
Troy Hunt
Pluralsight Author
Troy Hunt is a Microsoft Regional Director and MVP for Developer Security, an ASPInsider, and a full time Author for Pluralsight—a leader in online training for technology and creative professionals. Troy has been building software for browsers since the very early days of the web and possesses an exceptional ability to distill complex subjects into relatable
explanations. This has led Troy to become an industry thought leader in the security space and produce more than twenty top-rated courses for Pluralsight. Currently, Troy is heavily involved in Have I been pwned? (HIBP) a free service that aggregates data breaches and helps people establish potential impacts from malicious web activity. Troy blogs regularly about web security and is a frequent speaker at industry
conferences across the globe and throughout the media to discuss a wide range of technologies. Troy has been featured in a number of articles with publications including Forbes, TIME magazine, Mashable, PCWorld, ZDNet and Yahoo! Tech. Aside from technology and security, Troy is an avid snowboarder, windsurfer and tennis player
Topics Authored
Software Development
Business Professional
Security Professional
Technology Leader
IT Ops
Courses Authored
43
Total Ratings
9006
Avg Course Ratings
4.6
Courses by Troy
-
Course
The Role of Shadow IT and How to Bring it out of the DarknessBeginner
39m 58s
Oct 16, 2020
(54)Course
Modern Browser Security ReportsBeginner
57m 47s
Aug 03, 2018
(68)
-
Course
The Role of Shadow IT and How to Bring it out of the DarknessBeginner
39m 58s
Oct 16, 2020
(54)Course
Modern Browser Security ReportsBeginner
57m 47s
Aug 03, 2018
(68)
-
No labs authored.
-
Course
Defending Against JavaScript Keylogger Attacks on Payment Card InformationRETIREDBeginner
1h 3m 2s
Oct 11, 2024
(41)Course
Modernizing Your Websites with Azure Platform as a ServiceRETIREDIntermediate
5h 26m 5s
Jul 31, 2024
(277)Course
Hack Your API FirstRETIREDIntermediate
4h 7m 58s
Jun 26, 2024
(430)Course
Secure Account Management FundamentalsRETIREDIntermediate
7h 1m 13s
Jun 26, 2024
(214)Course
ASP.NET Security Secrets RevealedRETIREDIntermediate
3h 24m 29s
Jun 26, 2024
(483)Course
Play by Play: Azure Beyond WebsitesRETIREDBeginner
1h 16m 58s
Jun 06, 2024
(55)Course
Play by Play: Care and Maintenance of Development VMsRETIREDIntermediate
49m 45s
May 10, 2024
(42)Course
Creating a Security-centric CultureRETIREDBeginner
52m 32s
Mar 19, 2024
(129)Course
Adapting to the New Normal: Embracing a Security Culture of Continual ChangeRETIREDBeginner
37m 33s
Mar 19, 2024
(44)Course
The State of GDPR: Common Questions and MisperceptionsRETIREDBeginner
1h 24m 13s
Mar 19, 2024
(70)Course
Managing the Modern Software Dependency EcosystemRETIREDIntermediate
29m 28s
Mar 19, 2024
(43)Course
Play by Play: Bug Bounties for CompaniesRETIREDBeginner
48m 19s
Mar 19, 2024
Course
Play by Play: Bug Bounties for ResearchersRETIREDBeginner
36m 58s
Mar 19, 2024
(21)Course
AngularJS Security FundamentalsRETIREDIntermediate
2h 27m 18s
Feb 16, 2024
(483)Course
Play by Play: JavaScript SecurityRETIREDBeginner
1h 13m 57s
Feb 16, 2024
(53)Course
Play by Play: Website Security Review with Troy Hunt and Lars KlintRETIREDIntermediate
1h 42m 24s
Feb 16, 2024
(363)Course
Play by Play: Modern Web Security PatternsRETIREDBeginner
1h 24m 21s
Feb 16, 2024
(145)Course
Play by Play: What You Need to Know About HTTPS TodayRETIREDBeginner
1h 11m 55s
Feb 16, 2024
(85)Course
What's New in the OWASP Top 10 for 2013RETIREDIntermediate
1h 34m 33s
May 31, 2023
(253)Course
Hack Yourself First: How to go on the Cyber-OffenseRETIREDIntermediate
9h 25m 31s
Jan 13, 2023
(938)Course
What Every Developer Must Know About HTTPSRETIREDBeginner
3h 24m 50s
Jan 13, 2023
(382)Course
OWASP Top 10 Web Application Security Risks for ASP.NETRETIREDIntermediate
8h 6m 20s
Jan 13, 2023
(1090)Course
Introduction to Browser Security HeadersRETIREDIntermediate
3h 4m 59s
Jan 13, 2023
(267)Course
Play by Play: Crafting a Brand for Growth and ProsperityRETIREDBeginner
1h 2m 11s
Aug 10, 2022
(73)Course
Ethical Hacking: Evading IDS, Firewalls, and HoneypotsRETIREDBeginner
3h 42s
Feb 10, 2022
(77)Course
Ethical Hacking: Hacking Web ApplicationsRETIREDBeginner
4h 49m 31s
Feb 10, 2022
(397)Course
Ethical Hacking: Hacking Web ServersRETIREDBeginner
2h 25m 31s
Feb 10, 2022
(273)Course
Ethical Hacking: Cloud ComputingRETIREDBeginner
2h 59m 3s
Feb 10, 2022
(104)Course
Ethical Hacking: SQL InjectionRETIREDBeginner
5h 25m 54s
Feb 10, 2022
(487)Course
Ethical Hacking: Denial of ServiceRETIREDBeginner
2h 49m 32s
Feb 10, 2022
(128)Course
Ethical Hacking: Session HijackingRETIREDBeginner
3h 27m 52s
Feb 10, 2022
(279)Course
Play by Play: Ethical Hacking - Deconstructing the HackRETIREDBeginner
1h 29m 3s
Jan 28, 2022
(58)Course
Play by Play: Exploring the Internet of VulnerabilitiesRETIREDBeginner
58m 17s
Jan 28, 2022
(85)Course
Play by Play: Emerging Threats in IoTRETIREDBeginner
57m 21s
Jan 26, 2022
(44)Course
Understanding the Shellshock Bash BugRETIREDIntermediate
33m 16s
Jul 31, 2021
(211)Course
Getting Started with Cloudflare SecurityRETIREDBeginner
1h 38m 25s
Jul 31, 2021
(134)Course
Play by Play: Ethical Hacking with Troy HuntRETIREDBeginner
1h 2m 2s
Jul 31, 2021
(406)Course
Play by Play: Social Engineering with Troy Hunt and Lars KlintRETIREDBeginner
1h 2m 36s
Jul 31, 2021
(94)Course
Play by Play: Modernizing Your Deployment Strategy with Octopus DeployRETIREDBeginner
58m 53s
Apr 09, 2021
(68)Course
Global Behaviors Post-GDPR: Executive BriefingRETIREDBeginner
27m 38s
Apr 13, 2020
(22)Course
Global Impacts of GDPR: Executive BriefingRETIREDBeginner
10m 14s
Apr 13, 2020
(26)