Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.









The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly

AI Fundamentals
Learn the basics of Artificial Intelligence! This skill path is designed to provide you with a general understanding of Artificial Intelligence, and how to deploy and secure it within the enterprise. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
Password Security
In this brief course, you will learn the basics of password security as part of your required Security Awareness Training. Password security is the practice of using strong, well-managed passwords and regularly updating them to protect accounts and data from unauthorized access. It's a key layer of defense in cybersecurity.

Using Artificial Intelligence Securely
In this brief course, you will learn the basics of using artificial intelligence securely as part of your required Security Awareness Training. AI represents technological progress, giving us powerful tools that are widely accessible. To use AI safely at work, we must grasp its limitations, risks, and privacy implications.

Web 3.0 and Blockchain Security
In this brief course, you will learn the basics of Web 3.0 and blockchain security as part of your required Security Awareness Training. Web 3.0 and Blockchain are changing how we use the Internet, and understanding these advancements and their security challenges is crucial to using them securely.

Defense-in-Depth
In this brief course, you will learn about the basics of defence-in-depth as part of your required Security Awareness Training. Defense in depth is a security strategy where multiple layers of security are used to protect a system or network, thereby increasing its overall resilience against cyber-attacks.

Education Provider Best Practices
In this brief course, you will learn about best practices for education providers as part of your required Security Awareness Training. Cyber security for education providers such as schools are of particular importance due to the sensitive nature of the data stored and the potential consequences of a cyber attack.

Privileged User Best Practices
In this brief course, you will learn about best practices for privileged users as part of your required Security Awareness Training. In this training, we'll learn how secure and responsible administration helps to protect sensitive data, safeguard critical systems, and mitigate security risks.

NIST CSF (United States)
The NIST Cybersecurity Framework, or NIST CSF, is a set of guidelines developed to help organizations manage and reduce cybersecurity risk by providing industry standards and best practices. While it originates from the U.S., its broad principles and flexible approach make it valuable for organizations worldwide.

Healthcare Industry Best Practices
In this brief course, you will learn about best practices for the healthcare industry. Healthcare organizations are often seen as a high-value target for cyber criminals as they work with highly confidential information. This might seem frightening, but by following cyber security best practices, you can protect your employer.
-p-500%5B1%5D.webp)
Leadership and Management
Effective Leadership and Management is critical to any security-related function. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as an effective leader within any security domain. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

GRC Analyst
Every successful cybersecurity program requires judicious risk management and informed oversight. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as a GRC Analyst or in any role that involves managing governance, risk, and compliance. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Cybersecurity Leadership
Becoming an effective Cybersecurity Leader requires you to consider traditional Leadership competencies through a security-centric lens. This skill path is designed to provide you with a general understanding of cybersecurity leadership. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Collaborative Leadership
Collaborative Leadership is the skillset required to work effectively with others. This skill path is designed to provide you with a general understanding of the collaborative skills required to be a successful leader. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Soft Skills
Soft Skills are the traits required for positive and constructive interactions with other people. This skill path is designed to provide you with a general understanding of the soft skills required to be a successful leader. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Incident Response
Incident Response is the rapid response function that addresses high-impact security events in real time. This skill path is designed to provide you with a general understanding of Incident Response as both a skill set and work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Data Security
Data Security encompasses security controls implemented at the data level. This skill path is designed to provide you with a general understanding of Data Security in the context of a Security Engineer work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Application Security
Application Security encompasses security controls implemented at the application level. This skill path is designed to provide you with a general understanding of Application Security in the context of a Security Engineer work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

CompTIA Tech+ (FC0-U71)
CompTIA Tech+ is a beginner-level certification and is perfect for you if you are considering a new career or career change to the IT industry. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

CompTIA PenTest+ (PT0-002)
CompTIA's PenTest+ certification is for cybersecurity professionals tasked with penetration testing and vulnerability management. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

OWASP Top 10 - A01:2021 - Broken Access Control

OWASP Top 10 - A02:2021 - Cryptographic Failures

OWASP Top 10 - A03:2021 - Injection

OWASP Top 10 - A04:2017 - XML External Entities

OWASP Top 10 - A04:2021 - Insecure Design

OWASP Top 10 - A05:2021 - Security Misconfiguration

OWASP Top 10 - A06:2021 - Vulnerable and Outdated Components

OWASP Top 10 - A07:2021 - Identification and Authentication Failures

OWASP Top 10 - A08:2021 - Software and Data Integrity Failures

Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
This hands-on lab is designed to provide learners with an understanding of how an adversary can use the Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol TTP to further their objectives in a cyber operation.

SSH Authorized Keys

Lateral Movement: Windows Remote Management

Persistence via Windows Services

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.

Situational Awareness
In this brief course, you will learn about the basics of situational awareness as part of your required Security Awareness Training. Situational awareness in cybersecurity means having a clear understanding of potential threats, and vulnerabilities, with the ability to use this knowledge to make informed decisions.

