www.cybrary.it
Open in
urlscan Pro
63.35.51.142
Public Scan
URL:
https://www.cybrary.it/
Submission: On March 04 via manual from US — Scanned from IT
Submission: On March 04 via manual from US — Scanned from IT
Form analysis
3 forms found in the DOMName: email-form — GET
<form id="email-form" name="email-form" data-name="Email Form" method="get" cb-element="signup-form" class="login_header_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c" data-wf-element-id="8a4f5ef0-33b4-25a2-94aa-87c7e1af4ef3"
aria-label="Email Form"><input class="login_header_form-field is--footer w-input" maxlength="256" name="email 4" data-name="Email 4" cb-element="signup-email" aria-label="signup form" placeholder="name@email.com" type="email" id="email-4"
required=""><a cl-form-submit="button" href="#" class="login_header_form-submit is-alternate-gradient w-inline-block"><div>Create a Free Account</div></a><a href="https://app.cybrary.it/login/" target="_blank" class="login_sign-in-wrapper w-inline-block"><div>Sign in</div><div class="embed-wrapper w-embed"><svg width="5" height="8" viewBox="0 0 5 8" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.14473 1L3.65058 3.50585C3.92349 3.77876 3.92349 4.22124 3.65058 4.49415L1.14473 7" stroke="black"></path>
</svg></div></a></form>
Name: email-form — GET
<form id="email-form" name="email-form" data-name="Email Form" method="get" cb-element="signup-form" class="login_header_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c" data-wf-element-id="8a4f5ef0-33b4-25a2-94aa-87c7e1af4ef3"
aria-label="Email Form"><input class="login_header_form-field is--footer w-input" maxlength="256" name="email 4" data-name="Email 4" cb-element="signup-email" aria-label="signup form" placeholder="name@email.com" type="email" id="email-4"
required=""><a cl-form-submit="button" href="#" class="login_header_form-submit is-alternate-gradient w-inline-block"><div>Create a Free Account</div></a><a href="https://app.cybrary.it/login/" target="_blank" class="login_sign-in-wrapper w-inline-block"><div>Sign in</div><div class="embed-wrapper w-embed"><svg width="5" height="8" viewBox="0 0 5 8" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.14473 1L3.65058 3.50585C3.92349 3.77876 3.92349 4.22124 3.65058 4.49415L1.14473 7" stroke="black"></path>
</svg></div></a></form>
Name: wf-form-Modal-Registration-Form — POST
<form id="wf-form-Modal-Registration-Form" name="wf-form-Modal-Registration-Form" data-name="Modal Registration Form" method="post" cb-element="modal-form" class="modal_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c"
data-wf-element-id="7ebe0b2d-fa1a-4f45-c31c-1af397dad224" aria-label="Modal Registration Form">
<div class="modal_form_field-wrap"><label for="modalEmail" class="modal_form_field-label">Email Address*</label><input class="modal_form_field w-input" maxlength="256" name="modalEmail" data-name="modalEmail" cb-element="modal-email"
placeholder="name@email.com" type="email" id="modalEmail" required=""></div>
<div class="modal_form_field-wrap"><label for="modalPassword" class="modal_form_field-label">Password*</label><input class="modal_form_field w-input" maxlength="256" name="modalPassword" data-name="modalPassword" cb-element="modal-password"
placeholder="••••••••" type="password" id="modalPassword" required="">
<div cb-element="modal-password-alert" class="modal_form_password-alert"><em>Your password does not meet the minimum security qualifications, please try again.</em></div>
</div>
<div class="common_process_accordion_embed w-embed w-script"><!-- [Finsweet Attributes] A11Y -->
<script>
(() => {
var t = "https://cdn.jsdelivr.net/npm/@finsweet/attributes-a11y@1/a11y.js",
e = document.querySelector(`script[src="${t}"]`);
e || (e = document.createElement("script"), e.async = !0, e.src = t, document.head.append(e));
})();
</script>
</div>
<div class="modal_accordion_item" style="border-color: rgb(99, 99, 99);">
<div cb-element="conditions-header" tabindex="0" role="button" aria-expanded="false" class="modal_accordion_header"><img cb-element="password-invalid" alt=""
src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d73253081f95e7114665d_Question.svg" loading="lazy" class="modal_dd_icon-invalid"><img cb-element="password-valid" alt=""
src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645bff6cfbbd3e0a6295dcdd_ShieldCheck.svg" loading="lazy" class="modal_dd_icon-valid">
<div cb-element="password-requirements-text">See Password Requirements</div>
<div class="modal_accordion_arrow-wrapper"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d7aac8db87a42878a0352_dropdown%20arrow.svg" class="modal_accordion_icon"></div>
</div>
<div cb-element="password-conditions" aria-labelledby="accordion-header-1" class="modal_accordion_content" style="width: 100%; height: 0rem; display: none;">
<div class="modal_dd_list-wrap">
<div class="modal_dd_requirement">
<div cb-element="length-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
<div>At least 8 character(s)</div>
</div>
<div class="modal_dd_requirement">
<div cb-element="number-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
<div>At least 1 number(s)</div>
</div>
<div class="modal_dd_requirement">
<div cb-element="lowercase-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
<div>At least 1 lowercase letter(s)</div>
