 5m
Sep 04, 2024
(57)Labs
SecurityNetwork Protocols for Security: HTTPSecurityBeginner
1h 50m
Sep 04, 2024
(163)Labs
SecurityLog4j Vulnerability Lab: Emulation and DetectionSecurityIntermediate
2h 35m
Aug 26, 2024
(227)Labs
SecurityNetwork Protocols for Security: DNSSecurityBeginner
2h 5m
Aug 21, 2024
(175)Labs
SecurityNetwork Protocols for Security: TCP and UDPSecurityBeginner
2h 5m
Jul 31, 2024
(88)Labs
SecurityActive Directory Security Hands-on SandboxSecurityIntermediate
4h 30m
Jul 25, 2024
(91)Course
SecuritySpecialized Hunts: Threat Hunting within Virtual MachinesSecurityBeginner
38m 6s
Mar 15, 2024
Course
SecurityNetwork Protocols for Security: SMBSecurityBeginner
12m 41s
Nov 08, 2023
Course
SecurityBuilding a Strong Cyber Security FoundationSecurityBeginner
8m 10s
Nov 03, 2023
(15)Course
SecurityTorchServe Vulnerabilities: What You Should KnowSecurityBeginner
19m 1s
Oct 05, 2023
Course
SecurityNetwork Protocols for Security: DNSSecurityBeginner
17m 36s
Sep 28, 2023
Labs
SecurityNetwork Protocols for Security CapstoneSecurityBeginner
5h
Sep 20, 2023
(24)Course
SecurityKubernetes on Windows Vulnerability: What You Should KnowSecurityBeginner
12m 34s
Sep 18, 2023
Course
SecuritySecurity Hot Takes: LastPass BreachSecurityBeginner
33m 15s
Sep 06, 2023
Course
SecurityVMWare ESXi Vulnerability: What You Should KnowSecurityBeginner
4m 57s
Aug 30, 2023
(11)Course
SecuritySecurity Hot Takes: SBOMsSecurityBeginner
18m 32s
Aug 30, 2023
Course
SecurityNetwork Protocols for Security: ICMPSecurityBeginner
18m 13s
Aug 17, 2023
(15)Course
SecurityMOVEit Vulnerability: What You Should KnowSecurityBeginner
17m 34s
Jul 28, 2023
Course
SecurityMicrosoft Outlook Elevation of Privilege Vulnerability: What You Should KnowSecurityBeginner
5m 45s
Jun 28, 2023
Course
SecurityNetwork Protocols for Security: HTTPSecurityBeginner
19m 43s
Jun 02, 2023
(17)Course
SecurityNetwork Protocols for Security: IPv4 and ARPSecurityBeginner
18m 8s
Apr 20, 2023
(18)Course
SecurityThreat Hunting: Review, Automate, and ImproveSecurityIntermediate
1h 36m 34s
Mar 03, 2023
Course
SecurityThreat Hunting: Endpoint HuntingSecurityIntermediate
1h 21m 41s
Feb 18, 2023
(18)Course
SecurityNetwork Protocols for Security: TCP and UDPSecurityBeginner
20m 27s
Feb 09, 2023
(21)Course
SecurityTalking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell ExploitSecurityIntermediate
57m 37s
Oct 31, 2022
Course
SecurityApache Commons Text Vulnerability: What You Should KnowSecurityBeginner
10m 15s
Oct 21, 2022
(19)Course
SecurityThreat Hunting: Network HuntingSecurityIntermediate
1h 29m 59s
Apr 21, 2022
(32)Course
SecurityLog4j Vulnerability Lab: Video WalkthroughSecurityBeginner
22m 32s
Mar 21, 2022
Course
SecurityIncident Response: Network AnalysisSecurityIntermediate
1h 10m 45s
Mar 09, 2022
(22)Course
SecurityLog4j Vulnerability: What You Should KnowSecurityBeginner
8m 50s
Dec 17, 2021
(77)
-
Course
SecuritySecurity Operations for CompTIA SecurityXSecurityIntermediate
1h 50m 10s
Oct 01, 2024
Course
SecuritySecurity Engineering: Secure Network Implementation for CompTIA SecurityXSecurityIntermediate
1h 29m 41s
Oct 01, 2024
Course
SecuritySecurity Engineering: Troubleshooting IAM and Networks for CompTIA SecurityXSecurityIntermediate
42m 28s
Oct 01, 2024
Course
SecuritySecurity Architecture: Secure Network Integrations for CompTIA SecurityXSecurityIntermediate
52m 4s
Oct 01, 2024
Course
SecuritySecurity Engineering: Automation for CompTIA SecurityXSecurityIntermediate
1h 4m 9s
Oct 01, 2024
Course
SecurityExam Review and Tips for CompTIA SecurityXSecurityIntermediate
23m 19s
