Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.








The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly

Deploy a Web Job
Deploy a Web Job Guided IT Pro Challenge from Learn on Demand challenges students to provision, deploy, and test an Azure web task. The web task will be deployed to an existing web application. This requires learning the Microsoft Azure Resource group services as well as fundamental web application concepts.

Use Managed Identities
This IT Pro Challenge lab teaches you how to use the Azure portal to provision a virtual machine, assign it a role, and enable system-assigned managed identity. You will also grant permissions to that managed identity as well as verify a managed identity access token. Finally, you will learn how to remove permissions.

Configure Continuous Deployment using GIT and Deployment Slots
This IT Pro Challenge virtual lab teaches learners to set up an Azure Portal web app for continuous release through creating deployment slots and enabling GIT. Learners pursuing careers in Software Programming, System Administration, Cybersecurity, and Quality Testing, benefit from managing cloud development environments in this lab.

Enable VM Backup using Recovery Services Vault
This IT Pro Challenge virtual lab teaches learners how to use recovery services vault. Learners will gain experience using services vault, backup policy to enable virtual machine backup. Skills learned in this lab are valuable in multiple job roles such as System administrator and Azure administrators in IT.

Use Azure Storage Explorer
This IT Pro Challenges virtual lab teaches learners fundamental Azure Storage Account skills to create, deploy to, and upload to a storage account. Also, participants take and manage image snapshots. This hands-on experience benefits business and technical people in using the Azure cloud successfully to keep and backup files.

Enable Dynamic Data Masking using Azure SQL Database
In this hands-on lab, learners are introduced to the skills required to secure the Azure SQL. Exercises in this lab teach users how to enable dynamic data masking using a logical server and query editor while learning the Azure concepts. The topics covered in this lab are crucial for learners to be effective in Azure administrator roles in IT.

Configure Geo-Replication for your Database
This Configure Geo-Replication for your Database IT Pro Challenge virtual lab shows learners how to create a new Azure SQL Database, enable it for Geo-Replication, and test it for failover. The skills that learners acquire in this challenge are valuable to database administrators in the IT or cybersecurity fields.

Provision an Azure Storage Queue
In this IT Pro Challenge virtual lab, you will get hands-on experience using Microsoft Azure’s Storage Account for message queues. You will implement and test a Web App’s ability to add and retrieve messages from a message queue and validate queue logging. These skills are essential for someone pursuing a career path as an Azure administrator.

Provision an Azure Storage Table
This IT Pro Challenge virtual lab shows learners how to use the Azure portal to create a Storage Account and update an existing Web Application with a new connection string. As proof of concept, learners will verify that the Web App loaded/read rows in a Storage Table. Learners will also verify that logging is active for the Storage Account.

IT & Cybersecurity Foundations
Cybrary’s IT and Cybersecurity Foundations career path will equip you with a strong foundation of cybersecurity knowledge and hands-on skills. Over the course of 30 courses and hands-on virtual labs, you will learn essential IT concepts, security best practices, and the technical skills needed for entry-level IT and cybersecurity roles.
Our courses feature thoughtful, bite-sized content from expert instructors who have helped thousands of other beginners grasp fundamental IT and cybersecurity topics.

SOC Analyst
Cybrary’s Security Operations Center (SOC) Analyst career path and associated assessments will equip you with the knowledge and hands-on skills you need and teach you how to become a SOC Analyst. Over the course of 20+ courses and hands-on virtual labs, you will learn defensive security fundamentals, log analysis, network-based detection, and host-based detection.
As you proceed through our SOC Analyst trainings, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic.

Penetration Tester
Cybrary’s Penetration Tester career path and associated assessments will equip you with the knowledge and hands-on skills you need to launch your career as a Penetration Tester. Over the course of 20+ courses and hands-on virtual labs, you will learn how to successfully identify, exploit, and remediate security vulnerabilities, and build a strong foundation of ethical hacking knowledge and skills.
As you proceed through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic.

