Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.








The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly

CompTIA Tech+ (FC0-U71)
CompTIA Tech+ is a beginner-level certification and is perfect for you if you are considering a new career or career change to the IT industry. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

CompTIA PenTest+ (PT0-002)
CompTIA's PenTest+ certification is for cybersecurity professionals tasked with penetration testing and vulnerability management. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
-p-500%5B1%5D.webp)
Leadership and Management
Leaders and Managers are responsible for providing the vision and advocacy required for an organization to effectively manage cyber risks. This Cybersecurity Leadership and Management career path will provide you with foundational knowledge and key skills required to succeed as an effective leader within any security domain.

OWASP Top 10 - A08:2021 - Software and Data Integrity Failures

OWASP Top 10 - A04:2021 - Insecure Design

OWASP Top 10 - A09:2021 - Security Logging and Monitoring Failures

OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)

OWASP Top 10 - A05:2021 - Security Misconfiguration

OWASP Top 10 - A02:2021 - Cryptographic Failures

OWASP Top 10 - A07:2021 - Identification and Authentication Failures

OWASP Top 10 - A06:2021 - Vulnerable and Outdated Components

OWASP Top 10 - A03:2021 - Injection

Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
This hands-on lab is designed to provide learners with an understanding of how an adversary can use the Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol TTP to further their objectives in a cyber operation.

SSH Authorized Keys

Lateral Movement: Windows Remote Management

Persistence via Windows Services

System Binary Proxy Execution and a Spearphish Payload

Provision An Azure Database for MySQL Database
In this IT Pro Challenge virtual lab, you will get hands-on experience using Microsoft Azure to provision, configure, and use an Azure database for MySQL server. This lesson simulates a cloud migration strategy that you might implement for moving web apps to the cloud. These skills are essential for an Azure administrator, architect, or engineer.

Configure Blob Storage with Private Access
In this IT Pro Challenge virtual lab, learners configure an Azure storage account with a private blob container, use it to upload a file and make this container available through a shared access signature. Those pursuing Data Analyst, Network Engineering, and System Administrator careers benefit from allocating and using cloud storage.

Configure Blob Storage with Public Access in Azure
In this IT Pro Challenge virtual lab, learners get hands-on experience in the Azure portal, creating a public storage account with a blob container and uploading files to a web app. Handling storage accounts in the cloud raises capabilities for learners in Database and System Administrators, Network Engineers, and Cyber Operator career paths.

Create and Manage a VM Scale Set
The Azure platform provides tools for creating and managing VMs. This IT Pro Challenge virtual lab will give you an Azure virtual machine scale sets overview. VM scale sets provide administrators a tool for managing a set of identical VMs. The number of VMs auto-scales to match the current needs. In this lab, you will deploy a VM scale sets.

Create Linux VMs in an Availability Set
The Azure platform provides tools for creating and managing VMs. This IT Pro Challenge virtual lab will give you an Azure virtual machine scale sets overview. VM scale sets provide administrators a tool for managing a set of identical VMs. The number of VMs auto-scales to match the current needs. In this lab, you will deploy a VM scale sets.

Deploy an Azure Web App Using Deployment Slots
In this IT Pro Challenge provided by Learn on Demand Systems you create and deploy and Azure web app using deployment slots. You will then demonstrate how to deploy changes to a staging slot before deploying to the production web app. NOTE: Before you begin, please ensure you have set aside enough time to complete this IT Pro Challenge provided by ...

Provision An Azure SQL Server Database
The IT Pro Challenge virtual lab Provision, an Azure SQL Server Database, guides the student through setting up an SQL Server and Database using the Azure web portal. This will include setting up the server and database, importing data, and verifying connectivity.

Provision Relational Databases for a Web App
This IT Pro Challenge lab shows learners how to provision an Azure SQL database and an Azure Database for MySQL, use a data export file, create data structures, and configure a web app to use two different databases. As proof of concept, learners will test their work using a provided web application.

CVE Series: “Leaky Vessels” Container Breakout (CVE-2024-21626)
CVE-2024-21626 is a severe vulnerability affecting all versions of runc up to 1.1.11, a critical component utilized by Docker and other containerization technologies like Kubernetes. This vulnerability enables an attacker to escape from a container to the underlying host operating system. Put on your red team hat to exploit this vulnerability.

CVE Series: VFS Escape in CrushFTP (CVE-2024-4040)
CVE-2024-4040 is a critical vulnerability in CrushFTP, a Java-based robust file server. Rated with a CVSS score of 10, this flaw permits remote, unauthorized attackers to circumvent authentication mechanisms, thereby gaining remote code execution (or RCE). In this course you’ll explore, exploit, and remediate this CVE.

CVE Series: aiohttp Directory Traversal Vulnerability (CVE-2024-23334)
CVE-2024-23334 is a high severity vulnerability found in the aiohttp Python library, a popular asynchronous HTTP client/server framework. By the end of this course you will be able to execute a directory traversal attack using aiohttp's vulnerable configuration and then perform remediation steps to fix the vulnerability.

CVE Series: Apache HugeGraph Server Gremlin Query Language RCE (CVE-2024-27348)
CVE-2024-27348 is a critical vulnerability in Apache HugeGraph, a graph database designed for large-scale data management. With a CVSS score of 9.8, attackers can exploit this flaw by sending crafted payloads to execute arbitrary commands, potentially leading to a full system compromise.

Cybrary Challenge: Motor Mayhem

Challenge: Memory Mysteries

CVE Series: Jenkins Arbitrary File Leak Vulnerability (CVE-2024-23897)
CVE-2024-23897 is a critical security flaw affecting Jenkins, a Java-based open-source automation server widely used for application building, testing, and deployment. It allows unauthorized access to files through the Jenkins integrated command line interface (CLI), potentially leading to remote code execution (RCE).

CVE Series: Authentication Bypass Leading to Remote Code Execution (RCE) in JetBrains TeamCity (CVE-2024-27198)
CVE-2024-27198 is a critical vulnerability in JetBrains TeamCity, a Java-based open-source automation server used for application building. This flaw allows remote, unauthorized attackers to circumvent authentication, thereby gaining admin control over the server. All versions of TeamCity On-Premises up to 2023.11.3 are affected.

CVE Series: Authentication Bypass in Apache Superset (CVE-2023-27524)
CVE-2023-27524 is a critical vulnerability in Apache Superset, affecting versions up to 2.0.1. It enables attackers to bypass authentication by exploiting weak or default SECRET_KEY values. Attackers can forge session cookies to gain admin access, leading to potential remote code execution and unauthorized data access.

Royal Ransomware Group
Royal is a spin-off group of Conti, which first emerged in January of 2022. The group consists of veterans of the ransomware industry and brings more advanced capabilities and TTPs against their victims. Begin this campaign to learn how to detect and protect against this newer APT group!

Raspberry Robin
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to use later. Once established, these C2 connections can be used for multiple purposes, including data exfiltration, espionage, and even further exploitation.

Double Trouble with Double Dragon

Weak Link in the Supply Chain

Spinning a Web Shell for Initial Access

Exfiltration and Extortion
Threat actors will use stolen data exfiltrated from victim systems to extort organizations. Once they gain a foothold, they delete critical system files and threaten to release the data or disrupt operations if the victims do not pay up. Understanding these techniques is vital to defending your organization from such attacks.

Ransomware for Financial Gain
Threat actors continue to leverage ransomware to extort victim organizations. What was once a simple scheme to encrypt target data has expanded to include data disclosure and targeting a victim’s clients or suppliers. Understanding the techniques threat actors use in these attacks is vital to having an effective detection and mitigation strategy.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.