Career Path

Security Engineer

Career Path

Security Engineers are security-minded architects and builders. This career path will provide you with the foundational knowledge and key skills needed to succeed as an entry-level Security Engineer.

Path Releasing Q2 2025
Full access included with 
Insider Pro
 and 
Teams

43

H

40

M
Time

Intermediate

i
Designed for learners with a solid grasp of foundational IT and cybersecurity concepts who are interested in pursuing an entry-level security role.
Experience Level

27

i

Earn qualifying credits for certification renewal with completion certificates provided for submission.
CEU's

Enrollees

Learners at 96% of Fortune 1000 companies trust Cybrary

About this Career Path

Cybrary’s Security Engineer career path and associated assessments will equip you with the knowledge and hands-on skills you need to launch your career as a Security Engineer. Over the course of 20+ courses and hands-on virtual labs, you will learn security engineering fundamentals, infrastructure and operations security, application security, and data security. 

Completing this career path and the associated assessments will start your journey toward a Security Engineer role or prepare you for further specialization in advanced skills like cloud security and cybersecurity architecture.

Read More

Skills you'll gain

  • Security engineering fundamentals
  • Infrastructure and operations security
  • Application security
  • Data security

Path Outline

Collection Outline

Coming Soon

The Leadership and Management Career Path is expected to release in Q2 of 2025. Sign up now to explore our other leadership courses and content.

Start Learning for Free
1

Learn

Learn core concepts and get hands-on with key skills.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Security Engineering and Cyber Risk
1
H
0
M

In this course, you will learn the core principles of security engineering and their relationship to cyber risk. You will learn how to identify, analyze, and mitigate risks in a security engineering context.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
DevSecOps
1
H
40
M

In this course, you will be introduced to the principles of the DevSecOps methodology. You will learn about several common strategies and tools for implementing DevSecOps throughout an organization.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Zero Trust Architecture
2
H
0
M

This course will explore the Zero Trust security model, emphasizing the need to verify every request as though it originates from an open network, and explaining how to implement and manage Zero Trust principles in an organization.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Threat Modeling
1
H
35
M

In this hands-on lab, you will learn the basics of Threat Modeling. You will create a basic Threat Model for a web application, identify and and analyze threats to the application using a common threat methodology, and determine mitigations for the application.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Infrastructure and Operations Security Basics
1
H
10
M

This course introduces the foundational concepts of infrastructure and operations security, covering key principles, threats, and protective measures.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Deploying and Configuring Firewalls
2
H
15
M

In this hands-on lab, you will learn the basics of how to deploy and configure network firewalls. You will practice installing and configuring various features of a pfSense firewall in an emulated network environment.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Secure Network Architecture
1
H
45
M

In this hands-on lab, you will learn the basics of creating a secure network architecture. You will practice evaluating and modifying a network in the GNS3 network simulator.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Next-Gen Firewalls
2
H
0
M

In this hands-on lab, you will be introduced to the product category known as Next-Generation Firewalls (NGFW). You will practice installing the Zenarmor NGFW on a pfSense firewall and configuring different application-level controls.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Virtualization Security Administration
2
H
15
M

This course covers the administration of virtualization security, focusing on protecting virtual environments from security threats through configuration, monitoring, and management techniques.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
System Hardening
1
H
0
M

In this course, we will cover best practices for system hardening to reduce attack surface and improve security posture.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
SOAR
2
H
15
M

In this hands-on lab, you will learn the basics of Security Orchestration, Automation, and Response (SOAR). You will practice integrating multiple security tools and creating automation playbooks for common actions.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Application Security Basics
1
H
0
M

This course provides a brief introduction to application security, covering fundamental concepts, common vulnerabilities, and basic strategies for securing applications.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Secure Coding Best Practices
2
H
20
M

This course covers the essential best practices for secure coding, designed to help security engineers understand how to support the development of code that is resistant to attacks and vulnerabilities.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Static Code Analysis
1
H
30
M