Security Engineer
Cybrary’s Security Engineer career path and associated assessments will equip you with the knowledge and hands-on skills you need to launch your career as a Security Engineer. Over the course of 20+ courses and hands-on virtual labs, you will learn security engineering fundamentals, infrastructure and operations security, application security, and data security.
Completing this career path and the associated assessments will start your journey toward a Security Engineer role or prepare you for further specialization in advanced skills like cloud security and cybersecurity architecture.
-p-500%5B1%5D.webp)
Leadership and Management
Effective Leadership and Management is critical to any security-related function. Cybrary’s Leadership and Management Career Path will equip you with essential leadership knowledge and hands-on skills. Over the course of 20+ courses, you will learn Leadership and Management Fundamentals, Soft Skills, Leadership Principles, Cybersecurity Leadership, and Strategic Leadership.
Completing this career path and the associated Assessments will prepare you for pursuing a career as a leader or manager for IT and cybersecurity-related functions.

System Administrator
The courses in the System Administrator Collection will help you build a foundation of knowledge and hands-on skills related to network devices and configurations, maintaining business systems, and leveraging security tools. These skills can start your journey toward your first IT position or prepare you for further industry training and certifications.
Our courses feature thoughtful, bite-sized content from expert instructors who have helped thousands of other beginners grasp fundamental IT and cybersecurity topics. Topics include network architecture, firewalls, secure data storage, and more.

Incident Handler
The courses in the Incident Handler Collection will help you build a foundation of knowledge and hands-on skills related to incident response, including containment, recovery, reconnaissance, basic digital forensics, and more. These skills can start your journey toward a role in cybersecurity operations or prepare you for further industry training and certifications.
Our courses feature thoughtful, bite-sized content from expert instructors who have helped thousands of other learners grasp fundamental incident response topics.

Network Engineer
The courses in the Network Engineer Collection will help you build a foundation of knowledge and hands-on skills related to network management, system performance, troubleshooting and diagnosing network issues, and understanding infrastructure protocols, application, and transport. These skills can start your journey toward a Network Engineer position or prepare you for further industry training and certifications.
Our courses feature thoughtful, bite-sized content from expert instructors who have helped thousands of other beginners grasp fundamental IT and cybersecurity topics.

OWASP Top 10 - A08:2021 - Software and Data Integrity Failures

OWASP Top 10 - A04:2021 - Insecure Design

OWASP Top 10 - A09:2021 - Security Logging and Monitoring Failures

OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)

OWASP Top 10 - A05:2021 - Security Misconfiguration

OWASP Top 10 - A02:2021 - Cryptographic Failures

OWASP Top 10 - A07:2021 - Identification and Authentication Failures

OWASP Top 10 - A06:2021 - Vulnerable and Outdated Components

OWASP Top 10 - A03:2021 - Injection

OWASP Top 10 - A01:2021 - Broken Access Control

OWASP Top 10 - A04:2017 - XML External Entities

Protocol Tunneling

Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol

SSH Authorized Keys

Lateral Movement: Windows Remote Management

Persistence via Windows Services

System Binary Proxy Execution and a Spearphish Payload

Server Software Component: Web Shell

Scheduled Task

Registry Run Keys

Red Team Operator Series: Leading Teams (RTXO 103)

Red Team Operator Series: Leading Operations (RTXO 102)

Red Team Operator Series: Operations Planning (RTXO 101)

DFIR Operator Series: Windows Forensics 101

Red Team Operator Series: Operations Overview (RTXO 100)

DFIR Operator Series: Overview Course

Payment Card Industry Data Security Standard (PCI DSS): Practitioner Course

NIST 800-171 Controlled Unclassified Information Course

Check Point Jump Start: Harmony Mobile

Intro to Docker

Check Point Jump Start: Quantum Management

Payment Card Industry Data Security Standard (PCI DSS): Primer Course
This PCI DSS course focuses on the fundamentals of the Payment Card Industry Data Security Standard (PCI DSS) and how assessing the security programs of merchants and service providers protects payment data from loss or compromise. This Payment Card Industry training course also looks at changes and updates found in the latest version of PCI DSS (v4.0) released in March 2022.

CertNexus Cybersec First Responder Certification Prep
CertNexus’s CyberSec First Responder certification is designed for individuals on the front line of cybersecurity at their organizations, required to protect critical information systems before, during, and after an incident which may be a cybersecurity attack. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

AZ 900 Azure Fundamentals
This Microsoft Azure Fundamentals (AZ-900) course is designed to prepare non-technical professionals to use cloud-based solutions and services such as computing, storage, networking and security to power their organization’s processes. This AZ-900 course is an excellent way to prepare for the AZ-900 certification exam. No prerequisites required!