Oct 01, 2024
Course
SecuritySecurity Architecture: Secure Network Design for CompTIA SecurityXSecurityIntermediate
41m 25s
Oct 01, 2024
Course
SecurityGovernance, Risk, and Compliance for CompTIA SecurityXSecurityIntermediate
1h 29m 6s
Oct 01, 2024
Course
SecuritySpecialized Hunts: Threat Hunting within Virtual MachinesSecurityBeginner
38m 6s
Mar 15, 2024
Course
SecurityNetwork Protocols for Security: SMBSecurityBeginner
12m 41s
Nov 08, 2023
Course
SecurityBuilding a Strong Cyber Security FoundationSecurityBeginner
8m 10s
Nov 03, 2023
(15)Course
SecurityTorchServe Vulnerabilities: What You Should KnowSecurityBeginner
19m 1s
Oct 05, 2023
Course
SecurityNetwork Protocols for Security: DNSSecurityBeginner
17m 36s
Sep 28, 2023
Course
SecurityKubernetes on Windows Vulnerability: What You Should KnowSecurityBeginner
12m 34s
Sep 18, 2023
Course
SecuritySecurity Hot Takes: LastPass BreachSecurityBeginner
33m 15s
Sep 06, 2023
Course
SecurityVMWare ESXi Vulnerability: What You Should KnowSecurityBeginner
4m 57s
Aug 30, 2023
(11)Course
SecuritySecurity Hot Takes: SBOMsSecurityBeginner
18m 32s
Aug 30, 2023
Course
SecurityNetwork Protocols for Security: ICMPSecurityBeginner
18m 13s
Aug 17, 2023
(15)Course
SecurityMOVEit Vulnerability: What You Should KnowSecurityBeginner
17m 34s
Jul 28, 2023
Course
SecurityMicrosoft Outlook Elevation of Privilege Vulnerability: What You Should KnowSecurityBeginner
5m 45s
Jun 28, 2023
Course
SecurityNetwork Protocols for Security: HTTPSecurityBeginner
19m 43s
Jun 02, 2023
(17)Course
SecurityNetwork Protocols for Security: IPv4 and ARPSecurityBeginner
18m 8s
Apr 20, 2023
(18)Course
SecurityThreat Hunting: Review, Automate, and ImproveSecurityIntermediate
1h 36m 34s
Mar 03, 2023
Course
SecurityThreat Hunting: Endpoint HuntingSecurityIntermediate
1h 21m 41s
Feb 18, 2023
(18)Course
SecurityNetwork Protocols for Security: TCP and UDPSecurityBeginner
20m 27s
Feb 09, 2023
(21)Course
SecurityTalking Tradecraft @ Pluralsight: A Technical Dive into the Log4Shell ExploitSecurityIntermediate
57m 37s
Oct 31, 2022
Course
SecurityApache Commons Text Vulnerability: What You Should KnowSecurityBeginner
10m 15s
Oct 21, 2022
(19)Course
SecurityThreat Hunting: Network HuntingSecurityIntermediate
1h 29m 59s
Apr 21, 2022
(32)Course
SecurityLog4j Vulnerability Lab: Video WalkthroughSecurityBeginner
22m 32s
Mar 21, 2022
Course
SecurityIncident Response: Network AnalysisSecurityIntermediate
1h 10m 45s
Mar 09, 2022
(22)Course
SecurityLog4j Vulnerability: What You Should KnowSecurityBeginner
8m 50s
Dec 17, 2021
(77)
-
Labs
SecurityLab - Incident Response: Network AnalysisSecurityIntermediate
6h 15m
Mar 01, 2025
(43)Labs
SecurityNetwork Protocols for Security: SMBSecurityBeginner
50m
Nov 04, 2024
(34)Labs
SecurityNetwork Protocols for Security: ICMPSecurityBeginner
2h 5m
Sep 17, 2024
(36)Labs
SecurityLab - Threat Hunting: Network HuntingSecurityIntermediate
2h 5m
Sep 11, 2024
(45)Labs
SecurityNetwork Protocols for Security: IPv4 and ARPSecurityBeginner
2h 5m
Sep 04, 2024
(57)Labs
SecurityNetwork Protocols for Security: HTTPSecurityBeginner
1h 50m
Sep 04, 2024
(163)Labs
SecurityLog4j Vulnerability Lab: Emulation and DetectionSecurityIntermediate
2h 35m
Aug 26, 2024
(227)Labs
SecurityNetwork Protocols for Security: DNSSecurityBeginner
2h 5m
Aug 21, 2024
(175)Labs
SecurityNetwork Protocols for Security: TCP and UDPSecurityBeginner
2h 5m
Jul 31, 2024
(88)Labs
SecurityActive Directory Security Hands-on SandboxSecurityIntermediate
4h 30m
Jul 25, 2024
(91)Labs
SecurityNetwork Protocols for Security CapstoneSecurityBeginner
5h
Sep 20, 2023
(24)