Michael Teske
Pluralsight Author
Michael Teske is a principal security author with Pluralsight helping people build their skills toolkit. Michael has 25+ years of experience in the IT Ops/Cloud/Cybersecurity industry including 17 of those years as an IT instructor at a technical college, focusing on Microsoft server infrastructure, security and automation. Michael attained his MBA with an emphasis in Computer Information System Security several years ago. Michael still keeps up with the industry as an independent consultant in his spare time. Michael finds personal and professional growth by helping others discover the world of technology by sharing his passion as a tech enthusiast in all aspects. He understands the worker shortage in the cybersecurity space and continues to be an advocate for an industry that has provided a fulfilling career for himself.
Topics Authored
Software Development
Security Professional
IT Ops
Contents Authored
49
Total Ratings
640
Avg Course Ratings
4.5
Courses by Michael
-
CourseSecurityMultiple Zero-days in Microsoft Hyper-V: What You Should KnowSecurityBeginner10m 24sJan 24, 2025CourseCore TechCan GenAI Help Future Proof Your Career?Core TechBeginner12m 22sDec 10, 2024CourseSecurityCVE-2024-0012 Palo Alto PAN-OS Authentication Bypass: What You Should KnowSecurityBeginner7m 59sDec 05, 2024CourseSecurityCVE-2024-43639 RCE Vulnerability in Windows Kerberos: What You Should KnowSecurityBeginner10m 19sNov 27, 2024CourseCore TechNetwork Security: Implementing Basic Network SecurityCore TechBeginner18m 7sNov 22, 2024CourseSecurityOpenPrinting CUPS Remote Code Execution Exploit Chain: What You Should KnowSecurityBeginner14m 29sOct 03, 2024CourseSecurityCVE-2024-43491 Windows Update Remote Code Execution: What You Should KnowSecurityBeginner7m 59sOct 01, 2024LabsSecurityVolt Typhoon: T1070.003 Indicator Removal Detection LabSecurityIntermediate1hSep 26, 2024LabsSecurityVolt Typhoon: T1059.003 Command and Scripting Interpreter Detection LabSecurityIntermediate1hSep 26, 2024LabsSecurityVolt Typhoon: T1003.003 Credential Dumping Detection LabSecurityIntermediate55mSep 25, 2024LabsSecurityWindows Endpoint Security: Scheduled TasksSecurityBeginner55mSep 17, 2024(106)CourseSecurityWindows TCP/IP Remote Code Execution Vulnerability: What You Should KnowSecurityBeginner11m 41sSep 06, 2024LabsSecurityScripting for Security: WindowsSecurityBeginner1h 5mSep 03, 2024(23)LabsSecurityWindows Endpoint Security: NetworkingSecurityBeginner1h 55mAug 28, 2024(70)CourseSecurityScripting for Security: WindowsSecurityBeginner40m 10sAug 21, 2024LabsSecurityWindows Endpoint Security: LogsSecurityBeginner2h 35mAug 14, 2024(83)CourseSecuritySecurity Hot Takes: CrowdStrike Outage Post-mortemSecurityIntermediate31m 6sAug 08, 2024(17)CourseSecuritySecurity Hot Takes: Aliquippa Water Authority BreachSecurityBeginner17m 9sJul 31, 2024CourseSecurityVolt Typhoon: Preventative ControlSecurityIntermediate12m 45sJul 25, 2024CourseSecuritySecurity Hot Takes: Mid-year Review 2024SecurityBeginner16m 4sJul 23, 2024CourseSecurityregreSSHion - an OpenSSH RCE Vulnerability: What You Should KnowSecurityBeginner13m 4sJul 15, 2024CourseSecurityVolt Typhoon: T1070.003 Indicator Removal DetectionSecurityIntermediate8m 57sJun 07, 2024CourseSecurityVolt Typhoon: T1003.003 Credential Dumping DetectionSecurityIntermediate7m 45sJun 07, 2024CourseSecurityVolt Typhoon: T1059.003 Command and Scripting Interpreter DetectionSecurityIntermediate10m 5sJun 07, 2024CourseSecurityPalo Alto PAN-OS RCE