Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.









The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly

AI Fundamentals
Learn the basics of Artificial Intelligence! This skill path is designed to provide you with a general understanding of Artificial Intelligence, and how to deploy and secure it within the enterprise. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
AI Scams
In this brief course, you will learn the basics of AI scams. AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
Deepfake Awareness
In this brief course, you will learn the basics of deepfakes as part of your required Security Awareness Training. Deepfakes are synthetic media, usually videos, images, or audio, created using artificial intelligence to convincingly mimic real people. They can make someone appear to say or do something they never actually did.

Using Artificial Intelligence Securely
In this brief course, you will learn the basics of using artificial intelligence securely as part of your required Security Awareness Training. AI represents technological progress, giving us powerful tools that are widely accessible. To use AI safely at work, we must grasp its limitations, risks, and privacy implications.

CompTIA Tech+ (FC0-U71)
CompTIA Tech+ is a beginner-level certification and is perfect for you if you are considering a new career or career change to the IT industry. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

CompTIA PenTest+ (PT0-002)
CompTIA's PenTest+ certification is for cybersecurity professionals tasked with penetration testing and vulnerability management. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
-p-500%5B1%5D.webp)
Leadership and Management
Effective Leadership and Management is critical to any security-related function. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as an effective leader within any security domain. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

GRC Analyst
Every successful cybersecurity program requires judicious risk management and informed oversight. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as a GRC Analyst or in any role that involves managing governance, risk, and compliance. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Governance
Governance is the system of rules, practices, and processes used to direct and control a company. This skill path is designed to provide you with a general understanding of how to align business objectives with ethical practices for how a company operates. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Compliance
Compliance is the act of adhering to all relevant laws, regulations, industry standards (external), and internal policies and controls (corporate). This skill path is designed to provide you with a general understanding of how to ensure an organization operates within legal and ethical boundaries to avoid fines, penalties, and reputational damage. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Cybersecurity Leadership
Becoming an effective Cybersecurity Leader requires you to consider traditional Leadership competencies through a security-centric lens. This skill path is designed to provide you with a general understanding of cybersecurity leadership. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Collaborative Leadership
Collaborative Leadership is the skillset required to work effectively with others. This skill path is designed to provide you with a general understanding of the collaborative skills required to be a successful leader. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Soft Skills
Soft Skills are the traits required for positive and constructive interactions with other people. This skill path is designed to provide you with a general understanding of the soft skills required to be a successful leader. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Incident Response
Incident Response is the rapid response function that addresses high-impact security events in real time. This skill path is designed to provide you with a general understanding of Incident Response as both a skill set and work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Secure AI Research
Learn to align AI research with secure principles to ensure due care and faster approvals. You will prioritize adversarial risks using MITRE and OWASP LLM Top 10, design data protection controls for privacy and integrity, build an evaluation process, select safe integration patterns, and communicate risk to review boards with audit-ready artifacts.
AI Scams
In this brief course, you will learn the basics of AI scams. AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
Impersonation Scams
In this brief course, you will learn the basics of impersonation scams as part of your required Security Awareness Training. Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify.
Supply Chain Risk
In this brief course, you will learn the basics of supply chain risk as part of your required Security Awareness Training. Supply chain risk is the cybersecurity threat that comes from the businesses you depend on, like suppliers, vendors, and service providers, rather than direct attacks on your own systems.
Deepfake Awareness
In this brief course, you will learn the basics of deepfakes as part of your required Security Awareness Training. Deepfakes are synthetic media, usually videos, images, or audio, created using artificial intelligence to convincingly mimic real people. They can make someone appear to say or do something they never actually did.
Secure Traveling
Secure traveling is the practice of protecting your devices and data while on the move. It means avoiding unsafe networks, keeping your devices physically and digitally secure, and staying alert to risks like theft or data leaks, so you can travel with confidence and keep your personal or work information safe.
Shadow IT
In this brief course, you will learn the basics of shadow IT as part of your required Security Awareness Training. Shadow IT is when employees use digital tools, applications or services such as cloud storage, messaging apps, or project software, without the approval or knowledge of their organization’s IT or security team.

OWASP Top 10 - A01:2021 - Broken Access Control

OWASP Top 10 - A02:2021 - Cryptographic Failures

OWASP Top 10 - A03:2021 - Injection

OWASP Top 10 - A04:2017 - XML External Entities

OWASP Top 10 - A04:2021 - Insecure Design

OWASP Top 10 - A05:2021 - Security Misconfiguration

OWASP Top 10 - A06:2021 - Vulnerable and Outdated Components

OWASP Top 10 - A07:2021 - Identification and Authentication Failures

OWASP Top 10 - A08:2021 - Software and Data Integrity Failures

Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
This hands-on lab is designed to provide learners with an understanding of how an adversary can use the Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol TTP to further their objectives in a cyber operation.

SSH Authorized Keys

Lateral Movement: Windows Remote Management

Persistence via Windows Services

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.

Deploy a Web Job
Deploy a Web Job Guided IT Pro Challenge from Learn on Demand challenges students to provision, deploy, and test an Azure web task. The web task will be deployed to an existing web application. This requires learning the Microsoft Azure Resource group services as well as fundamental web application concepts.

