Browse  ›  Information & cyber security  ›  Secure by Design
Icon

Grow your Secure by Design skills

Learn how to build from the ground up with security in mind. Influence your IT security policy early on with effective, secure design from the get-go. Follow along as our expert authors walk you through secure by design best practices that enable you to build with security at the forefront.

Learn on your own timelineLearn on your own timeline
Master your craftMaster your craft
Keep up with emerging trendsKeep up with emerging trends

Level up your Secure by Design skills

Learn the latest from experts with real-world experience.

Top Secure by Design paths

Top Secure by Design courses

Secure Coding in Django 4
Course
Secure Coding in Django 4
Sangeeta Singh
Advanced
3h 7m
Secure Software Implementation for CSSLP®
Course
Secure Software Implementation for CSSLP®
Kevin Henry
Beginner
1h 38m
Implementation of Secure Solutions for CompTIA Security+
Course
Implementation of Secure Solutions for CompTIA Security+
Christopher Rees
Beginner
6h 16m
Software Development Security for CISSP®
Course
Software Development Security for CISSP®
Kevin Henry
Intermediate
2h 44m
Architecture and Design for CompTIA Security+
Course
Architecture and Design for CompTIA Security+
Christopher Rees
Beginner
5h 41m
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Course
Attacks, Threats, and Vulnerabilities for CompTIA Security+
Christopher Rees
Beginner
5h 10m
Security and Risk Management: Policies and Procedures for CISSP®
Course
Security and Risk Management: Policies and Procedures for CISSP®
Kevin Henry
Intermediate
1h 30m
Malware Analysis: Identifying and Defeating Code Obfuscation
Course
Malware Analysis: Identifying and Defeating Code Obfuscation
Josh Stroschein
Intermediate
2h 22m
Getting Started with Reverse Engineering
Course
Getting Started with Reverse Engineering
Josh Stroschein
Beginner
3h 40m
File Analysis with TruffleHog
Course
File Analysis with TruffleHog
Tim Coakley
Intermediate
23m
Writing Burp Suite Macros and Plugins
Course
Writing Burp Suite Macros and Plugins
Dr. Sunny Wear
Advanced
2h 48m
Application Analysis with SonarQube
Course
Application Analysis with SonarQube
George Smith
Beginner
34m
Developer Security Champion: Vulnerability Testing
Course
Developer Security Champion: Vulnerability Testing
Christian Wenz
Beginner
18m
Expanded
Malware Analysis: Assembly Basics
Course
Malware Analysis: Assembly Basics
Josh Stroschein
Intermediate
1h 28m
Object-oriented Programming in Java
Course
Object-oriented Programming in Java
Paolo Perrotta
Beginner
3h 46m
Security Principles for CC℠
Course
Security Principles for CC℠
Kevin Henry
Beginner
1h 15m
Risk Management Strategy with Terrascan
Course
Risk Management Strategy with Terrascan
Chris Blackden
Intermediate
27m
Malware Analysis: Identifying and Defeating Packing
Course
Malware Analysis: Identifying and Defeating Packing
Josh Stroschein
Intermediate
2h 17m
Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings
Course
Securing Cloud DevOps in PaaS, IaaS, and SaaS Settings
Chad Russell
Intermediate
2h 16m
Container Infrastructure Analysis with Trivy
Course
Container Infrastructure Analysis with Trivy
Zach Roof
Intermediate
49m
Network Protocols for Security: ICMP
Course
Network Protocols for Security: ICMP
Brandon DeVault
Beginner
18m
Defense Evasion with Invoke-Obfuscation
Course
Defense Evasion with Invoke-Obfuscation
Ricardo Reimao
Intermediate
24m
Identify Common Cyber Network Attacks with Wireshark
Course
Identify Common Cyber Network Attacks with Wireshark
Chris Greer
Intermediate
2h 34m
Python Functions and Libraries for Cybersecurity
Course
Python Functions and Libraries for Cybersecurity
Mike Woolard
Intermediate
1h 51m
Defending Against JavaScript Keylogger Attacks on Payment Card Information
Course
Defending Against JavaScript Keylogger Attacks on Payment Card Information
Troy Hunt
Beginner
1h 3m
Metasploit: Getting Started
Course
Metasploit: Getting Started
Keith Watson
Beginner
2h 5m
Command and Control with PoshC2
Course
Command and Control with PoshC2
Jeff Stein
Intermediate
27m
Legal and Ethical Considerations for Digital Forensics
Course
Legal and Ethical Considerations for Digital Forensics
Bobby Rogers
Intermediate
2h 11m
Post Exploitation with PowerShell
Course
Post Exploitation with PowerShell
Ricardo Reimao
Advanced
1h 48m
Specialized Testing: SQL Injection
Course
Specialized Testing: SQL Injection
Christian Wenz
Advanced
1h 13m

The Technology Skills Platform

Pluralsight IQ

Pluralsight IQ

Validate skill levels with assessments that take 5 minutes or less.

Channels

Channels

Curate and share Pluralsight content to reach your learning goals faster.

Hands-on learning

Hands-on learning

Practice and apply knowledge faster in real-world scenarios with projects and interactive courses.

Thousands of courses

Thousands of courses

Keep up with the pace of change with expert-led, in-depth courses.

What is Pluralsight?

Your career is defined by what you know and how well you know it.

With our platform, you can benchmark and prove your knowledge, keep up with emerging trends and build in-demand skills in areas like DevOps, machine learning, cloud, security and infrastructure. 

What our customers are saying

Plans & Pricing

Build skills that deliver results

Monthly Yearly
Save at least {{annual-percent-savings}}%!

Standard

$29.00
per month
$299.00
per year
Core course library,
paths and skill assessments.
  • 10 day free trial
  • Core library access
  • Skill and Role assessments
  • Learning paths and channels

Premium

$49.00
per month
$449.00
per year
Entire library of core and expanded courses, exams, projects and interactive courses.
  • Everything under Standard plus:
  • Expanded library access
  • Certification library access
  • Interactive courses and Projects

Future proof
your skills