Vulnerability: What You Should KnowSecurityBeginner14m 34sApr 17, 2024CourseSecuritySecurity Hot Takes: Critical Infrastructure Advisory-Volt TyphoonSecurityBeginner17m 15sMar 15, 2024CourseSecurityConnectWise ScreenConnect Vulnerability: What You Should KnowSecurityBeginner18m 25sFeb 27, 2024CourseSecurityIvanti Connect Secure VPN Vulnerability: What You Should KnowSecurityBeginner11m 43sJan 27, 2024CourseSecurityIvanti Avalanche Vulnerability: What You Should KnowSecurityBeginner9m 29sDec 28, 2023CourseSecurityAtlassian RCE Vulnerabilities: What You Should KnowSecurityBeginner9m 51sDec 15, 2023CourseSecurityWindows Endpoint Security: LogsSecurityBeginner28m 26sNov 29, 2023CourseSecurityBuilding a Strong Cyber Security FoundationSecurityBeginner8m 10sNov 03, 2023(14)CourseSecuritySecurity Hot Takes: ChatGPTSecurityBeginner14m 58sOct 27, 2023(29)CourseSecurityTorchServe Vulnerabilities: What You Should KnowSecurityBeginner19m 1sOct 05, 2023CourseSecurityKubernetes on Windows Vulnerability: What You Should KnowSecurityBeginner12m 34sSep 18, 2023CourseSecurityVMWare ESXi Vulnerability: What You Should KnowSecurityBeginner4m 57sAug 30, 2023(11)CourseSecurityWindows Endpoint Security: Scheduled TasksSecurityBeginner21mApr 28, 2023(14)CourseSecurityWindows Endpoint Security: NetworkingSecurityIntermediate21m 23sJan 13, 2023(23)CourseSecurityEthical Hacking: Network and Perimeter HackingSecurityIntermediate1h 3m 1sDec 06, 2022(22)CourseSecurityEthical Hacking: Cloud ComputingSecurityIntermediate48m 32sNov 21, 2022(36)CourseSecurityMitigate Threats Using Microsoft SentinelSecurityIntermediate1h 50m 6sMar 14, 2022(23)CourseCloudMaintaining Deployment Security in Microsoft AzureCloudAdvanced59m 56sMay 20, 2020(17)CourseCloudImplementing Microsoft Azure Subscription SecurityCloudAdvanced1h 17m 43sMay 20, 2020(18)CourseCloudImplementing Host Security in Microsoft AzureCloudIntermediate1h 45m 25sMay 12, 2020(14)CourseCloudAssessing and Planning Microsoft Azure MigrationCloudIntermediate1h 36m 33sSep 18, 2019(22)CourseCloudSecuring Microsoft Azure NetworksCloudBeginner1h 30m 54sMay 28, 2019(22)
-
CourseSecurityMultiple Zero-days in Microsoft Hyper-V: What You Should KnowSecurityBeginner10m 24sJan 24, 2025CourseCore TechCan GenAI Help Future Proof Your Career?Core TechBeginner12m 22sDec 10, 2024CourseSecurityCVE-2024-0012 Palo Alto PAN-OS Authentication Bypass: What You Should KnowSecurityBeginner7m 59sDec 05, 2024CourseSecurityCVE-2024-43639 RCE Vulnerability in Windows Kerberos: What You Should KnowSecurityBeginner10m 19sNov 27, 2024CourseCore TechNetwork Security: Implementing Basic Network SecurityCore TechBeginner18m 7sNov 22, 2024CourseSecurityOpenPrinting CUPS Remote Code Execution Exploit Chain: What You Should KnowSecurityBeginner14m 29sOct 03, 2024CourseSecurityCVE-2024-43491 Windows Update Remote Code Execution: What You Should KnowSecurityBeginner7m 59sOct 01, 2024CourseSecurityWindows TCP/IP Remote Code Execution Vulnerability: What You Should KnowSecurityBeginner11m 41sSep 06, 2024CourseSecurityScripting for Security: WindowsSecurityBeginner40m 10sAug 21, 2024CourseSecuritySecurity Hot Takes: CrowdStrike Outage Post-mortemSecurityIntermediate31m 6sAug 08, 2024(17)CourseSecuritySecurity Hot Takes: Aliquippa Water Authority BreachSecurityBeginner17m 9sJul 31, 2024CourseSecurityVolt Typhoon: Preventative ControlSecurityIntermediate12m 45sJul 25, 2024CourseSecuritySecurity Hot Takes: Mid-year Review 2024SecurityBeginner16m 4sJul 23, 2024CourseSecurityregreSSHion - an OpenSSH RCE