Azure Certification for Career Changers: Bridging the Gap to Cloud Computing
Build a cloud career by mapping servers, networking, and IAM to Azure, pursuing azure certifications, and reinforcing learning with hands-on labs.
Cybrary’s structured, hands-on cybersecurity training empowers professionals to better protect their organizations. Through curated Skill and Career Paths, threat-informed courses, and industry-aligned Certification Preparation, we offer the best in the business.

Trusted by leading organizations worldwide



Start your cyber journey with guided Career Paths that teach the foundational concepts related to real, on-the-job responsibilities.
Our scalable, repeatable onboarding programs ensure every new employee has the same foundation of knowledge and skills.
Ace the exam with Certification Prep Paths developed by industry-leading instructors. Gain insider tips and build confidence with our practice exams.
Master hands-on skills and familiarize yourself with the latest vulnerabilities and threats so you can prepare for real-world attacks.
Create new opportunities for your most committed personnel and watch your retention rates soar.
Use real-time data to discover how closely correlated employee cybersecurity training is to risk reduction and costs savings.
Upskill your team with Cybrary’s suite of learning activities and management tools, including hands-on Virtual Labs, role-aligned Career Paths, and personalized remediation. Request a demo and learn how Cybrary tailors our deep library of training to your team’s unique needs.


In this course, you will learn the basics of defensive security and cyber risk. You will review foundational risk management concepts such as calculating risk and strategies for dealing with risk. You will also explore the NIST CSF as a framework for understanding defensive security.

CompTIA’s Security+ is a globally recognized certification that equips IT professionals with cybersecurity principles and security best practices, and is often used as a requirement for entry-level cybersecurity positions. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

Our Kali Linux certification course and training is designed for those interested in penetration testing and ethical hacking. Kali Linux course is a great place to start your Kali Linux training to learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation.
Cybrary's accessible, affordable cybersecurity courses & training platform provides curated career paths, threat-informed training, and certification preparation for professionals at all levels.Start Learning for Free





Upskill your team with Cybrary's suite of learning activities and management tools, including hands-on practice labs, assessments, and custom guided pathways. Request a demo and learn how Cybrary tailors our deep library of trainings to your team's unique needs.


This course will teach you how to use AI copilots safely and responsibly in real-world investigations. You will learn how to combine human judgment with AI speed, apply governance frameworks, identify AI-specific threats, and measure tangible improvements in performance and accuracy.

This course provides an overview of every stage of the AI Security Lifecycle, from planning and data preparation to deployment, monitoring, and governance—equipping them with the frameworks, tools, and best practices necessary to safeguard AI models and data in enterprise environments.

Artificial Intelligence is reshaping how organizations make decisions, build products, and serve customers. Yet for every success story, there are many AI projects that fail compliance reviews, stall before launch, or create new risks because teams lacked clear, actionable best practices. This course was created to bridge that gap.

Every successful AI initiative, regardless of size or complexity, follows a repeatable process known as the machine learning (ML) lifecycle. Learn the phases of a typical ML lifecycle and why adopting one is the single most important factor in delivering reliable, ethical, and cost-effective AI solutions.

Artificial Intelligence is not a single system or tool. It's a collection of different methods that learn, reason, and solve problems in unique ways. Each type of AI has its own strengths, limitations, and data requirements. Learn how these types differ, when to use each, and what tradeoffs are most important in production systems.

Before any algorithm is trained or deployed, its success depends on one thing: the shape and structure of the data feeding it. This course establishes the foundation for understanding why data modeling (how information is organized, related, and represented) is the most critical stage of any AI or machine learning (ML) project.

Agentic AI systems are autonomous, goal-driven assemblies of models and tools that can plan, act, and interact with external systems with limited supervision. This course explains what agentic AI is, how Model Context Protocol enable agent orchestration, and why they introduce new attack surfaces.

Artificial Intelligence has moved from the realm of research into the everyday reality of business and IT. Most professionals now use AI-powered tools in their work, but many still misunderstand what an AI system actually is. This course defines what we mean by an AI system and shows how these systems fit into enterprise architectures.

