Security Engineers are security-minded architects and builders. This career path will provide you with the foundational knowledge and key skills needed to succeed as an entry-level Security Engineer.
Learners at 96% of Fortune 1000 companies trust Cybrary
Cybrary’s Security Engineer career path and associated assessments will equip you with the knowledge and hands-on skills you need to launch your career as a Security Engineer. Over the course of 20+ courses and hands-on virtual labs, you will learn security engineering fundamentals, infrastructure and operations security, application security, and data security.
Completing this career path and the associated assessments will start your journey toward a Security Engineer role or prepare you for further specialization in advanced skills like cloud security and cybersecurity architecture.
The Leadership and Management Career Path is expected to release in Q2 of 2025. Sign up now to explore our other leadership courses and content.
Start Learning for FreeLearn core concepts and get hands-on with key skills.
In this course, you will learn the core principles of security engineering and their relationship to cyber risk. You will learn how to identify, analyze, and mitigate risks in a security engineering context.
In this course, you will be introduced to the principles of the DevSecOps methodology. You will learn about several common strategies and tools for implementing DevSecOps throughout an organization.
This course will explore the Zero Trust security model, emphasizing the need to verify every request as though it originates from an open network, and explaining how to implement and manage Zero Trust principles in an organization.
In this hands-on lab, you will learn the basics of Threat Modeling. You will create a basic Threat Model for a web application, identify and and analyze threats to the application using a common threat methodology, and determine mitigations for the application.
This course introduces the foundational concepts of infrastructure and operations security, covering key principles, threats, and protective measures.
In this hands-on lab, you will learn the basics of how to deploy and configure network firewalls. You will practice installing and configuring various features of a pfSense firewall in an emulated network environment.
In this hands-on lab, you will learn the basics of creating a secure network architecture. You will practice evaluating and modifying a network in the GNS3 network simulator.
In this hands-on lab, you will be introduced to the product category known as Next-Generation Firewalls (NGFW). You will practice installing the Zenarmor NGFW on a pfSense firewall and configuring different application-level controls.
This course covers the administration of virtualization security, focusing on protecting virtual environments from security threats through configuration, monitoring, and management techniques.
In this course, we will cover best practices for system hardening to reduce attack surface and improve security posture.
In this hands-on lab, you will learn the basics of Security Orchestration, Automation, and Response (SOAR). You will practice integrating multiple security tools and creating automation playbooks for common actions.
This course provides a brief introduction to application security, covering fundamental concepts, common vulnerabilities, and basic strategies for securing applications.
This course covers the essential best practices for secure coding, designed to help security engineers understand how to support the development of code that is resistant to attacks and vulnerabilities.
In this hands-on lab, you will learn the basics of Static Code Analysis. You will practice running static code analyses using SonarQube, a fully-featured and open-source static analysis engine, as well as interpreting its results and determining remediation steps for the security issues it identifies.
In this hands-on lab, you will learn the basics of Dynamic Code Analysis. You will practice running dynamic code analyses, as well as interpreting its results and determining remediation steps for the security issues it identifies.
In this hands-on lab, you will learn the basics of API Security. You will practice identifying vulnerabilities in API endpoints using OWASP ZAP and Postman.
In this course, you will learn the basics of data security, including data states, data classifications, data protection strategies, data security tools, and common threats to data security.
This course covers the critical aspects of securing databases, including access control, encryption, and regular security assessments.
In this hands-on lab, you will learn about securing data at rest and in transit using encryption and other security measures. You will practice securing a MariaDB database and applying OpenSSH to RDP administration.
In this hands-on lab, you will learn the basics of data classification. You will practice discovering sensitive data using DataVeil and Data Hound. You will also practice tagging data using DataHub.
In this hands-on lab, you will learn the basics of Data Loss Prevention (DLP) solutions. You will practice using Windows utilities and a Wazuh SIEM/XDR solution to simulate several of the core features of DLP.
In this hands-on lab, you will learn about data masking as a data obfuscation technique. You will practice using data masking tools to protect sensitive information by creating a copy of a production database and masking its data using DataVeil.
In this hands-on lab, you will the basics of file integrity monitoring. You will practice implementing file integrity monitoring on Windows using both WinFM.NET and Wazuh.
Exercise your problem-solving and creative thinking skills with security-centric puzzles
In this challenge, you will strut the catwa- I mean, practice threat modeling...
In this hands-on challenge, you will practice configuring firewall rules to meet network security requirements.
In this challenge, you will practice hardening a Windows system.
In this challenge, you will practice performing static code analysis.
In this hands-on challenge, you will practice performing dynamic code analysis.
In this challenge, you will practice securing data transmissions for an Apache web server.
In this challenge, you will practice configuring a file integrity monitoring solution.
Assess your knowledge and skills to identify areas for improvement and measure your growth
Test your Security Engineering Fundamentals knowledge and skills to identify strengths, gaps, and weaknesses in areas like Cyber Risk, DevSecOps, Zero Trust, and Threat Modeling. Measure your mastery of Security Engineering Fundamentals and advance your career with targeted course and virtual lab recommendations.
Test your Infrastructure and Operations Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Secure Network Architecture, System Hardening, Virtualization Security, and more. Measure your mastery of Infrastructure and Operations Security and advance your career with targeted course and virtual lab recommendations.
Test your Application Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Secure Coding, Static Code Analysis, Dynamic Code Analysis, and more. Measure your mastery of Application Security and advance your career with targeted course and virtual lab recommendations.
Test your Data Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Data Classification, Data Masking, Data Loss Prevention, and more. Measure your mastery of Data Security and advance your career with targeted course and virtual lab recommendations.
Cybrary’s expert-led cybersecurity courses help your team remediate skill gaps and get up-to-date on certifications. Utilize Cybrary to stay ahead of emerging threats and provide team members with clarity on how to learn, grow, and advance their careers within your organization.
Put your skills to the test in virtual labs, challenges, and simulated environments.
Track your skills development from lesson to lesson using the Cybrary Skills Tracker.
Connect with peers and mentors through our supportive community of cybersecurity professionals.
This career path is designed for learners with prior experience in cybersecurity who wish to specialize in building secure IT ecosystems. This includes current mid-career IT and security practitioners looking to transition into a Security Engineer role. Experienced security engineering practitioners will also benefit from reviewing core concepts and testing their skills in this path's Challenge and Assessment modules.
Security Engineers are responsible for designing, implementing, and maintaining an organization’s security infrastructure. Common Security Engineer tasks and responsibilities include:
Security Engineers play a critical role in protecting organizations from cyber threats that could lead to data breaches, financial loss, and reputational damage. Security Engineers design and maintain secure systems that protect organizations’ networks, systems, and sensitive data.
As cyber threats grow more complex, companies rely on Security Engineers to design, implement, and maintain strong security measures to keep attackers out.
While this course is focused on the Security Engineer role and job title, there are other roles with similar responsibilities. Common job titles in this field include:
With additional training and experience, Security Engineers can pursue IT and Cybersecurity leadership roles, such as Security Manager or Chief Information Security Officer (CISO).