
Lee Allen
Pluralsight Author
With over two decades of experience in the security industry, Lee is a seasoned professional with a proven track record of delivering top-notch security services to a diverse range of organizations. From Internet Service Providers and computer manufacturers to global pharmaceutical companies, public universities, and a major bank, Lee has worked with some of the biggest names in the industry. With experience as a leader of the penetration testing team at a large bank, Lee has developed deep expertise in identifying vulnerabilities and developing effective mitigation strategies. He is also an author, having published multiple books on penetration testing and creating more than a dozen video courses on various security topics for Pluralsight. Currently, Lee is focused on leveraging his skills in static application security testing to help financial institutions strengthen their defenses against cyber threats.
Topics Authored
Security Professional
Contents Authored
25
Total Ratings
600
Avg Course Ratings
4.5
Courses by Lee
-
Labs
SecurityThreat Modeling in ActionSecurityBeginner
1h 35m
Feb 25, 2025
Labs
SecurityGain Access to a Network using PowerShellSecurityIntermediate
50m
Jan 30, 2025
(14)Labs
SecurityHunting for C2 and TunnelingSecurityIntermediate
1h 15m
Jan 24, 2025
(12)Labs
SecurityHunting for Suspicious HTTPS TrafficSecurityIntermediate
1h 35m
Jan 15, 2025
Course
SecurityBug Bounty ReconSecurityBeginner
1h 40m 11s
Dec 13, 2024
Labs
SecurityHunting for MalwareSecurityIntermediate
1h 10m
Nov 26, 2024
Course
SecurityBug Bounty BasicsSecurityBeginner
1h 11m 3s
Nov 19, 2024
Labs
SecurityWeb Attacks: EnumerationSecurityBeginner
1h 40m
Sep 26, 2024
(45)Labs
SecurityWeb Attacks: Brute Force with Burp SuiteSecurityBeginner
50m
Sep 04, 2024
(53)Labs
SecurityGain Privileges Using Broken Access ControlSecurityIntermediate
2h 15m
Aug 27, 2024
(23)Labs
SecurityDetect Network Activity with ScapySecurityBeginner
1h
Aug 21, 2024
Course
SecurityNavigating the Bug Bounty IndustrySecurityBeginner
24m 55s
Aug 15, 2024
Course
SecurityCredential Access with Mimikatz 2SecurityIntermediate
25m 59s
May 25, 2022
(29)Course
SecurityTechnical Weakness Identification with Nikto 2SecurityIntermediate
21m 13s
May 25, 2022
(15)Course
SecurityLateral Movement with Mimikatz 2SecurityIntermediate
29m 8s
May 25, 2022
(14)Course
SecurityCredential Access with THC HydraSecurityIntermediate
26m 4s
Aug 19, 2020
(11)Course
SecurityThreat Modeling with the Microsoft Threat Modeling ToolSecurityIntermediate
2h 13m 49s
Feb 12, 2019
(42)
-
Course
SecurityBug Bounty ReconSecurityBeginner
1h 40m 11s
Dec 13, 2024
Course
SecurityBug Bounty BasicsSecurityBeginner
1h 11m 3s
Nov 19, 2024
Course
SecurityNavigating the Bug Bounty IndustrySecurityBeginner
24m 55s
Aug 15, 2024
Course
SecurityCredential Access with Mimikatz 2SecurityIntermediate
25m 59s
May 25, 2022
(29)Course
SecurityTechnical Weakness Identification with Nikto 2SecurityIntermediate
21m 13s
May 25, 2022
(15)Course
SecurityLateral Movement with Mimikatz 2SecurityIntermediate
29m 8s
May 25, 2022
(14)Course
SecurityCredential Access with THC HydraSecurityIntermediate
26m 4s
Aug 19, 2020
(11)Course
SecurityThreat Modeling with the Microsoft Threat Modeling ToolSecurityIntermediate
2h 13m 49s
Feb 12, 2019
(42)
-
Labs
SecurityThreat Modeling in ActionSecurityBeginner
1h 35m
Feb 25, 2025
Labs
SecurityGain Access to a Network using PowerShellSecurityIntermediate
50m
Jan 30, 2025
(14)Labs
SecurityHunting for C2 and TunnelingSecurityIntermediate
1h 15m
Jan 24, 2025
(12)Labs
SecurityHunting for Suspicious HTTPS TrafficSecurityIntermediate
1h 35m
Jan 15, 2025
Labs
SecurityHunting for MalwareSecurityIntermediate
1h 10m
Nov 26, 2024
Labs
SecurityWeb Attacks: EnumerationSecurityBeginner
1h 40m
Sep 26, 2024
(45)Labs
SecurityWeb Attacks: Brute Force with Burp SuiteSecurityBeginner
50m
Sep 04, 2024
(53)Labs
SecurityGain Privileges Using Broken Access ControlSecurityIntermediate
2h 15m
Aug 27, 2024
(23)Labs
SecurityDetect Network Activity with ScapySecurityBeginner
1h
Aug 21, 2024
-
Course
SecurityPerform Complex Search Functions in Kibana with Apache Lucene 7RETIREDSecurityIntermediate
1h 11m 7s
Oct 11, 2024
(19)Course
SecurityThreat Modeling: The Big PictureRETIREDSecurityBeginner
1h 5m 13s
Mar 19, 2024
(91)Course
SecurityGetting Started with PowerSploit 1RETIREDSecurityBeginner
2h 23m 48s
Mar 19, 2024
(11)Course
SecurityWeb Application Penetration Testing: Configuration and Deployment Management TestingRETIREDSecurityIntermediate
2h 11m 8s
Feb 22, 2024
(15)Course
SecurityCISSP® - Software Development SecurityRETIREDSecurityIntermediate
3h 6m 35s
Jun 20, 2018
(114)Course
SecurityCISSP® - Security OperationsRETIREDSecurityIntermediate
3h 3m 5s
Jun 20, 2018
(16)Course
SecurityCISSP® - Security and Risk ManagementRETIREDSecurityBeginner
4h 3m 4s
Jun 20, 2018
(51)Course
SecurityCISSP®: Security Assessment and TestingRETIREDSecurityIntermediate
2h 3m
Jun 20, 2018
(15)