AZ-305 Designing Microsoft Azure Infrastructure Solutions Certification Prep

Metasploit

Getting Started with ELK Stack: Beats and Endpoint Agents

Getting Started with ELK Stack: Queries

Cybrary Challenge: Motor Mayhem

Challenge: Memory Mysteries

Challenge: Between Two Numbers

Challenge: Saving A Fellow Spy

Challenge: Space Mission

Challenge: A Message Within A Message

Challenge: Don't Believe What You Hear

Challenge: Chatting with ChatGPT

Challenge: Saving a Fellow Monster

Challenge: Gobble Gobble Conceal & Deceive

Challenge: For the Rebellion or the Empire

Challenge: Update B4 It's 2Late

Challenge: MFA ... All Day Every Day

Challenge: Episode II - Attack of the Encoders

Challenge: The Base(64)ics

Challenge: Spiny Shell

CVE Series: Jenkins Arbitrary File Leak Vulnerability (CVE-2024-23897)
CVE-2024-23897 is a critical security flaw affecting Jenkins, a Java-based open-source automation server widely used for application building, testing, and deployment. It allows unauthorized access to files through the Jenkins integrated command line interface (CLI), potentially leading to remote code execution (RCE).

CVE Series: Authentication Bypass in Apache Superset (CVE-2023-27524)
CVE-2023-27524 is a critical vulnerability in Apache Superset, affecting versions up to 2.0.1. It enables attackers to bypass authentication by exploiting weak or default SECRET_KEY values. Attackers can forge session cookies to gain admin access, leading to potential remote code execution and unauthorized data access.

CVE Series: Confluence Authentication Vulnerability (CVE-2023-22515)
Confluence suffers from a Broken Access Control vulnerability that affects Data Center and Server versions 8.0.0 to 8.3.2, 8.4.0 to 8.4.2, and 8.5.0 to 8.5.1. Threat actors exploit this vulnerability to obtain administrator access to Confluence servers. Put on your Red Team hat to create your own malicious admin account leveraging this CVE!

CVE Series: WinRar Vulnerability (CVE-2023-38831)

CVE Series: Openfire (CVE-2023-32315)

CVE Series: Dirty Pipe (CVE-2022-0847)

CVE Series: Polkit (CVE-2021-4034)

CVE Series: Log4J (CVE-2021-44228)

CVE Series: InstallerFileTakeOver (CVE-2021-41379)

CVE Series: MSHTML Vulnerability (CVE-2021-40444)

CVE Series: HiveNightmare (CVE-2021-36934)

CVE Series: PrintNightmare (CVE-2021-1675 and CVE-2021-34527)

CVE Series: Ghostcat (CVE-2020-1938)

CVE Series: Atlassian Bitbucket Command Injection (CVE-2022-36804)

CVE Series: Grafana Directory Traversal (CVE-2021-43798)

CVE Series: Apache HTTPD (CVE-2021-42013)

CVE Series: Apache Spark (CVE-2022-33891)

CVE Series: Django (CVE-2022-34265)

CVE Series: Follina (CVE-2022-30190)

CVE Series: Confluence RCE (CVE-2022-26134)

CVE Series: Redis (CVE-2022-0543)

CVE Series: Spring4Shell (CVE-2022-22965)

Royal Ransomware Group
Royal is a spin-off group of Conti, which first emerged in January of 2022. The group consists of veterans of the ransomware industry and brings more advanced capabilities and TTPs against their victims. Begin this campaign to learn how to detect and protect against this newer APT group!

Raspberry Robin
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to use later. Once established, these C2 connections can be used for multiple purposes, including data exfiltration, espionage, and even further exploitation.

Double Trouble with Double Dragon

Weak Link in the Supply Chain

Spinning a Web Shell for Initial Access

Exfiltration and Extortion
Threat actors will use stolen data exfiltrated from victim systems to extort organizations. Once they gain a foothold, they delete critical system files and threaten to release the data or disrupt operations if the victims do not pay up. Understanding these techniques is vital to defending your organization from such attacks.

Ransomware for Financial Gain
Threat actors continue to leverage ransomware to extort victim organizations. What was once a simple scheme to encrypt target data has expanded to include data disclosure and targeting a victim’s clients or suppliers. Understanding the techniques threat actors use in these attacks is vital to having an effective detection and mitigation strategy.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.