Vulnerability: What You Should KnowSecurityBeginner13m 4sJul 15, 2024CourseSecurityVolt Typhoon: T1070.003 Indicator Removal DetectionSecurityIntermediate8m 57sJun 07, 2024CourseSecurityVolt Typhoon: T1003.003 Credential Dumping DetectionSecurityIntermediate7m 45sJun 07, 2024CourseSecurityVolt Typhoon: T1059.003 Command and Scripting Interpreter DetectionSecurityIntermediate10m 5sJun 07, 2024CourseSecurityPalo Alto PAN-OS RCE Vulnerability: What You Should KnowSecurityBeginner14m 34sApr 17, 2024CourseSecuritySecurity Hot Takes: Critical Infrastructure Advisory-Volt TyphoonSecurityBeginner17m 15sMar 15, 2024CourseSecurityConnectWise ScreenConnect Vulnerability: What You Should KnowSecurityBeginner18m 25sFeb 27, 2024CourseSecurityIvanti Connect Secure VPN Vulnerability: What You Should KnowSecurityBeginner11m 43sJan 27, 2024CourseSecurityIvanti Avalanche Vulnerability: What You Should KnowSecurityBeginner9m 29sDec 28, 2023CourseSecurityAtlassian RCE Vulnerabilities: What You Should KnowSecurityBeginner9m 51sDec 15, 2023CourseSecurityWindows Endpoint Security: LogsSecurityBeginner28m 26sNov 29, 2023CourseSecurityBuilding a Strong Cyber Security FoundationSecurityBeginner8m 10sNov 03, 2023(14)CourseSecuritySecurity Hot Takes: ChatGPTSecurityBeginner14m 58sOct 27, 2023(29)CourseSecurityTorchServe Vulnerabilities: What You Should KnowSecurityBeginner19m 1sOct 05, 2023CourseSecurityKubernetes on Windows Vulnerability: What You Should KnowSecurityBeginner12m 34sSep 18, 2023CourseSecurityVMWare ESXi Vulnerability: What You Should KnowSecurityBeginner4m 57sAug 30, 2023(11)CourseSecurityWindows Endpoint Security: Scheduled TasksSecurityBeginner21mApr 28, 2023(14)CourseSecurityWindows Endpoint Security: NetworkingSecurityIntermediate21m 23sJan 13, 2023(23)CourseSecurityEthical Hacking: Network and Perimeter HackingSecurityIntermediate1h 3m 1sDec 06, 2022(22)CourseSecurityEthical Hacking: Cloud ComputingSecurityIntermediate48m 32sNov 21, 2022(36)CourseSecurityMitigate Threats Using Microsoft SentinelSecurityIntermediate1h 50m 6sMar 14, 2022(23)CourseCloudMaintaining Deployment Security in Microsoft AzureCloudAdvanced59m 56sMay 20, 2020(17)CourseCloudImplementing Microsoft Azure Subscription SecurityCloudAdvanced1h 17m 43sMay 20, 2020(18)CourseCloudImplementing Host Security in Microsoft AzureCloudIntermediate1h 45m 25sMay 12, 2020(14)CourseCloudAssessing and Planning Microsoft Azure MigrationCloudIntermediate1h 36m 33sSep 18, 2019(22)CourseCloudSecuring Microsoft Azure NetworksCloudBeginner1h 30m 54sMay 28, 2019(22)
-
LabsSecurityVolt Typhoon: T1070.003 Indicator Removal Detection LabSecurityIntermediate1hSep 26, 2024LabsSecurityVolt Typhoon: T1059.003 Command and Scripting Interpreter Detection LabSecurityIntermediate1hSep 26, 2024LabsSecurityVolt Typhoon: T1003.003 Credential Dumping Detection LabSecurityIntermediate55mSep 25, 2024LabsSecurityWindows Endpoint Security: Scheduled TasksSecurityBeginner55mSep 17, 2024(106)LabsSecurityScripting for Security: WindowsSecurityBeginner1h 5mSep 03, 2024(23)LabsSecurityWindows Endpoint Security: NetworkingSecurityBeginner1h 55mAug 28, 2024(70)LabsSecurityWindows Endpoint Security: LogsSecurityBeginner2h 35mAug 14, 2024(83)
-
CourseCloudMigrating Workloads to Microsoft AzureRETIREDCloudIntermediate1h 20m 51sDec 19, 2024(15)CourseCloudDataRefactoring an App to Microsoft Azure AppsRETIREDCloudDataIntermediate1h 7m 49sDec 18, 2024(26)CourseSecurityMitigate Threats Using Microsoft DefenderRETIREDSecurityIntermediate1h 22m 11sOct 11, 2024(25)