Troy Hunt
Pluralsight Author
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight—a leader in online training for technology and creative professionals. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable
explanations. This has led Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses for Pluralsight. Currently, Troy is heavily involved in Have I been pwned? (HIBP) a free service that aggregates data breaches and helps people establish potential impacts from malicious web activity. Troy blogs regularly about web security and is a frequent speaker at industry
conferences across the globe and throughout the media to discuss a wide range of technologies. Troy has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech. Aside from technology and security, Troy is an avid snowboarder, windsurfer and tennis player
Topics Authored
Business Professional
Software Development
Technology Leader
Security Professional
IT Ops
Contents Authored
43
Total Ratings
9004
Avg Course Ratings
4.6
Courses by Troy
-
CourseSecurityThe Role of Shadow IT and How to Bring it out of the DarknessSecurityBeginner39m 58sOct 16, 2020(53)CourseCore TechModern Browser Security ReportsCore TechBeginner57m 47sAug 03, 2018(68)
-
CourseSecurityThe Role of Shadow IT and How to Bring it out of the DarknessSecurityBeginner39m 58sOct 16, 2020(53)CourseCore TechModern Browser Security ReportsCore TechBeginner57m 47sAug 03, 2018(68)
-
No labs authored.
-
CourseSecurityDefending Against JavaScript Keylogger Attacks on Payment Card InformationRETIREDSecurityBeginner1h 3m 2sOct 11, 2024(41)CourseCloudModernizing Your Websites with Azure Platform as a ServiceRETIREDCloudIntermediate5h 26m 5sJul 31, 2024(277)CourseCore TechHack Your API FirstRETIREDCore TechIntermediate4h 7m 58sJun 26, 2024(430)CourseCore TechSecure Account Management FundamentalsRETIREDCore TechIntermediate7h 1m 13sJun 26, 2024(214)CourseCore TechASP.NET Security Secrets RevealedRETIREDCore TechIntermediate3h 24m 29sJun 26, 2024(483)CourseCloudPlay by Play: Azure Beyond WebsitesRETIREDCloudBeginner1h 16m 58sJun 06, 2024(55)CourseCore TechPlay by Play: Care and Maintenance of Development VMsRETIREDCore TechIntermediate49m 45sMay 10, 2024(42)CourseSecurityAdapting to the New Normal: Embracing a Security Culture of Continual ChangeRETIREDSecurityBeginner37m 33sMar 19, 2024(44)CourseSecurityThe State of GDPR: Common Questions and MisperceptionsRETIREDSecurityBeginner1h 24m 13sMar 19, 2024(70)CourseSecurityManaging the Modern Software Dependency EcosystemRETIREDSecurityIntermediate29m 28sMar 19, 2024(43)CourseSecurityPlay by Play: Bug Bounties for CompaniesRETIREDSecurityBeginner48m 19sMar 19, 2024CourseSecurityPlay by Play: Bug Bounties for ResearchersRETIREDSecurityBeginner36m 58sMar 19, 2024(21)CourseSecurityCreating a Security-centric CultureRETIREDSecurityBeginner52m 32sMar 19, 2024(129)CourseCore TechPlay by Play: What You Need to Know About HTTPS TodayRETIREDCore TechBeginner1h 11m 55sFeb 16, 2024(85)CourseCore TechAngularJS Security FundamentalsRETIREDCore TechIntermediate2h 27m 18sFeb 16, 2024(483)CourseCore TechPlay by Play: JavaScript SecurityRETIREDCore TechBeginner1h 13m 57sFeb 16, 2024(53)CourseCore TechPlay by Play: Website Security Review with Troy Hunt and Lars KlintRETIREDCore TechIntermediate1h 42m 24sFeb 16, 2024(363)CourseCore TechPlay by Play: Modern Web Security PatternsRETIREDCore TechBeginner1h 24m 21sFeb 16, 2024(145)CourseSecurityWhat's New in the OWASP Top 10 for 2013RETIREDSecurityIntermediate1h 34m 33sMay 31, 2023(253)CourseCore TechIntroduction to Browser Security HeadersRETIREDCore TechIntermediate3h 4m 59sJan 13, 2023(267)CourseCore TechWhat Every Developer Must Know About HTTPSRETIREDCore TechBeginner3h 24m 50sJan 13, 2023(381)CourseSecurityHack Yourself First: How to go on the Cyber-OffenseRETIREDSecurityIntermediate9h 25m 31sJan 13, 2023(938)CourseSecurityOWASP Top 10 Web Application Security Risks for ASP.NETRETIREDSecurityIntermediate8h 6m 20sJan 13, 2023(1090)CourseCore TechPlay by Play: Crafting a Brand for Growth and ProsperityRETIREDCore TechBeginner1h 2m 11sAug 10, 2022(73)CourseSecurityEthical Hacking: SQL InjectionRETIREDSecurityBeginner5h 25m 54sFeb 10, 2022(487)CourseSecurityEthical Hacking: Denial of ServiceRETIREDSecurityBeginner2h 49m 32sFeb 10, 2022(128)CourseSecurityEthical Hacking: Hacking Web ServersRETIREDSecurityBeginner2h 25m 31sFeb 10, 2022(273)CourseSecurityEthical Hacking: Hacking Web ApplicationsRETIREDSecurityBeginner4h 49m 31sFeb 10, 2022(397)CourseSecurityEthical Hacking: Session HijackingRETIREDSecurityBeginner3h 27m 52sFeb 10, 2022(279)CourseSecurityEthical Hacking: Cloud ComputingRETIREDSecurityBeginner2h 59m 3sFeb 10, 2022(104)CourseSecurityEthical Hacking: Evading IDS, Firewalls, and HoneypotsRETIREDSecurityBeginner3h 42sFeb 10, 2022(77)CourseSecurityPlay by Play: Exploring the Internet of VulnerabilitiesRETIREDSecurityBeginner58m 17sJan 28, 2022(85)CourseSecurityPlay by Play: Ethical Hacking - Deconstructing the HackRETIREDSecurityBeginner1h 29m 3sJan 28, 2022(58)CourseSecurityPlay by Play: Emerging Threats in IoTRETIREDSecurityBeginner57m 21sJan 26, 2022(44)CourseSecurityPlay by Play: Social Engineering with Troy Hunt and Lars KlintRETIREDSecurityBeginner1h 2m 36sJul 31, 2021(94)CourseSecurityGetting Started with Cloudflare SecurityRETIREDSecurityBeginner1h 38m 25sJul 31, 2021(134)CourseSecurityUnderstanding the Shellshock Bash BugRETIREDSecurityIntermediate33m 16sJul 31, 2021(211)CourseSecurityPlay by Play: Ethical Hacking with Troy HuntRETIREDSecurityBeginner1h 2m 2sJul 31, 2021(406)CourseCore TechPlay by Play: Modernizing Your Deployment Strategy with Octopus DeployRETIREDCore TechBeginner58m 53sApr 09, 2021(68)CourseSecurityGlobal Behaviors Post-GDPR: Executive BriefingRETIREDSecurityBeginner27m 38sApr 13, 2020(22)CourseSecurityGlobal Impacts of GDPR: Executive BriefingRETIREDSecurityBeginner10m 14sApr 13, 2020(26)