Browse the Full Catalog

Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.

The content and tools you need to build real-world skills

Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.

Bite-sized Video Training

Manageable instruction from industry experts

Hands-On Learning

Put your skills to the test in virtual labs, challenges, and simulated environments

Practice Exams

Prepare for industry certifications with insider tips and practice exams

Earn Industry Badges

Complete coursework to earn industry-recognized badges via Credly

New Release

AI Curriculum

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Certification Prep

Filter By
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Skill Paths

Filter By
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
New Release

Career Paths

New Release

Security Awareness Training

Collections

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Ethical Hacking: Mobile Platform, IoT, and OT Hacking
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Ethical Hacking: Wireless Network Hacking
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Ethical Hacking: Web Application Hacking
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Ethical Hacking: Network and Perimeter Hacking
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Ethical Hacking: Reconnaissance Techniques
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Ethical Hacking: Introduction to Ethical Hacking
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Designing Microsoft Azure Infrastructure Solutions (AZ-305)
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Provision an Azure Container Registry
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Implement Role-Based Access Control Lab
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Getting Started with Azure Networking and High Availability
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Implement Azure Policy Lab
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure Azure Virtual Networking
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Implement, Manage, and Monitor Azure Storage
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Getting Started with Azure Storage, Virtual Machines, and Monitoring
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Automate the Deployment of an Azure Virtual Machine by Using an Azure Resource Manager Template
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Use Managed Identities
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Store Sensitive Data in Azure Key Vault
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure Application Insights
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Secure Azure SQL Server
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Secure a Storage Account
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Set an Azure Alert for a Web App
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Autoscale a Web App
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Deploy a Web Job
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure Continuous Deployment using GIT and Deployment Slots
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Enable VM Backup using Recovery Services Vault
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Use Azure Storage Explorer
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Enable Dynamic Data Masking using Azure SQL Database
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure Geo-Replication for your Database
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Provision an Azure Storage Queue
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Provision an Azure Storage Table
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Provision a Function App
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
AZ-305: Case Studies
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
AZ-305: Design Infrastructure Solutions
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
AZ-305: Design Business Continuity Solutions
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
AZ-305: Design Data Storage Solutions
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Use PKI to Secure a Network Environment
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
AZ-305: Design Identity, Governance, and Monitoring Solutions
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Deploy Ubuntu Linux Virtual Machines in the Microsoft Azure
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
AZ-305 Designing Microsoft Azure Infrastructure Solutions
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Identify Non-Secure Network Traffic
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure a Network Security Group in a Virtual Network
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Secure Network Access
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure Network Connectivity for Linux on Azure
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure IP Routing with Linux on Azure
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure a Virtual Network Service Endpoint
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Configure a Virtual Network Service Endpoint
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Learn Cisco Networking Fundamentals
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
TRUE InteGRITy
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Data Security
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Application Security
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Infrastructure and Operations Security
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Security Engineering Fundamentals
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
TransMission Impossible
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Dynamic Analysis Paralysis
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Get Me an Analysis, Stat(ic)
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
pfSense and Sensibility
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Die Hardening
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Data Loss Prevention
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Data Classification
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Cybrary's Next Top Threat Modeler
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Database Security
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Data Security Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Dynamic Code Analysis
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Application Security Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Static Code Analysis
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
System Hardening
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Virtualization Security Administration
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Zero Trust Architecture
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Deploying and Configuring Firewalls
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Infrastructure and Operations Security Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Secure Coding Best Practices
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
DevSecOps
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Security Engineering and Cyber Risk
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Scripting and Programming Fundamentals
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Cybersecurity Fundamentals
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Operating System Fundamentals
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Et tu Python?
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
The PowerShell and the Glory
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Cryptography Keeper
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Earth, Wind, and Firewall
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Out of Access Control
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Troubleshooting in Paradise
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Jumping the Wireshark
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Public Service Announcement
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Python Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Python Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
PowerShell Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Patching Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Vulnerability Scanner Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Firewall Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
IDS Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Group Policy Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Active Directory Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Network Troubleshooting Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Data Backup and Recovery Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
VPN Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Garret Donaldson
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Wireshark Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Antivirus Basics
mitre-attack
cev-series
tag-threat
tag-challenge
tag-owasp
Access Control Basics

Stay Ahead

Filter By
Clear
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
OWASP Top 10
OWASP Top 10
OWASP Top 10
OWASP Top 10
OWASP Top 10
OWASP Top 10
MITRE ATT&CK
MITRE ATT&CK
MITRE ATT&CK
Cybrary Challenges
Cybrary Challenges
Cybrary Challenges
Cybrary Challenges
Cybrary Challenges
Cybrary Challenges
Cybrary Challenges
Cybrary Challenges
Cybrary Challenges
CVE Series
CVE Series
CVE Series
CVE Series
CVE Series
CVE Series
CVE Series
CVE Series
CVE Series
Threat Actor Campaigns
Threat Actor Campaigns
Threat Actor Campaigns
Threat Actor Campaigns
Threat Actor Campaigns
Threat Actor Campaigns

Teams

Cybrary Select

No items found.

Cybrary Live

Designed to complement Cybrary’s on-demand certification prep content, Cybrary Live allows learners to interact directly with expert instructors in a boot camp-style virtual classroom environment. Contact sales@cybrary.it to inquire about Cybrary Live for your team.

Our Instructors

Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.

What Our Learners Are Saying

Join 3 million+ users, including 96% of Fortune 1000 companies who use our platform to upskill their teams. See what the buzz is about - start learning for free!