Use Managed Identities
This IT Pro Challenge lab teaches you how to use the Azure portal to provision a virtual machine, assign it a role, and enable system-assigned managed identity. You will also grant permissions to that managed identity as well as verify a managed identity access token. Finally, you will learn how to remove permissions.

Configure Continuous Deployment using GIT and Deployment Slots
This IT Pro Challenge virtual lab teaches learners to set up an Azure Portal web app for continuous release through creating deployment slots and enabling GIT. Learners pursuing careers in Software Programming, System Administration, Cybersecurity, and Quality Testing, benefit from managing cloud development environments in this lab.

Enable VM Backup using Recovery Services Vault
This IT Pro Challenge virtual lab teaches learners how to use recovery services vault. Learners will gain experience using services vault, backup policy to enable virtual machine backup. Skills learned in this lab are valuable in multiple job roles such as System administrator and Azure administrators in IT.

Use Azure Storage Explorer
This IT Pro Challenges virtual lab teaches learners fundamental Azure Storage Account skills to create, deploy to, and upload to a storage account. Also, participants take and manage image snapshots. This hands-on experience benefits business and technical people in using the Azure cloud successfully to keep and backup files.

Enable Dynamic Data Masking using Azure SQL Database
In this hands-on lab, learners are introduced to the skills required to secure the Azure SQL. Exercises in this lab teach users how to enable dynamic data masking using a logical server and query editor while learning the Azure concepts. The topics covered in this lab are crucial for learners to be effective in Azure administrator roles in IT.

Configure Geo-Replication for your Database
This Configure Geo-Replication for your Database IT Pro Challenge virtual lab shows learners how to create a new Azure SQL Database, enable it for Geo-Replication, and test it for failover. The skills that learners acquire in this challenge are valuable to database administrators in the IT or cybersecurity fields.

Provision an Azure Storage Queue
In this IT Pro Challenge virtual lab, you will get hands-on experience using Microsoft Azure’s Storage Account for message queues. You will implement and test a Web App’s ability to add and retrieve messages from a message queue and validate queue logging. These skills are essential for someone pursuing a career path as an Azure administrator.

Provision an Azure Storage Table
This IT Pro Challenge virtual lab shows learners how to use the Azure portal to create a Storage Account and update an existing Web Application with a new connection string. As proof of concept, learners will verify that the Web App loaded/read rows in a Storage Table. Learners will also verify that logging is active for the Storage Account.

CVE Series: “Leaky Vessels” Container Breakout (CVE-2024-21626)
CVE-2024-21626 is a severe vulnerability affecting all versions of runc up to 1.1.11, a critical component utilized by Docker and other containerization technologies like Kubernetes. This vulnerability enables an attacker to escape from a container to the underlying host operating system. Put on your red team hat to exploit this vulnerability.

CVE Series: VFS Escape in CrushFTP (CVE-2024-4040)
CVE-2024-4040 is a critical vulnerability in CrushFTP, a Java-based robust file server. Rated with a CVSS score of 10, this flaw permits remote, unauthorized attackers to circumvent authentication mechanisms, thereby gaining remote code execution (or RCE). In this course you’ll explore, exploit, and remediate this CVE.

CVE Series: aiohttp Directory Traversal Vulnerability (CVE-2024-23334)
CVE-2024-23334 is a high severity vulnerability found in the aiohttp Python library, a popular asynchronous HTTP client/server framework. By the end of this course you will be able to execute a directory traversal attack using aiohttp's vulnerable configuration and then perform remediation steps to fix the vulnerability.

CVE Series: Apache HugeGraph Server Gremlin Query Language RCE (CVE-2024-27348)
CVE-2024-27348 is a critical vulnerability in Apache HugeGraph, a graph database designed for large-scale data management. With a CVSS score of 9.8, attackers can exploit this flaw by sending crafted payloads to execute arbitrary commands, potentially leading to a full system compromise.

CVE Series: Grafana Directory Traversal (CVE-2021-43798)

CVE Series: Apache HTTPD (CVE-2021-42013)

CVE Series: Django (CVE-2022-34265)

CVE Series: Follina (CVE-2022-30190)

CVE Series: Confluence RCE (CVE-2022-26134)

CVE Series: Redis (CVE-2022-0543)

CVE Series: Spring4Shell (CVE-2022-22965)

Royal Ransomware Group
Royal is a spin-off group of Conti, which first emerged in January of 2022. The group consists of veterans of the ransomware industry and brings more advanced capabilities and TTPs against their victims. Begin this campaign to learn how to detect and protect against this newer APT group!

Raspberry Robin
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to use later. Once established, these C2 connections can be used for multiple purposes, including data exfiltration, espionage, and even further exploitation.

Double Trouble with Double Dragon

Weak Link in the Supply Chain

Ransomware for Financial Gain
Threat actors continue to leverage ransomware to extort victim organizations. What was once a simple scheme to encrypt target data has expanded to include data disclosure and targeting a victim’s clients or suppliers. Understanding the techniques threat actors use in these attacks is vital to having an effective detection and mitigation strategy.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.


































