Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.









The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly
AI Curriculum

AI Fundamentals
Learn the basics of Artificial Intelligence! This skill path is designed to provide you with a general understanding of Artificial Intelligence, and how to deploy and secure it within the enterprise. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
AI Scams
In this brief course, you will learn the basics of AI scams. AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
Deepfake Awareness
In this brief course, you will learn the basics of deepfakes as part of your required Security Awareness Training. Deepfakes are synthetic media, usually videos, images, or audio, created using artificial intelligence to convincingly mimic real people. They can make someone appear to say or do something they never actually did.
Certification Prep

CompTIA Tech+ (FC0-U71)
CompTIA Tech+ is a beginner-level certification and is perfect for you if you are considering a new career or career change to the IT industry. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
Skill Paths

Network Attacks
Network Attacks exploit weaknesses in network security as an attack vector. This skill path is designed to provide you with a general understanding of Network Attacks in the context of a Penetration Tester work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Reconnaissance and Enumeration
Reconnaissance and Enumeration is the process of researching and gathering information about a target. This skill path is designed to provide you with a general understanding of Reconnaissance and Enumeration in the context of a Penetration Tester work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Network-Based Detection
Network-Based Detection extends the Log Analysis skillset to detecting suspicious events in the context of network communications. This skill path is designed to provide you with a general understanding of Network-Based Detection in the context of a SOC Analyst work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Host-Based Detection
Host-Based Detection extends the Log Analysis skillset to detecting suspicious events in the context of servers and workstations. This skill path is designed to provide you with a general understanding of Host-Based Detection in the context of a SOC Analyst work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

Log Analysis
Log Analysis is the process of reviewing and interpreting the log files generated by an IT ecosystem. This skill path is designed to provide you with a general understanding of Log Analysis in the context of a SOC Analyst work role. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

AI Fundamentals
Learn the basics of Artificial Intelligence! This skill path is designed to provide you with a general understanding of Artificial Intelligence, and how to deploy and secure it within the enterprise. Upon completing the skill path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
Career Paths
-p-500%5B1%5D.webp)
Leadership and Management
Effective Leadership and Management is critical to any security-related function. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as an effective leader within any security domain. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.

GRC Analyst
Every successful cybersecurity program requires judicious risk management and informed oversight. This career path is designed to provide you with the foundational knowledge and key skills required to succeed as a GRC Analyst or in any role that involves managing governance, risk, and compliance. Upon completing the career path, you will earn a Credly digital badge that will demonstrate to employers that you’re ready for the job.
Security Awareness Training

Secure AI Research
Learn to align AI research with secure principles to ensure due care and faster approvals. You will prioritize adversarial risks using MITRE and OWASP LLM Top 10, design data protection controls for privacy and integrity, build an evaluation process, select safe integration patterns, and communicate risk to review boards with audit-ready artifacts.
AI Scams
In this brief course, you will learn the basics of AI scams. AI scams are cyberattacks that use artificial intelligence to trick people. They create emails, videos, voice messages, or websites that look, sound, and read like the real thing, making them far more convincing and harder to detect than traditional scams.
Impersonation Scams
In this brief course, you will learn the basics of impersonation scams as part of your required Security Awareness Training. Impersonation scams happen when cybercriminals pretend to be someone you know and trust. They use urgency, realistic details, and familiar names to pressure you into acting fast, often before you have time to think or verify.
Supply Chain Risk
In this brief course, you will learn the basics of supply chain risk as part of your required Security Awareness Training. Supply chain risk is the cybersecurity threat that comes from the businesses you depend on, like suppliers, vendors, and service providers, rather than direct attacks on your own systems.
Deepfake Awareness
In this brief course, you will learn the basics of deepfakes as part of your required Security Awareness Training. Deepfakes are synthetic media, usually videos, images, or audio, created using artificial intelligence to convincingly mimic real people. They can make someone appear to say or do something they never actually did.
Collections

Registry Run Keys

Scheduled Task

Server Software Component: Web Shell

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.

Persistence via Windows Services

Automated Archive and Exfiltration
Once an adversary has firmly established access within a target environment and identified data of interest, they want to gather and exfiltrate that data. Learn to detect such late-stage threat actor campaign techniques of automated archive and exfiltration in our hands-on course.

Registry Run Keys

Scheduled Task

User Discovery

Server Software Component: Web Shell

Exfiltration Over Alternative Protocol and Clear CLI History

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.

CVE Series: Spring4Shell (CVE-2022-22965)

CVE Series: Redis (CVE-2022-0543)

CVE Series: Confluence RCE (CVE-2022-26134)

CVE Series: Follina (CVE-2022-30190)

CVE Series: Django (CVE-2022-34265)

CVE Series: Apache HTTPD (CVE-2021-42013)

Challenge: A Message Within A Message

Challenge: Space Mission

Challenge: Saving A Fellow Spy

Challenge: Between Two Numbers

OWASP Top 10 - A01:2021 - Broken Access Control

OWASP Top 10 - A02:2021 - Cryptographic Failures

OWASP Top 10 - A03:2021 - Injection

OWASP Top 10 - A04:2017 - XML External Entities

OWASP Top 10 - A04:2021 - Insecure Design

OWASP Top 10 - A05:2021 - Security Misconfiguration

Registry Run Keys

Scheduled Task

User Discovery

Server Software Component: Web Shell

Exfiltration Over Alternative Protocol and Clear CLI History

System Binary Proxy Execution and a Spearphish Payload
Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.


