In this hands-on lab, you will learn the basics of Static Code Analysis. You will practice running static code analyses using SonarQube, a fully-featured and open-source static analysis engine, as well as interpreting its results and determining remediation steps for the security issues it identifies.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Dynamic Code Analysis
1
H
30
M

In this hands-on lab, you will learn the basics of Dynamic Code Analysis. You will practice running dynamic code analyses, as well as interpreting its results and determining remediation steps for the security issues it identifies.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
API Security
1
H
30
M

In this hands-on lab, you will learn the basics of API Security. You will practice identifying vulnerabilities in API endpoints using OWASP ZAP and Postman.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Data Security Basics
1
H
30
M

In this course, you will learn the basics of data security, including data states, data classifications, data protection strategies, data security tools, and common threats to data security.

COURSE
COURSE
COURSE
COURSE
COURSE
COURSE
Database Security
H
30
M

This course covers the critical aspects of securing databases, including access control, encryption, and regular security assessments.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Secure Data Storage and Transmission
1
H
30
M

In this hands-on lab, you will learn about securing data at rest and in transit using encryption and other security measures. You will practice securing a MariaDB database and applying OpenSSH to RDP administration.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Data Classification
1
H
20
M

In this hands-on lab, you will learn the basics of data classification. You will practice discovering sensitive data using DataVeil and Data Hound. You will also practice tagging data using DataHub.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Data Loss Prevention
1
H
10
M

In this hands-on lab, you will learn the basics of Data Loss Prevention (DLP) solutions. You will practice using Windows utilities and a Wazuh SIEM/XDR solution to simulate several of the core features of DLP.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
Data Masking
1
H
25
M

In this hands-on lab, you will learn about data masking as a data obfuscation technique. You will practice using data masking tools to protect sensitive information by creating a copy of a production database and masking its data using DataVeil.

VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
VIRTUAL LAB
File Integrity Monitoring
1
H
15
M

In this hands-on lab, you will the basics of file integrity monitoring. You will practice implementing file integrity monitoring on Windows using both WinFM.NET and Wazuh.

2

Practice

Exercise your problem-solving and creative thinking skills with security-centric puzzles

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Cybrary's Next Top Threat Modeler
1
H
0
M

In this challenge, you will strut the catwa- I mean, practice threat modeling...

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
pfSense and Sensibility
0
H
30
M

In this hands-on challenge, you will practice configuring firewall rules to meet network security requirements.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Die Hardening
0
H
30
M

In this challenge, you will practice hardening a Windows system.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Get Me an Analysis, Stat(ic)
1
H
0
M

In this challenge, you will practice performing static code analysis.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
Dynamic Analysis Paralysis
1
H
0
M

In this hands-on challenge, you will practice performing dynamic code analysis.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
TransMission Impossible
0
H
30
M

In this challenge, you will practice securing data transmissions for an Apache web server.

CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
CHALLENGE
TRUE InteGRITy
0
H
30
M

In this challenge, you will practice configuring a file integrity monitoring solution.

3

Prove

Assess your knowledge and skills to identify areas for improvement and measure your growth

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Security Engineering Fundamentals
1
H
15
M

Test your Security Engineering Fundamentals knowledge and skills to identify strengths, gaps, and weaknesses in areas like Cyber Risk, DevSecOps, Zero Trust, and Threat Modeling. Measure your mastery of Security Engineering Fundamentals and advance your career with targeted course and virtual lab recommendations.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Infrastructure and Operations Security
1
H
15
M

Test your Infrastructure and Operations Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Secure Network Architecture, System Hardening, Virtualization Security, and more. Measure your mastery of Infrastructure and Operations Security and advance your career with targeted course and virtual lab recommendations.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Application Security
1
H
15
M

Test your Application Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Secure Coding, Static Code Analysis, Dynamic Code Analysis, and more. Measure your mastery of Application Security and advance your career with targeted course and virtual lab recommendations.

ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
ASSESSMENT
Data Security
1
H
15
M

Test your Data Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Data Classification, Data Masking, Data Loss Prevention, and more. Measure your mastery of Data Security and advance your career with targeted course and virtual lab recommendations.

4

Train Your Team

Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.

Instructors

Joseph White
Lab Architect
Read Full Bio
Garret Donaldson
Lab Architect
Read Full Bio
Owen Dubiel
Security Engineer
Read Full Bio

Get Hands-on Learning

Put your skills to the test in virtual labs, challenges, and simulated environments.

Measure Your Progress

Track your skills development from lesson to lesson using the Cybrary Skills Tracker.

Connect with the Community

Connect with peers and mentors through our supportive community of cybersecurity professionals.

Success from Our Learners

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Cybrary really helped me get up to speed and acquire a baseline level of technical knowledge. It offers a far more comprehensive approach than just learning from a book. It actually shows you how to apply cybersecurity processes in a hands-on way"

Don Gates

Principal Systems Engineer/SAIC

"Cybrary’s SOC Analyst career path was the difference maker, and was instrumental in me landing my new job. I was able to show the employer that I had the right knowledge and the hands-on skills to execute the role."

Cory

Cybersecurity analyst/

"I was able to earn my CISSP certification within 60 days of signing up for Cybrary Insider Pro and got hired as a Security Analyst conducting security assessments and penetration testing within 120 days. This certainly wouldn’t have been possible without the support of the Cybrary mentor community."

Mike

Security Engineer and Pentester/

"Becoming a Cybrary Insider Pro was a total game changer. Cybrary was instrumental in helping me break into cybersecurity, despite having no prior IT experience or security-related degree. Their career paths gave me clear direction, the instructors had real-world experience, and the virtual labs let me gain hands-on skills I could confidently put on my resume and speak to in interviews."

Cassandra

Information Security Analyst/Cisco Systems

"I was able to earn both my Security+ and CySA+ in two months. I give all the credit to Cybrary. I’m also proud to announce I recently accepted a job as a Cyber Systems Engineer at BDO... I always try to debunk the idea that you can't get a job without experience or a degree."

Casey

Cyber Systems Engineer/BDO

"Cybrary has helped me improve my hands-on skills and pass my toughest certification exams, enabling me to achieve 13 advanced certifications and successfully launch my own business. I love the practice tests for certification exams, especially, and appreciate the wide-ranging training options that let me find the best fit for my goals"

Angel

Founder,/ IntellChromatics.

Frequently Asked Questions

Who is this for?

This career path is designed for learners with prior experience in cybersecurity who wish to specialize in building secure IT ecosystems. This includes current mid-career IT and security practitioners looking to transition into a Security Engineer role. Experienced security engineering practitioners will also benefit from reviewing core concepts and testing their skills in this path's Challenge and Assessment modules.

What are some Security Engineer responsibilities and job requirements?

Security Engineers are responsible for designing, implementing, and maintaining an organization’s security infrastructure. Common Security Engineer tasks and responsibilities include:

  • Designing and implementing security measures
  • Configuring firewalls
  • Performing security assessments
  • Developing and enforcing security policies
  • Managing security tools
  • Staying up to date on threats

Why is security engineering important?

Security Engineers play a critical role in protecting organizations from cyber threats that could lead to data breaches, financial loss, and reputational damage. Security Engineers design and maintain secure systems that protect organizations’ networks, systems, and sensitive data. 

As cyber threats grow more complex, companies rely on Security Engineers to design, implement, and maintain strong security measures to keep attackers out.

What jobs can I get as a security engineer?

While this course is focused on the Security Engineer role and job title, there are other roles with similar responsibilities. Common job titles in this field include:

  • Security Architect
  • Cloud Security Engineer
  • Application Security Engineer
  • Network Security Engineer

With additional training and experience, Security Engineers can pursue IT and Cybersecurity leadership roles, such as Security Manager or Chief Information Security Officer (CISO).