Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.









The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly
AI Curriculum

AI Fundamentals
Learn the basics of Artificial Intelligence! This skill path is designed to provide you with a general understanding of Artificial Intelligence, and how to deploy and secure it within the enterprise. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
AI Scams
In this brief course, you will learn the basics of AI scams. AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
Deepfake Awareness
In this brief course, you will learn the basics of deepfakes as part of your required Security Awareness Training. Deepfakes are synthetic media, usually videos, images, or audio, created using artificial intelligence to convincingly mimic real people. They can make someone appear to say or do something they never actually did.
Certification Prep

CompTIA Tech+ (FC0-U71)
CompTIA Tech+ is a beginner-level certification and is perfect for you if you are considering a new career or career change to the IT industry. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
Skill Paths

Data Security
Data Security encompasses security controls implemented at the data level. This skill path is designed to provide you with a general understanding of Data Security in the context of a Security Engineer work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Application Security
Application Security encompasses security controls implemented at the application level. This skill path is designed to provide you with a general understanding of Application Security in the context of a Security Engineer work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Infrastructure and Operations Security
Infrastructure and Operations Security encompasses the controls and processes implemented to protect an organization’s data, assets, and infrastructure. This skill path is designed to provide you with a general understanding of Infrastructure and Operations Security in the context of a Security Engineer work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Digital Forensics
Digital Forensics is the branch of forensic science that focuses on identifying, acquiring, processing, analyzing, and reporting on data stored electronically. This skill path is designed to provide you with a general understanding of Digital Forensics as both a skill set and work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Evasion
Evasion is the process of avoiding detection by defensive security controls during an engagement. This skill path is designed to provide you with a general understanding of Evasion in the context of a Penetration Tester work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Application Attacks
Application Attacks exploit weaknesses in application security as an attack vector. This skill path is designed to provide you with a general understanding of Application Attacks in the context of a Penetration Tester work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
Career Paths
-p-500%5B1%5D.webp)
Leadership and Management
Effective Leadership and Management is critical to any security-related function. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as an effective leader within any security domain. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

GRC Analyst
Every successful cybersecurity program requires judicious risk management and informed oversight. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as a GRC Analyst or in any role that involves managing governance, risk, and compliance. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
Security Awareness Training

Secure AI Research
Learn to align AI research with secure principles to ensure due care and faster approvals. You will prioritize adversarial risks using MITRE and OWASP LLM Top 10, design data protection controls for privacy and integrity, build an evaluation process, select safe integration patterns, and communicate risk to review boards with audit-ready artifacts.
AI Scams
In this brief course, you will learn the basics of AI scams. AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
Impersonation Scams
In this brief course, you will learn the basics of impersonation scams as part of your required Security Awareness Training. Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify.
Supply Chain Risk
In this brief course, you will learn the basics of supply chain risk as part of your required Security Awareness Training. Supply chain risk is the cybersecurity threat that comes from the businesses you depend on, like suppliers, vendors, and service providers, rather than direct attacks on your own systems.
Deepfake Awareness
In this brief course, you will learn the basics of deepfakes as part of your required Security Awareness Training. Deepfakes are synthetic media, usually videos, images, or audio, created using artificial intelligence to convincingly mimic real people. They can make someone appear to say or do something they never actually did.
Collections

Registry Run Keys

Scheduled Task

Server Software Component: Web Shell

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.

Persistence via Windows Services

Automated Archive and Exfiltration
Once an adversary has firmly established access within a target environment and identified data of interest, they want to gather and exfiltrate that data. Learn to detect such late-stage threat actor campaign techniques of automated archive and exfiltration in our hands-on course.

Match Legitimate Name or Location and Data Encrypted for Impact

Kerberoasting and Domain Accounts

Raspberry Robin: Campaign Overview
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to for data exfiltration, espionage, and even further exploitation.

Exploitation for Privilege Escalation
This hands-on lab covers the MITRE technique T1068 - Exploitation for Privilege Escalation. This technique involves an adversary exploiting a vulnerability with the objective of gaining higher privileges. Learners will practice simulating privilege escalation and using a SIEM to detect this attack.

Introduction to AI Technology
In this course, you will be introduced to the core concepts that enable modern artificial intelligence. You will learn about the historical and scientific contexts that AI emerged from, the baseline concepts that enable AI, linear regression, and how neural networks are able to "recognize" images.

Understanding AI-Related Threats
In this course, you will be introduced to emerging threats related to artificial intelligence. You will learn about how AI is used for security, how it can improve or degrade security in an enterprise, how AI models are trained and subverted, how AI systems are attacked, and how neural networks might be able to "view" an attack surface.

CVE Series: Spring4Shell (CVE-2022-22965)

CVE Series: Redis (CVE-2022-0543)

CVE Series: Confluence RCE (CVE-2022-26134)

CVE Series: Follina (CVE-2022-30190)

CVE Series: Django (CVE-2022-34265)

CVE Series: Apache HTTPD (CVE-2021-42013)

Challenge: Spiny Shell

Challenge: The Base(64)ics

Challenge: Episode II - Attack of the Encoders

Challenge: MFA ... All Day Every Day

Challenge: Update B4 It's 2Late

Challenge: For the Rebellion or the Empire

OWASP Top 10 - A01:2021 - Broken Access Control

OWASP Top 10 - A02:2021 - Cryptographic Failures

OWASP Top 10 - A03:2021 - Injection

OWASP Top 10 - A04:2017 - XML External Entities

OWASP Top 10 - A04:2021 - Insecure Design

OWASP Top 10 - A05:2021 - Security Misconfiguration

Registry Run Keys

Scheduled Task

User Discovery

Server Software Component: Web Shell

Exfiltration Over Alternative Protocol and Clear CLI History

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.
























