Ready to Start Your Career?

Monday Mix: Gobble Up the Latest Cyber Challenges

Sara Faradji's profile image

By: Sara Faradji

November 28, 2022

During this Thanksgiving holiday season in the United States, we want to express our gratitude for all of your support and feedback as we expand our content offerings! To share our thanks, please enjoy our new challenge, skills-based course, and podcast content to keep you, your friends, and your family occupied all week.


In this week’s Thanksgiving-themed challenge, can you decipher a turkey’s hidden message? Hunt for a secret password as you learn about the craftiness of steganography-based cyberattacks.

Weekly Challenge: Gobble Gobble Conceal & Deceive


Many of our courses here at Cybrary leverage the free and open ELK Stack tool for virtual log analysis. Dive deep into what this tool has to offer as you deploy and configure Beats and Endpoint agents! In under 3 hours, you can gain the specialized, hands-on training needed to effectively utilize ELK Stack as your SIEM.

Getting Started with ELK Stack: Beats and Endpoint Agents

If you’re a SOC analyst or specialized IT professional, you may want to use Microsoft Azure Sentinel to protect valuable network resources and data. Our new course provides a comprehensive overview of how large and small organizations alike can work with Sentinel to flexibly enhance solutions for threat hunting, incident response, and more!

Microsoft Sentinel (2022)


The quantum computing revolution is a hot topic in the technology world, but how exactly does it impact cybersecurity professionals? To what extent does quantum computing pose a threat to encryption, and how long do we have to prepare for it? Ron Lewis, VP of Customer Success and Innovation at Patero, helps us find a pragmatic approach to post-quantum resiliency.

Unpacking Quantum Risks with Ron Lewis of Patero | The Cybrary Podcast Ep. 98

Schedule Demo

Let's build your cybersecurity career together

Accelerate in your role, prepare for certifications, and develop cutting edge skills with the most in-demand training in the industry.

2,000+learning activities led by highly experienced cybersecurity professionals