Key Strategies to Enhance Your Team's Engagement and Skills
Boost your team's cybersecurity skills this new year. Learn how to set goals, track progress, and keep employees engaged with Cybrary’s training tools.
Cybrary’s structured, hands-on cybersecurity training empowers professionals to better protect their organizations. Through curated Skill and Career Paths, threat-informed courses, and industry-aligned Certification Preparation, we offer the best in the business.
Trusted by leading organizations worldwide
Start your cyber journey with guided Career Paths that teach the foundational concepts related to real, on-the-job responsibilities.
Our scalable, repeatable onboarding programs ensure every new employee has the same foundation of knowledge and skills.
Ace the exam with Certification Prep Paths developed by industry-leading instructors. Gain insider tips and build confidence with our practice exams.
Master hands-on skills and familiarize yourself with the latest vulnerabilities and threats so you can prepare for real-world attacks.
Create new opportunities for your most committed personnel and watch your retention rates soar.
Use real-time data to discover how closely correlated employee cybersecurity training is to risk reduction and costs savings.
Upskill your team with Cybrary’s suite of learning activities and management tools, including hands-on Virtual Labs, role-aligned Career Paths, and personalized remediation. Request a demo and learn how Cybrary tailors our deep library of training to your team’s unique needs.
In this course, you will learn the basics of defensive security and cyber risk. You will review foundational risk management concepts such as calculating risk and strategies for dealing with risk. You will also explore the NIST CSF as a framework for understanding defensive security.
CompTIA’s Security+ is a globally recognized certification that equips IT professionals with cybersecurity principles and security best practices, and is often used as a requirement for entry-level cybersecurity positions. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
Our OSINT certification course and training for open source intelligence (OSINT), the process of collecting and analyzing publicly available information that can be exploited by adversaries. Learn techniques for gathering intelligence from public data sources and how to leverage this knowledge to defend your organization from those who wish to do harm.
ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based auditing practices. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
Our Kali Linux certification course and training is designed for those interested in penetration testing and ethical hacking. Kali Linux course is a great place to start your Kali Linux training to learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation.
Cybrary's accessible, affordable cybersecurity courses & training platform provides curated career paths, threat-informed training, and certification preparation for professionals at all levels.Start Learning for Free
Upskill your team with Cybrary's suite of learning activities and management tools, including hands-on practice labs, assessments, and custom guided pathways. Request a demo and learn how Cybrary tailors our deep library of trainings to your team's unique needs.
CVE-2024-23897 is a critical security flaw affecting Jenkins, a Java-based open-source automation server widely used for application building, testing, and deployment. It allows unauthorized access to files through the Jenkins integrated command line interface (CLI), potentially leading to remote code execution (RCE).
CVE-2024-21626 is a severe vulnerability affecting all versions of runc up to 1.1.11, a critical component utilized by Docker and other containerization technologies like Kubernetes. This vulnerability enables an attacker to escape from a container to the underlying host operating system. Put on your red team hat to exploit this vulnerability.
CVE-2023-27524 is a critical vulnerability in Apache Superset, affecting versions up to 2.0.1. It enables attackers to bypass authentication by exploiting weak or default SECRET_KEY values. Attackers can forge session cookies to gain admin access, leading to potential remote code execution and unauthorized data access.
Confluence suffers from a Broken Access Control vulnerability that affects Data Center and Server versions 8.0.0 to 8.3.2, 8.4.0 to 8.4.2, and 8.5.0 to 8.5.1. Threat actors exploit this vulnerability to obtain administrator access to Confluence servers. Put on your Red Team hat to create your own malicious admin account leveraging this CVE!
In this course, you will learn the basics of defensive security and cyber risk. You will review foundational risk management concepts such as calculating risk and strategies for dealing with risk. You will also explore the NIST CSF as a framework for understanding defensive security.
Want to better understand the 2020 SolarWinds compromise that dominated the headlines? Interact with the malware used in the attack in this SolarWinds hands-on course and virtual lab so you can detect whether your organization was affected and protect against this type of threat in the future.
Learn to reduce risk by rapidly remediating active attacks in your environment, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. You will get the most out of this course if you are familiar with Microsoft 365, Azure cloud services, and Windows and Linux operating systems.
Our ethical hacking course and training seeks to assess the strength of your organization’s cybersecurity posture, whereby you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This ethical hacking course will give you those skills and prepare you for related certification exams so you can prove your capabilities.
CompTIA’s Security+ is a globally recognized certification that equips IT professionals with cybersecurity principles and security best practices, and is often used as a requirement for entry-level cybersecurity positions. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based auditing practices. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
Explore our on-demand cybersecurity courses & training developed by seasoned certified cybersecurity practitioners, aligned to the certification exam’s key learning objectives.