What is Pentesting? A Beginner's Guide to Ethical Hacking and Pentesters
Learn what pentesting is, what pentesters do, the tools and skills that matter, and how to start with hands-on practice and certs. Train with Cybrary.
Cybrary’s structured, hands-on cybersecurity training empowers professionals to better protect their organizations. Through curated Skill and Career Paths, threat-informed courses, and industry-aligned Certification Preparation, we offer the best in the business.

Trusted by leading organizations worldwide



Start your cyber journey with guided Career Paths that teach the foundational concepts related to real, on-the-job responsibilities.
Our scalable, repeatable onboarding programs ensure every new employee has the same foundation of knowledge and skills.
Ace the exam with Certification Prep Paths developed by industry-leading instructors. Gain insider tips and build confidence with our practice exams.
Master hands-on skills and familiarize yourself with the latest vulnerabilities and threats so you can prepare for real-world attacks.
Create new opportunities for your most committed personnel and watch your retention rates soar.
Use real-time data to discover how closely correlated employee cybersecurity training is to risk reduction and costs savings.
Upskill your team with Cybrary’s suite of learning activities and management tools, including hands-on Virtual Labs, role-aligned Career Paths, and personalized remediation. Request a demo and learn how Cybrary tailors our deep library of training to your team’s unique needs.


In this course, you will learn the basics of defensive security and cyber risk. You will review foundational risk management concepts such as calculating risk and strategies for dealing with risk. You will also explore the NIST CSF as a framework for understanding defensive security.

In this course, you will learn the basics of defensive security operations. You will review the key roles and responsibilities within a Security Operations Center (SOC), as well as enabling technologies for defensive security, including a deep dive on Continuous Monitoring.

CompTIA’s Security+ is a globally recognized certification that equips IT professionals with cybersecurity principles and security best practices, and is often used as a requirement for entry-level cybersecurity positions. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.

Our Kali Linux certification course and training is designed for those interested in penetration testing and ethical hacking. Kali Linux course is a great place to start your Kali Linux training to learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation.
Cybrary's accessible, affordable cybersecurity courses & training platform provides curated career paths, threat-informed training, and certification preparation for professionals at all levels.Start Learning for Free





Upskill your team with Cybrary's suite of learning activities and management tools, including hands-on practice labs, assessments, and custom guided pathways. Request a demo and learn how Cybrary tailors our deep library of trainings to your team's unique needs.


This course provides an in-depth exploration of advanced threat modeling techniques. It covers essential tools like MITRE ATT&CK Navigator and Deciduous, and guides you through developing detailed threat models for complex environments. Learn to visualize attack paths and conduct thorough threat modeling workshops.

Prepare for the Microsoft Azure Infrastructure Solutions (AZ-305) exam. Learners should have advanced experience and knowledge of IT operations, including networking, virtualization, identity, security, business continuity, disaster recovery, data platforms, and governance.

To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This breif course introduces the skills needed to prepare for related certification exams so you can prove your capabilities.

Learn to provision an Azure Container Registry, acting as a system administrator for a company that is migrating its document processing system from its datacenter to Azure. You will provision an Azure Container Registry, migrate an image from Docker Hub to the registry, and verify the image is in the registry.

In this lab by Learn On Demand Systems, you will implement Azure network and high-availability features. First, you will create an Azure virtual network (VNet), and then you will implement Azure virtual network routing and Azure security groups. Next, you will configure Azure virtual network peering, and then you will configure a VNet-to-VNet conne...

In this challenge by Learn On Demand Systems, you will control virtual network traffic. First, you will create a virtual network. Next, you will implement Azure virtual network routing. Finally, you will implement network security groups and application security groups.

The flexibility provided by the cloud is an amazing benefit until it results in unbounded sprawl and out of control costs in your cloud environment. Azure Policies are a critical tool in the prevention of overrun costs and improperly sized resources. This lab will give you hands-on experience implementing Azure Policies to secure your environment.

In this lab by Learn On Demand Systems, you will create and monitor Azure® storage accounts and virtual machines. First, you will implement and manage access to Azure storage accounts, and then you will configure monitoring of an Azure storage account. Next, you will automate the deployment of Azure virtual machines. Finally, you will configure mon...

In this lab, you will assume the role of an Azure® Administrator tasked with deploying an Azure virtual machine (VM) using Azure Resource Manager (ARM) templates. First, you will deploy a VM that runs Windows® by using a modified Azure Resource Manager quickstart template, and then you will save the existing deployment to a new ARM template.