Test your knowledge of Leadership and Management Fundamentals to identify strengths, gaps, and weaknesses in areas like Leadership Basics, Mentorship, Leadership Traits, and Types of Leadership. Measure your mastery of Leadership and Management Fundamentals and advance your career with targeted course recommendations.

Test your knowledge of Cybersecurity Leadership to identify strengths, gaps, and weaknesses in areas like Financial Principles, Business Strategy, Cybertalk in Business Terms, and Executive Presence & Branding. Measure your mastery of Cybersecurity Leadership and advance your career with targeted course recommendations.

Upon completing this course, you should be able to:

Test your knowledge of Collaborative Leadership to identify strengths, gaps, and weaknesses in areas like Leading Successful Teams, Empowerment, Innovation, and Networking & Relationship Management. Measure your mastery of Collaborative Leadership and advance your career with targeted course recommendations.

In this course, you will be introduced to the basics of networking and relationship management. You will learn strategies for building and sustaining high-value relationships, managing relationships in the boardroom, and leveraging your networks for strategic security outcomes.

In this course, you will be introduced to policy issues in AI security. You will learn about the historical context of government action on powerful innovations, the principles that can guide secure AI usage, the ethical considerations in AI deployment, and the impacts of AI on governance, policy, trust, and procurement.

In this course, you will be introduced to how guard rails can be implemented to secure AI. You will learn about the models used to guide security for AI, where and which guard rails are necessary for securing AI in the enterprise, what approaches vendors are using to secure AI, and how AI is being used in the SOC.

In this course, you will be introduced to emerging threats related to artificial intelligence. You will learn about how AI is used for security, how it can improve or degrade security in an enterprise, how AI models are trained and subverted, how AI systems are attacked, and how neural networks might be able to "view" an attack surface.

In this course, you will be introduced to the core concepts that enable modern artificial intelligence. You will learn about the historical and scientific contexts that AI emerged from, the baseline concepts that enable AI, linear regression, and how neural networks are able to "recognize" images.

This hands-on lab covers the MITRE technique T1068 - Exploitation for Privilege Escalation. This technique involves an adversary exploiting a vulnerability with the objective of gaining higher privileges. Learners will practice simulating privilege escalation and using a SIEM to detect this attack.

Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to for data exfiltration, espionage, and even further exploitation.

CVE-2024-21626 is a severe vulnerability affecting all versions of runc up to 1.1.11, a critical component utilized by Docker and other containerization technologies like Kubernetes. This vulnerability enables an attacker to escape from a container to the underlying host operating system. Put on your red team hat to exploit this vulnerability.

CVE-2024-4040 is a critical vulnerability in CrushFTP, a Java-based robust file server. Rated with a CVSS score of 10, this flaw permits remote, unauthorized attackers to circumvent authentication mechanisms, thereby gaining remote code execution (or RCE). In this course you’ll explore, exploit, and remediate this CVE.

CVE-2024-23334 is a high severity vulnerability found in the aiohttp Python library, a popular asynchronous HTTP client/server framework. By the end of this course you will be able to execute a directory traversal attack using aiohttp's vulnerable configuration and then perform remediation steps to fix the vulnerability.

CVE-2024-27348 is a critical vulnerability in Apache HugeGraph, a graph database designed for large-scale data management. With a CVSS score of 9.8, attackers can exploit this flaw by sending crafted payloads to execute arbitrary commands, potentially leading to a full system compromise.

CompTIA Tech+ is a beginner-level certification and is perfect for you if you are considering a new career or career change to the IT industry. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

The ISACA Certified Information Security Manager (CISM) practice test from CyberVista helps students to prepare for the ISACA CISM certification. In the practice test, learners demonstrate their advanced knowledge and ability to manage, design, monitor, and assess information security. This practice exam is aligned to CISM 16th edition.

Get ready for the CFR 410 Certification! This practice exam measures your ability as a first responder to defend against and respond to cyber-attacks. It evaluates your knowledge of threat analysis, secure computing and network environment designs, vulnerability assessments, and incident response.
Explore our on-demand cybersecurity courses & training developed by seasoned certified cybersecurity practitioners, aligned to the certification exam’s key learning objectives.