Insider Threats
In this brief course, you will learn about the basics of insider threats as part of your required Security Awareness Training. An insider threat is any person who has or had authorized access to, or knowledge of, an organization’s resources, including personnel, facilities, information, equipment, networks, and systems.
PDPA (Singapore)
The Singapore Personal Data Protection Act (PDPA) is a law that protects people’s personal information, such as names, addresses, and contact details, by setting rules for how organizations can collect, use, and share this data. The PDPA helps keep personal information safe while still allowing businesses to use it responsibly.

GDPR Fundamentals
In this brief course, you will learn the fundamentals of GDPR. The General Data Protection Regulation (GDPR) is a comprehensive data protection law that aims to safeguard the personal data of individuals within the European Union (EU) by establishing principles such as consent, transparency, and accountability.

ISO 27001 Fundamentals
In this brief course, you will learn the fundamentals of ISO 27001 compliance. ISO 27001 is an internationally recognized standard that outlines the requirements for establishing, implementing, maintaining, and continually improving an information security management system (ISMS) within an organization.

PSPF Fundamentals (Australia)
The Australian PSPF is an essential set of guidelines designed to help Australian government entities protect their people, information, and assets. It provides a structured approach to security management, ensuring organizations can effectively navigate the complex landscape of security risks.
CCPA (United States)
In this brief course, you'll learn the basics of the California Consumer Privacy Act (CCPA). CCPA is a state-level privacy law granting residents more control over personal data. It requires businesses to be transparent about data usage, respect privacy rights, and safeguard against unauthorized access.

CVE Series: “Leaky Vessels” Container Breakout (CVE-2024-21626)
CVE-2024-21626 is a severe vulnerability affecting all versions of runc up to 1.1.11, a critical component utilized by Docker and other containerization technologies like Kubernetes. This vulnerability enables an attacker to escape from a container to the underlying host operating system. Put on your red team hat to exploit this vulnerability.

CVE Series: VFS Escape in CrushFTP (CVE-2024-4040)
CVE-2024-4040 is a critical vulnerability in CrushFTP, a Java-based robust file server. Rated with a CVSS score of 10, this flaw permits remote, unauthorized attackers to circumvent authentication mechanisms, thereby gaining remote code execution (or RCE). In this course you’ll explore, exploit, and remediate this CVE.

CVE Series: aiohttp Directory Traversal Vulnerability (CVE-2024-23334)
CVE-2024-23334 is a high severity vulnerability found in the aiohttp Python library, a popular asynchronous HTTP client/server framework. By the end of this course you will be able to execute a directory traversal attack using aiohttp's vulnerable configuration and then perform remediation steps to fix the vulnerability.

CVE Series: Apache HugeGraph Server Gremlin Query Language RCE (CVE-2024-27348)
CVE-2024-27348 is a critical vulnerability in Apache HugeGraph, a graph database designed for large-scale data management. With a CVSS score of 9.8, attackers can exploit this flaw by sending crafted payloads to execute arbitrary commands, potentially leading to a full system compromise.

CVE Series: Jenkins Arbitrary File Leak Vulnerability (CVE-2024-23897)
CVE-2024-23897 is a critical security flaw affecting Jenkins, a Java-based open-source automation server widely used for application building, testing, and deployment. It allows unauthorized access to files through the Jenkins integrated command line interface (CLI), potentially leading to remote code execution (RCE).

CVE Series: Authentication Bypass Leading to Remote Code Execution (RCE) in JetBrains TeamCity (CVE-2024-27198)
CVE-2024-27198 is a critical vulnerability in JetBrains TeamCity, a Java-based open-source automation server used for application building. This flaw allows remote, unauthorized attackers to circumvent authentication, thereby gaining admin control over the server. All versions of TeamCity On-Premises up to 2023.11.3 are affected.

CVE Series: Authentication Bypass in Apache Superset (CVE-2023-27524)
CVE-2023-27524 is a critical vulnerability in Apache Superset, affecting versions up to 2.0.1. It enables attackers to bypass authentication by exploiting weak or default SECRET_KEY values. Attackers can forge session cookies to gain admin access, leading to potential remote code execution and unauthorized data access.

Royal Ransomware Group
Royal is a spin-off group of Conti, which first emerged in January of 2022. The group consists of veterans of the ransomware industry and brings more advanced capabilities and TTPs against their victims. Begin this campaign to learn how to detect and protect against this newer APT group!

Raspberry Robin
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to use later. Once established, these C2 connections can be used for multiple purposes, including data exfiltration, espionage, and even further exploitation.

Double Trouble with Double Dragon

Weak Link in the Supply Chain

Ransomware for Financial Gain
Threat actors continue to leverage ransomware to extort victim organizations. What was once a simple scheme to encrypt target data has expanded to include data disclosure and targeting a victim’s clients or suppliers. Understanding the techniques threat actors use in these attacks is vital to having an effective detection and mitigation strategy.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.





































