PLURALSIGHT TECHNOLOGY INDEX
Security Professional
See which technologies are heating up or cooling off by filtering, sorting or searching those most relevant to your tech stack.
Use our responsive visualization to browse or search historical context of over 100 security professional technologies.
Top technologies for
Security Professional
Jump to Software Development, Data Professional or IT Ops
Top technologies for
SECURITY PROFESSIONAL
Jump to Software Development, Data Professional or IT Ops
Filter by type
1
Kali Linux
2
CloudFlare
3
CISSP
4
CompTIA Security+
5
Certified Ethical Hacker (CEH)
6
CISA
7
OpenSSL
8
OAuth2
9
Metasploit
10
OSINT
11
OWASP
12
Cisco Identity Services Engine (ISE)
13
Kerberos
14
Nmap
15
Cisco Security Packet Analyzer
16
Cisco Meraki
17
ISO IEC 27001
18
JSON Web Tokens (JWT)
19
Cisco ASA
20
Certified Information Security Manager (CISM)
21
Snort
22
Cisco Umbrella
23
Burp Suite
24
Ghidra
25
BitLocker
26
Palo Alto Networks NGFW
27
Azure Key Vault
28
SSCP
29
IDA Debugger
30
Nessus Vulnerability Scanner
31
IBM QRadar Incident Forensics
32
Cisco Firepower NGFW
33
JunOS
34
Azure MFA
35
Suricata
36
USB Rubber Ducky
37
Certified Cloud Security Professional (CCSP)
38
Cisco IronPort Email Encryption Appliance
39
CompTIA Advanced Security Practitioner (CASP+)
40
Auth0
41
The Browser Exploitation Framework (BeEF)
42
CRISC
43
Cisco IOS Firewall
44
Juniper SRX Firewall
45
OpenVAS
46
Amazon Inspector
47
ISO IEC 27002
48
Security Onion
49
CND
50
Checkmarx CxCodebashing
51
Cisco AMP
52
Autopsy
53
Zeek (Bro)
54
Cisco IOS SSL VPN
55
Cisco Firepower Management Center (FMC)
56
Cisco Email Security Appliance
57
MITRE CRITs
58
YARA
59
Cisco Security Manager (CSM)
60
Flexera Personal Software Inspector (PSI)
61
CompTIA CSA+
62
shadow
63
GIAC Certified Incident Handler (GCIH)
64
Certified Secure Software Lifecycle Professional (CSSLP)
65
Kansa
66
INDXParse
67
Cisco Web Security Appliance
68
AFL
69
Shellshock Bash Bug
70
Barracuda Backup
71
Cuckoo Sandbox
72
Rapid7 Nexpose
73
Recon-ng
74
Palo Alto Networks DNS Security
75
Checkmarx CxOSA
76
Microsoft Threat Modeling Tool (TMT)
77
Redline
78
IBM Security AppScan
79
EC-Council’s Certified Incident Handler (ECIH)
80
Evolve Tool
81
libFuzzer
82
Twittor
83
Checkmarx CxSAST
84
Check Point SecurePlatform
85
Capstone
86
Juniper Identity Management Service
87
Cyber Triage
88
CERT NetSA SiLK
89
Digital Forensics Framework (DFF)
90
Palo Alto Networks Logging Service
91
Scout2
92
Chronicle Backstory
93
Network Flight Simulator
94
Contrast Assess
95
BriMor Labs Live Response Collection
96
Checkmarx CxIAST
97
Contrast Protect
98
TRIAGE-IR
99
Doorman
100
Open Computer Forensics Architecture (OCFA)
101
AChoir