Cybrary is just an amazing platform. Literally thousands of hours of quality content. You can find a course or a lab for just about everything, and they are constantly releasing new material. They also have highly responsive customer service. It's been worth every penny.

Jared

Greatest investment I have made to dateCybrary is solely responsible for my passing the CompTIA A+ exam and is the reason I am going into my Net+ with confidence. I have learned a great deal through virtual labs, practice tests, recorded lessons, and the various other things they offer. The community is great as well. Got a question about the interview process for a tech job? Ask in discord. Just got a cert? Post it in discord and let the reactions and comments flow making you feel great about yourself. It is an all around wonderful experience and I rate it as a totally worthwile expense for starting or furthering your career in the IT industry. Invest in yourself.

Bradly

Training is coolEasy to enroll, instructors are enthusiastic and professionnal, technical stuff is very well explained.

JPM

I've been having concerns on how to start in terms of building my #cybercareer with a sustained path. So I got introduced to Cybrary and I was able to enroll and startup early last week and I have gone through two sessions, getting to know Cybrary and also a view of what cybersecurity is from their perspective. That gave me an overall view of what jobs are found in the space, their general responsibilities, required skills, necessary certifications and their average salary pay... Cybrary has given me a greater reason to pursue my hearts desire at all cost.

Jamal O.
Student

Thanks to Cybrary I'm now a more complete professional! Everyone in [the] cybersecurity area should consider enrollment in any Cybrary courses.

João S.
IT Administrator - CISSP

The interviewer said the certifications and training I had completed on my own time showed that I was a quick learner, and they gave me a job offer.

Justin B.
IT Specialist

Our partnership with Cybrary has given us the opportunity to provide world-class training materials at no cost to our clients, thanks to the funding we’ve received from the government. Cybrary offers a proven method for building a more skilled cybersecurity workforce.

Katie Adams
Senior Director

All of the knowledge, skills, and abilities gained through the program were essential to me impressing the employer during the interview.

Gabby H.
Senior Security Analyst

Cybrary is a one-stop-shop for my cybersecurity learning needs. Courses on vulnerability management, threat intelligence, and SIEM solutions were key for my early roles. As I grow into leadership roles influencing business policy, I’m confident Cybrary will continue developing the knowledge and skills I need to succeed.

No Name
Senior Cybersecurity Consultant and Virtual CISO

After tens of minutes, I proudly have achieved my certificate of continuing education for Intro to Infosec... Doing everything I can to avoid retaking the CISSP test! Thanks Cybrary - 1 CPE at a time!

Alex H.

We’ve had six students this summer, all with different schedules, so we’ve been trying to balance their learning experience with some practical work. It’s not like they’re all sitting in a classroom at the same time, so the ability for them to learn at their own pace without any additional support has probably been the biggest benefit of using Cybrary.

Collin Ricker
Business Development Manager

Just finished the third out of four MITRE ATT&CK Defender courses on Cybrary... If anyone is interested in learning how to do ATT&CK based SOC assessments I would definitely recommend this course. The best part is that it is FREE!

Eric T.
AWS Certified Cloud Practitioner

Excellent new series of courses from Cybrary, each course covers a different CVE, demonstrates vulnerability and its mitigation.

Raul C.
Cybersecurity Specialist

I've successfully completed the career path provided by Cybrary to become a SOC Analyst - Level 2. Eventually, do what you love, and do it well - that's much more meaningful than any metric.

Wissal Ayari
SOC Analyst

Cybrary is helping me proactively build skills and advance my career. Labs put concepts immediately into practice, reinforcing the content (and saving me time not having to spin up my own VM). Career paths lay everything out clearly, so I know what skills to prioritize.

No Name
Enterprise Analyst

I got a job as a cybersecurity analyst at Radware with a salary I've never even dreamed about AND with no prior experience.

Alexei Z.
Cybersecurity Analyst

Thank you to Cybrary for providing this opportunity to complete the Cybrary Orientation Certification program with such sleekness and detail-oriented learning.

Ganesh Y.

So far I have really been enjoying Cybrary's SOC Analyst Training, it has been very informative. I just finished up with the command line section and now I'm on to the more fun stuff (Malware Analysis). I think it's so dope that platforms like this exist. This is a game changer.

Tobias Castleberry
SOC Analyst, Security+ Certified

I decided to check out Cybrary and the courses they had to offer after seeing a few posts from people who had completed their courses. I'm happy to say that their instructors are knowledgeable and clear, and their course catalogues are extensive and offer relevant career path courses.

Nazli S.
AWS Certified Cloud Practitioner

Glad to have discovered Cybrary they are such a great tool to use to help diversify your knowledge through lessons, assessments and practices. All compact[ed] into highly detailed and informative chunks of information. Feeling very content with the results.

Temi B.
Cisco Certified Network Associate

Well, it took a long time, yet I struggled hard to complete the course "Become a SOC Analyst - Level 2" by Cybrary. Cybrary is the best platform that I have ever come across. Tons of virtual labs, great in-depth insights from the experts, and the best career path/learning modules.

Madiraju Pranay Kashyap
Programmar Analyst Trainee

I am currently working in a restaurant and going to school full time. But it is not stopping me from working on gaining more and more skills. I have already spent more than 30 hours on Become a SOC Analyst level 1 [with] Cybrary and still have 67 hours to go.

Abibou F.
SOC Analyst Level 1 Learner