This IT Pro Challenge lab teaches you how to use the Azure portal to provision a virtual machine, assign it a role, and enable system-assigned managed identity. You will also grant permissions to that managed identity as well as verify a managed identity access token. Finally, you will learn how to remove permissions.

In this challenge by Learn On Demand Systems, you will implement, manage, and monitor Azure Storage. First, you will create an Azure storage account, and then you will upload a document to a container in the storage account. Next, you will configure storage account security mechanisms. Finally, you will configure monitoring for a storage account.

This IT Pro Challenges virtual lab teaches learners how to configure azure key vault and a web app to use a secret. Learners will gain experience using azure key vault and access policy to store a connection string as a secret. Skills learned in this lab are valuable in multiple job roles such as system administrator and Azure administrator.

In this IT Pro Challenge virtual lab, you will get hands-on experience securing Azure Platform services to secure an Azure SQL Database. You will learn how to configure an Azure AD server administrator, configure auditing, and administer an Azure firewall. These are important skills for someone pursuing a career as a Microsoft Azure Administrator.

This IT Pro Challenge lab shows learners fundamental web application concepts and Microsoft Azure Resource group services. Learners will use the Microsoft Azure Portal and an existing Azure Resource Group to create an action group, add an email alert action and a webhook action for the action group, and create an alert rule.

This IT Pro Challenge lab introduces the learner to the importance of application metrics. Not only is application development important, but also the maintenance of these applications. Azure has a service called Application Insights that the learner will set up to monitor the application and produce metrics.

This IT Pro Challenge lab shows learners fundamental web application concepts and Microsoft Azure Resource group services. Learners will use the Microsoft Azure Portal and an existing Azure Resource Group to create an action group, add an email alert action and a webhook action for the action group, and create an alert rule.

Deploy a Web Job Guided IT Pro Challenge from Learn on Demand challenges students to provision, deploy, and test an Azure web task. The web task will be deployed to an existing web application. This requires learning the Microsoft Azure Resource group services as well as fundamental web application concepts.

This IT Pro Challenge virtual lab teaches learners to set up an Azure Portal web app for continuous release through creating deployment slots and enabling GIT. Learners pursuing careers in Software Programming, System Administration, Cybersecurity, and Quality Testing, benefit from managing cloud development environments in this lab.

In this hands-on lab, learners are introduced to the skills required to secure the Azure SQL. Exercises in this lab teach users how to enable dynamic data masking using a logical server and query editor while learning the Azure concepts. The topics covered in this lab are crucial for learners to be effective in Azure administrator roles in IT.

This IT Pro Challenge virtual lab teaches learners how to use recovery services vault. Learners will gain experience using services vault, backup policy to enable virtual machine backup. Skills learned in this lab are valuable in multiple job roles such as System administrator and Azure administrators in IT.

This IT Pro Challenges virtual lab teaches learners fundamental Azure Storage Account skills to create, deploy to, and upload to a storage account. Also, participants take and manage image snapshots. This hands-on experience benefits business and technical people in using the Azure cloud successfully to keep and backup files.

This Configure Geo-Replication for your Database IT Pro Challenge virtual lab shows learners how to create a new Azure SQL Database, enable it for Geo-Replication, and test it for failover. The skills that learners acquire in this challenge are valuable to database administrators in the IT or cybersecurity fields.

In this IT Pro Challenge virtual lab, you will get hands-on experience using Microsoft Azure’s Storage Account for message queues. You will implement and test a Web App’s ability to add and retrieve messages from a message queue and validate queue logging. These skills are essential for someone pursuing a career path as an Azure administrator.

This IT Pro Challenge virtual lab shows learners how to use the Azure portal to create a Storage Account and update an existing Web Application with a new connection string. As proof of concept, learners will verify that the Web App loaded/read rows in a Storage Table. Learners will also verify that logging is active for the Storage Account.

In this IT Pro Challenge virtual lab, you will get hands-on experience using Microsoft Azure’s Function App capability. You will learn how to provision a Function App, define the function with your code, and configure the trigger, input, and output of the Function App. These skills are essential for Azure Administrators and Developers.

This IT Pro Challenge helps learners understand how to use the Azure portal to create and deploy an Ubuntu Server Linux virtual machine, leverage the Managed Disks option, and use an inbound Secure Shell (SSH) rule to allow for remote administration. Learners will also use the PuTTY tool to verify SSH connectivity to the virtual machine.

