![Rishalin Pillay](https://pluralsight.imgix.net/author/lg/ccd2c380-9984-4c46-995d-187089734f57.jpg?w=200)
Rishalin Pillay
Pluralsight Author
Rishalin is a prolific author and cybersecurity expert. He has authored several video courses on Pluralsight, as well as three books: "Learn Penetration Testing", "Offensive Shellcode from Scratch." and "Ethical Hacking Workshop". He is also a technical contributor to many other books on topics such as dark web analysis, Kali Linux, offensive security, and SECOPS. He has received the Microsoft Content Publisher Gold and Platinum awards for his contributions to the cybersecurity industry. Rishalin is currently a Principal Red Team Consultant for the Google Red Team.
Topics Authored
Security Professional
IT Ops
Contents Authored
24
Total Ratings
280
Avg Course Ratings
4.2
Courses by Rishalin
-
Course
SecurityPrivilege Escalation for Offensive Security ProfessionalsSecurityAdvanced
1h 38m 59s
Feb 04, 2025
Labs
SecurityNetwork Attacks: Command and ControlSecurityBeginner
1h 15m
Dec 06, 2024
(38)Labs
SecurityNetwork Attacks: Privilege EscalationSecurityBeginner
55m
Nov 04, 2024
(38)Labs
SecurityNetwork Attacks: Reverse ShellsSecurityBeginner
1h
Aug 22, 2024
(129)Course
SecurityPost Exploitation Operations with Cobalt StrikeSecurityIntermediate
1h 20m 19s
Aug 01, 2024
Course
SecuritySC-200: Manage a Security Operations EnvironmentSecurityIntermediate
1h 53m 2s
Mar 29, 2024
Course
Core TechImplementing and Managing Microsoft Defender for Cloud AppsCore TechIntermediate
1h 38m 58s
Oct 13, 2023
Course
Core TechImplementing and Managing Microsoft SentinelCore TechIntermediate
1h 35m 5s
Oct 12, 2023
Course
Core TechImplementing and Managing Microsoft Defender for O365Core TechIntermediate
1h 42m 22s
Oct 05, 2023
Course
Core TechImplementing and Managing Microsoft Defender for EndpointCore TechIntermediate
1h 47m 22s
Sep 19, 2023
Course
Core TechImplementing and Managing Microsoft Defender for IdentityCore TechIntermediate
1h 18m
Aug 15, 2023
Course
Core TechMicrosoft Defender: IntroductionCore TechBeginner
26m 25s
Jun 29, 2023
Labs
SecurityAchieve Privilege Escalation and Persistence Using PowerShellSecurityAdvanced
1h
May 11, 2023
Course
SecurityMitigate Threats Using Microsoft 365 DefenderSecurityIntermediate
2h 26m 52s
Dec 16, 2022
(20)Course
SecurityPrivilege Escalation with PEASS-NGSecurityIntermediate
20m 11s
Nov 22, 2022
Course
Core TechWindows Server 2022: Security ManagementCore TechIntermediate
2h 31m 1s
Sep 23, 2022
Course
SecurityLeverage PowerShell Tools for Pen TestingSecurityIntermediate
1h 28m 57s
May 17, 2022
Course
SecurityTools and Code Analysis for CompTIA Pentest+SecurityIntermediate
2h 1m 6s
Nov 29, 2021
Course
SecurityExfiltration with CloakifyFactorySecurityIntermediate
20m 49s
Oct 01, 2021
Course
Core TechSecuring Windows Server 2019Core TechBeginner
2h 59m 4s
Jan 11, 2021
(19)Course
SecurityPersistence with EmpireSecurityIntermediate
23m 53s
Oct 23, 2020
Course
SecurityCommand and Control with EmpireSecurityIntermediate
22m 19s
Sep 17, 2020
Course
SecurityPeople Information Gathering with the Social Engineering Toolkit (SET)SecurityIntermediate
23m 26s
Aug 06, 2020
(13)Course
SecurityCredential Access with John the RipperSecurityIntermediate
23m 26s
May 22, 2020
(13)
-
Course
SecurityPrivilege Escalation for Offensive Security ProfessionalsSecurityAdvanced
1h 38m 59s
Feb 04, 2025
Course
SecurityPost Exploitation Operations with Cobalt StrikeSecurityIntermediate
1h 20m 19s
Aug 01, 2024
Course
SecuritySC-200: Manage a Security Operations EnvironmentSecurityIntermediate
1h 53m 2s
Mar 29, 2024
Course
Core TechImplementing and Managing Microsoft Defender for Cloud AppsCore TechIntermediate
1h 38m 58s
Oct 13, 2023
Course
Core TechImplementing and Managing Microsoft SentinelCore TechIntermediate
1h 35m 5s
Oct 12, 2023
Course
Core TechImplementing and Managing Microsoft Defender for O365Core TechIntermediate
1h 42m 22s
Oct 05, 2023
Course
Core TechImplementing and Managing Microsoft Defender for EndpointCore TechIntermediate
1h 47m 22s
Sep 19, 2023
Course
Core TechImplementing and Managing Microsoft Defender for IdentityCore TechIntermediate
1h 18m
Aug 15, 2023
Course
Core TechMicrosoft Defender: IntroductionCore TechBeginner
26m 25s
Jun 29, 2023
Course
SecurityMitigate Threats Using Microsoft 365 DefenderSecurityIntermediate
2h 26m 52s
Dec 16, 2022
(20)Course
SecurityPrivilege Escalation with PEASS-NGSecurityIntermediate
20m 11s
Nov 22, 2022
Course
Core TechWindows Server 2022: Security ManagementCore TechIntermediate
2h 31m 1s
Sep 23, 2022
Course
SecurityLeverage PowerShell Tools for Pen TestingSecurityIntermediate
1h 28m 57s
May 17, 2022
Course
SecurityTools and Code Analysis for CompTIA Pentest+SecurityIntermediate
2h 1m 6s
Nov 29, 2021
Course
SecurityExfiltration with CloakifyFactorySecurityIntermediate
20m 49s
Oct 01, 2021
Course
Core TechSecuring Windows Server 2019Core TechBeginner
2h 59m 4s
Jan 11, 2021
(19)Course
SecurityPersistence with EmpireSecurityIntermediate
23m 53s
Oct 23, 2020
Course
SecurityCommand and Control with EmpireSecurityIntermediate
22m 19s
Sep 17, 2020
Course
SecurityPeople Information Gathering with the Social Engineering Toolkit (SET)SecurityIntermediate
23m 26s
Aug 06, 2020
(13)Course
SecurityCredential Access with John the RipperSecurityIntermediate
23m 26s
May 22, 2020
(13)
-
Labs
SecurityNetwork Attacks: Command and ControlSecurityBeginner
1h 15m
Dec 06, 2024
(38)Labs
SecurityNetwork Attacks: Privilege EscalationSecurityBeginner
55m
Nov 04, 2024
(38)Labs
SecurityNetwork Attacks: Reverse ShellsSecurityBeginner
1h
Aug 22, 2024
(129)Labs
SecurityAchieve Privilege Escalation and Persistence Using PowerShellSecurityAdvanced
1h
May 11, 2023