Profile Image
Director of Research at Cybrary

I am a cybersecurity researcher, software engineer, security analyst, and general jack-of-all trades. I’ve worked in Cybersecurity for most of a decade, fulfilling roles throughout the US Federal Government; primarily in the Department of Defense and Intelligence community.

See More

Joe Perry's Courses

How to Use Armitage - Overview (BSWJ)
Armitage is best known as the world-renowned GUI frontend for Metasploit, but it's actually so ...
Certificate of Completion Offered
9 minutes
Course
Intermediate
How to Use Arp-Scan (BSWJ)
Arp-scan is a low-level network discovery tool used to associate physical (MAC) addresses to logical…
Certificate of Completion Offered
12 minutes
Course
Intermediate
How to Use BeEF (BSWJ)
The Browser Exploitation Framework (BeEF) is a pentesting utility focused upon exploitation of and…
Certificate of Completion Offered
10 minutes
Course
Intermediate
How to Use Crackle (BSWJ)
Crackle tool tutorial (BSWJ)
Certificate of Completion Offered
9 minutes
Course
Intermediate
How to use SSLCaudit (BSWJ)
Enter SSLCaudit. SSLCaudit is an automated tool for testing SSL/TLS connections' vulnerability to…
Certificate of Completion Offered
5 minutes
Course
Intermediate
How to Use OpenVAS (BSWJ)
In this video, we examine one of the most popular open-source vulnerability scanning tools in ...
Certificate of Completion Offered
9 minutes
Course
Intermediate
Intermediate Python
Intermediate Python uses and builds upon the materials from Intro to Python, using the Python…
Certificate of Completion Offered
2 hours
Course
Intermediate
Intro to Python
This course will take you from basic concepts to advanced scripts in just over 10 ...
Certificate of Completion Offered
2 hours 57 minutes
Course
Beginner
How to Use IDA (BSWJ)
The IDA is used throughout the IT and cybersecurity industries by exploit developers, vulnerability…
Certificate of Completion Offered
32 minutes
Course
Intermediate
How To Use Cain & Abel (BSWJ)
Cain and Abel is specifically designed to target Windows systems and is capable of gathering ...
Certificate of Completion Offered
21 minutes
Course
Intermediate
How to Use GDB (BSWJ)
The GNU Debugger (GDB) is one of the most commonly-used debugging tools in the world. ...
Certificate of Completion Offered
28 minutes
Course
Intermediate
How to Use WinDBG (BSWJ)
The Windows Debugger (WinDBG, often pronounced 'Windbag') is an incredibly powerful tool for…
Certificate of Completion Offered
20 minutes
Course
Intermediate
How to Use NGrep (BSWJ)
Network Grep (NGREP) is a useful network analysis tool which performs operations based upon the ...
Certificate of Completion Offered
14 minutes
Course
Intermediate
How to Use Amap (BSWJ)
The application mapper (AMAP) is an information-gathering tool which allows the user to identify the…
Certificate of Completion Offered
10 minutes
Course
Intermediate
How to Use DNSMap (BSWJ)
DNS Map is a reconnaissance and evaluation tool used to identify all subdomains of a ...
Certificate of Completion Offered
12 minutes
Course
Intermediate
How to Use John the Ripper (BSWJ)
John the Ripper is quite possibly the most famous password-cracking tool in the world. It's ...
Certificate of Completion Offered
18 minutes
Course
Intermediate
Post Exploitation Hacking
In this free self-paced online training course, you will cover three main topics: Information…
Certificate of Completion Offered
7 hours 47 minutes
Course
Advanced
How to Use Cisco-OCS (BSWJ)
In the world of networking, few names are so ubiquitous as Cisco. Cisco devices are ...
Certificate of Completion Offered
5 minutes
Course
Intermediate
How to Use ExploitDB (BSWJ)
The most complete collection of exploit code in the world, the ExploitDB is an invaluable ...
Certificate of Completion Offered
7 minutes
Course
Intermediate
How to Use Armitage - Exploitation (BSWJ)
In this video, you'll learn to make use of the hacking platform Armitage in order ...
Certificate of Completion Offered
11 minutes
Course
Intermediate
How to Use Armitage - Host Management (BSWJ)
Learn to use the hacking tool Armitage in order to perform network scans, import existing ...
Certificate of Completion Offered
6 minutes
Course
Intermediate
How to Use APT2 (BSWJ)
The Automated Pentration Testing Toolkit (APT2), is an offensive program used to perform scans…
Certificate of Completion Offered
19 minutes
Course
Intermediate
Introduction to IT & Cybersecurity
In this free, online IT and cybersecurity introduction course, you will learn about the four ...
Certificate of Completion Offered
4 hours 21 minutes
Course
Beginner
How to Use Braa (BSWJ)
Braa is a mass SNMP-scanning tool used to identify and list all devices on the ...
Certificate of Completion Offered
15 minutes
Course
Intermediate

See More

About Joe Perry

I’m a graduate of the Joint Cyber Analysis Course, the Advanced Cyber Training Program, and the Computer Network Operations Development Program. I’ve offered consultation to organizations of sizes from 10 employees to tens of thousands of employees, and I’ve contributed to dozens of security curricula and training programs. Now, I work here at Cybrary as the Director of Research, where I get to spend my days creating new content and knowledge to help aspiring IT and security professionals build their careers.

In my rare free time, I write tabletop and live action games, and manage events and gaming conventions. In the even more rare downtime between those events, I enjoy reading and rowing. In 2019 I’m working on a personal project to read 100 new books by the end of the year.

Join Cybrary's growing community of industry leaders!

The Cybrary Community is an integral part of our organization. Our platform is filled with instructors, industry professionals, mentors, published authors, and much more. By becoming part of the community, you not only have access to these resources, but can also learn and contribute to become the next leader in the industry. Become part of the team today!