In this IT Pro Challenges virtual lab, learners are introduced to skills required to secure networks using PKI. Exercises in this lab teach users how to configure HTTPS, DNSSEC, NRPT, and EFS while learning PKI concepts. The topics covered in this lab are critical for learners to be effective in system administrator job roles in cybersecurity.

Take your cloud architect career to the next level with this advanced AZ-305 course, where you will learn to design infrastructure solutions in Microsoft Azure. Learn best practices related to governance, application-architecture, storage, data integration, and more. You will use case studies to determine the best solution for a given scenario.

The **“Configure a Network Security Group in a Virtual Network”** IT Pro Challenge virtual lab will teach you how to work with virtual networks on the Azure platform. You will learn how to use network security groups to filter network traffic and keep your assets safe. After this lab, you will be comfortable enabling network security on Azure.

In this IT Pro Challenge virtual lab, you will get hands-on experience using Wireshark to sniff network traffic and detect non-secure protocols being used in the environment. You will investigate evidence of secured versus non-secure traffic. The skills you will learn in this lab are essential for network security analysts and penetration testers.

In this IT Pro Challenge virtual lab, you will get hands-on experience as a Windows administrator, setting up security to harden your Windows domain. You will learn how to implement and enforce IPSEC, configure a PPTP VPN, and set up a client VPN connection. These skills are essential for a security-focused Windows administrator.

Learn how to configure a Virtual Network Service Endpoint with this IT Pro Challenge provided by Learn on Demand Systems tutorial lab. This a beginner level lab that concentrates on many basic and important concepts such as **key vault**, **a subnet, service endpoint**, and then **back-end subnet**.

This Configure IP Routing with Linux on Azure IT Pro Challenge lab helps learners to understand how to configure IP routing for Linux Virtual Machines (VMs) deployed to an Azure cloud. The lab also shows learners the use and purpose of Azure route tables and the importance of creating a secondary IP address.

This IT Pro Challenge virtual lab challenges learners to configure network connectivity for Linux on Azure. In this lab, learners will understand the concepts of static public IP addresses, network interface to configure and view Azure private IP addresses. Skills learned in this lab are valuable in a job role such as System administrator.

Test your Application Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Secure Coding, Static Code Analysis, Dynamic Code Analysis, and more. Measure your mastery of Application Security and advance your career with targeted course and virtual lab recommendations.

Test your Infrastructure and Operations Security knowledge and skills to identify strengths, gaps, and weaknesses in areas like Secure Network Architecture, System Hardening, Virtualization Security, and more. Measure your mastery of Infrastructure and Operations Security and advance your career with targeted course and virtual lab recommendations.

Test your Security Engineering Fundamentals knowledge and skills to identify strengths, gaps, and weaknesses in areas like Cyber Risk, DevSecOps, Zero Trust, and Threat Modeling. Measure your mastery of Security Engineering Fundamentals and advance your career with targeted course and virtual lab recommendations.

In this hands-on lab, you will learn the basics of Static Code Analysis. You will practice running static code analyses using SonarQube, a fully-featured and open-source static analysis engine, as well as interpreting its results and determining remediation steps for the security issues it identifies.

Test your Scripting and Programming Fundamentals knowledge and skills to identify strengths, gaps, and weakness in areas like PowerShell, BASH, and Python. Measure your mastery of Scripting and Programming Fundamentals and advance your career with targeted course and virtual lab recommendations.

Test your Cybersecurity Fundamentals knowledge and skills to identify strengths, gaps, and weaknesses in areas like cryptography, access control, firewalls, vulnerability scanning, and more. Measure your mastery of Cybersecurity Fundamentals and advance your career with targeted course and virtual lab recommendations.

Test your Operating System Fundamentals knowledge and skills to identify strengths, gaps, and weaknesses in areas like command line interfaces, file systems, active directory, and more. Measure your mastery of Operating System Fundamentals and advance your career with targeted course and virtual lab recommendations.

In this hands-on lab, you will learn the basics of Wireshark, including basic functionality and practical applications. You will practice packet capture and analysis using a range of different protocols and Wireshark features, including display filters, streams, and conversation filters.
Explore our on-demand cybersecurity courses & training developed by seasoned certified cybersecurity practitioners, aligned to the certification exam’s key learning objectives.