Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.








The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly
-p-500%5B1%5D.webp)
Leadership and Management
Leaders and Managers are responsible for providing the vision and advocacy required for an organization to effectively manage cyber risks. This Cybersecurity Leadership and Management career path will provide you with foundational knowledge and key skills required to succeed as an effective leader within any security domain.

OWASP Top 10 - A08:2021 - Software and Data Integrity Failures

OWASP Top 10 - A04:2021 - Insecure Design

OWASP Top 10 - A09:2021 - Security Logging and Monitoring Failures

OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)

OWASP Top 10 - A05:2021 - Security Misconfiguration

OWASP Top 10 - A02:2021 - Cryptographic Failures

OWASP Top 10 - A07:2021 - Identification and Authentication Failures

OWASP Top 10 - A06:2021 - Vulnerable and Outdated Components

OWASP Top 10 - A03:2021 - Injection

Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
This hands-on lab is designed to provide learners with an understanding of how an adversary can use the Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol TTP to further their objectives in a cyber operation.

SSH Authorized Keys

Lateral Movement: Windows Remote Management

Persistence via Windows Services

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.

Configure Azure Virtual Networking
In this challenge by Learn On Demand Systems, you will control virtual network traffic. First, you will create a virtual network. Next, you will implement Azure virtual network routing. Finally, you will implement network security groups and application security groups.

Implement, Manage, and Monitor Azure Storage
In this challenge by Learn On Demand Systems, you will implement, manage, and monitor Azure Storage. First, you will create an Azure storage account, and then you will upload a document to a container in the storage account. Next, you will configure storage account security mechanisms. Finally, you will configure monitoring for a storage account.

Getting Started with Azure Storage, Virtual Machines, and Monitoring
In this lab by Learn On Demand Systems, you will create and monitor Azure® storage accounts and virtual machines. First, you will implement and manage access to Azure storage accounts, and then you will configure monitoring of an Azure storage account. Next, you will automate the deployment of Azure virtual machines. Finally, you will configure mon...

Automate the Deployment of an Azure Virtual Machine by Using an Azure Resource Manager Template
In this lab, you will assume the role of an Azure® Administrator tasked with deploying an Azure virtual machine (VM) using Azure Resource Manager (ARM) templates. First, you will deploy a VM that runs Windows® by using a modified Azure Resource Manager quickstart template, and then you will save the existing deployment to a new ARM template.

Store Sensitive Data in Azure Key Vault
This IT Pro Challenges virtual lab teaches learners how to configure azure key vault and a web app to use a secret. Learners will gain experience using azure key vault and access policy to store a connection string as a secret. Skills learned in this lab are valuable in multiple job roles such as system administrator and Azure administrator.

Secure Azure SQL Server
In this IT Pro Challenge virtual lab, you will get hands-on experience securing Azure Platform services to secure an Azure SQL Database. You will learn how to configure an Azure AD server administrator, configure auditing, and administer an Azure firewall. These are important skills for someone pursuing a career as a Microsoft Azure Administrator.

Secure a Storage Account
This IT Pro Challenge lab shows learners fundamental web application concepts and Microsoft Azure Resource group services. Learners will use the Microsoft Azure Portal and an existing Azure Resource Group to create an action group, add an email alert action and a webhook action for the action group, and create an alert rule.

Set an Azure Alert for a Web App
This IT Pro Challenge lab shows learners fundamental web application concepts and Microsoft Azure Resource group services. Learners will use the Microsoft Azure Portal and an existing Azure Resource Group to create an action group, add an email alert action and a webhook action for the action group, and create an alert rule.

Configure Application Insights
This IT Pro Challenge lab introduces the learner to the importance of application metrics. Not only is application development important, but also the maintenance of these applications. Azure has a service called Application Insights that the learner will set up to monitor the application and produce metrics.

Challenge: Spiny Shell

CVE Series: Jenkins Arbitrary File Leak Vulnerability (CVE-2024-23897)
CVE-2024-23897 is a critical security flaw affecting Jenkins, a Java-based open-source automation server widely used for application building, testing, and deployment. It allows unauthorized access to files through the Jenkins integrated command line interface (CLI), potentially leading to remote code execution (RCE).

CVE Series: Authentication Bypass Leading to Remote Code Execution (RCE) in JetBrains TeamCity (CVE-2024-27198)
CVE-2024-27198 is a critical vulnerability in JetBrains TeamCity, a Java-based open-source automation server used for application building. This flaw allows remote, unauthorized attackers to circumvent authentication, thereby gaining admin control over the server. All versions of TeamCity On-Premises up to 2023.11.3 are affected.

CVE Series: Authentication Bypass in Apache Superset (CVE-2023-27524)
CVE-2023-27524 is a critical vulnerability in Apache Superset, affecting versions up to 2.0.1. It enables attackers to bypass authentication by exploiting weak or default SECRET_KEY values. Attackers can forge session cookies to gain admin access, leading to potential remote code execution and unauthorized data access.

Royal Ransomware Group
Royal is a spin-off group of Conti, which first emerged in January of 2022. The group consists of veterans of the ransomware industry and brings more advanced capabilities and TTPs against their victims. Begin this campaign to learn how to detect and protect against this newer APT group!

Raspberry Robin
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to use later. Once established, these C2 connections can be used for multiple purposes, including data exfiltration, espionage, and even further exploitation.

Double Trouble with Double Dragon

Weak Link in the Supply Chain

Spinning a Web Shell for Initial Access

Exfiltration and Extortion
Threat actors will use stolen data exfiltrated from victim systems to extort organizations. Once they gain a foothold, they delete critical system files and threaten to release the data or disrupt operations if the victims do not pay up. Understanding these techniques is vital to defending your organization from such attacks.

Ransomware for Financial Gain
Threat actors continue to leverage ransomware to extort victim organizations. What was once a simple scheme to encrypt target data has expanded to include data disclosure and targeting a victim’s clients or suppliers. Understanding the techniques threat actors use in these attacks is vital to having an effective detection and mitigation strategy.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.