</div>
<div class="modal_dd_requirement">
<div cb-element="uppercase-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
<div>At least 1 uppercase letter(s)</div>
</div>
</div>
</div>
</div><label class="w-checkbox modal_checkbox_field">
<div class="w-checkbox-input w-checkbox-input--inputType-custom modal_checkbox"></div><input id="subscribe" type="checkbox" name="subscribe" data-name="subscribe" style="opacity:0;position:absolute;z-index:-1"><span
class="modal_checkbox_label w-form-label" for="subscribe">I want to receive new courses, feature updates, news, and discounts from Cybrary</span>
</label><label class="w-checkbox modal_checkbox_field">
<div class="w-checkbox-input w-checkbox-input--inputType-custom modal_checkbox"></div><input id="tos" type="checkbox" name="tos" data-name="tos" required="" style="opacity:0;position:absolute;z-index:-1"><span
class="modal_checkbox_label w-form-label" for="tos">By creating an account, you agree to the Terms of Service and Privacy Policy</span>
</label><input type="submit" data-wait="Please wait..." class="button in-modal w-button" value="Create Free Account" name=""><a href="https://app.cybrary.it/login" class="modal_link-login">Already have an account?</a>
<div class="modal_terms-text">This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.</div>
</form>
Text Content
Catalog Career Paths Launch or advance your career with curated collections of courses, labs, and more. Back Foundations IT and Cybersecurity Foundations Defensive Security Become an Incident Handler Become a SOC Analyst - Level 3 Become a SOC Analyst - Level 2 Become a SOC Analyst - Level 1 Offensive Security Become a Penetration Tester Engineering and Operations Become a Network Engineer Become a Cyber Security Engineer Become an Azure Cloud Engineer Become a System Administrator Governance, Risk Management & Compliance ISO 27001:2013 - Information Security Management Systems Cloud Governance Principles Privacy Program Management NIST 800-53r5: Introduction to Security and Privacy Controls PCI DSS: Payment Card Industry Data Security Standard End User Cyber Fundamentals Leadership & Management Become a CISO 50 CISO Security Controls 12 Competencies of the Effective CISO Certification Prep Prepare for and maintain leading cybersecurity certifications Back Beginner CompTIA Security+ (SY0-601) CompTIA Project+ (PK0-004) AZ-900 Microsoft Azure Fundamentals ITIL 4 Foundation Computer Hacking and Forensics CompTIA A+ 220-1101 View All Intermediate Certified Information Systems Auditor (CISA) CertNexus Cybersec First Responder Certified Cloud Security Professional (CCSP) AWS Certified Security-Specialty (2022) View All Advanced CRISC AZ-305 Designing Microsoft Azure Infrastructure Solutions CompTIA CASP+ (CAS-004) Certified Information Systems Security Professional (CISSP) Mission Readiness Learn how to detect and mitigate the latest threats and vulnerabilities. Back Threat Actor Campaigns Magic Hound Raspberry Robin Double Trouble with Double Dragon Weak Link in the Supply Chain Spinning a Web Shell for Initial Access Exfiltration and Extortion View All CVE Series CVE Series: F5 BIG-IP (CVE-2022-1388) CVE Series: CouchDB RCE (CVE-2022-24706) CVE Series: Atlassian Bitbucket Command Injection (CVE-2022-36804) CVE Series: Grafana Directory Traversal (CVE-2021-43798) CVE Series: Blind NoSQL Injection (CVE-2021-22911) CVE Series: Apache HTTPD (CVE-2021-42013) View All Cybrary Challenges Challenge: Space Mission Challenge: A Message Within A Message Challenge: Don't Believe What You Hear Challenge: Chatting with ChatGPT Challenge: Saving a Fellow Monster Challenge: Gobble Gobble Conceal & Deceive View All MITRE ATT&CK MITRE ATT&CK Browse the Catalog Instructors For Individuals Career Paths Launch or advance your career with curated collections of courses, labs, and more. Back Foundations IT and Cybersecurity Foundations Defensive Security Become an Incident Handler Become a SOC Analyst - Level 3 Become a SOC Analyst - Level 2 Become a SOC Analyst - Level 1 Offensive Security Become a Penetration Tester Engineering and Operations Become a Network Engineer Become a Cyber Security Engineer Become an Azure Cloud Engineer Become a System Administrator Governance, Risk Management & Compliance Leadership & Management Become a CISO 50 CISO Security Controls 12 Competencies of the Effective CISO Forums Discuss all things cybersecurity for free among the vast Cybrary community Free Access Get a taste of the catalog with certification prep, introductory courses, and more. Insider Pro Everything you need to learn, practice, and prove your cybersecurity skills. For Teams Build your team’s cybersecurity skills and achieve new certifications, all in one place Compare Plans Compare features across all plans. Individual Back Cybrary Insider Pro MITRE ATT&CK Free Access Career Paths Success Stories For Teams Teams Exclusive Upskill your team to better defend your organization from attacks. Back Cybrary Select Cybrary Live Teams Features Build your team’s cybersecurity skills and achieve new certifications, all in one place For Government Support your organization with a custom plan that works for your organization. Mission Readiness Learn how to detect and mitigate the latest threats and vulnerabilities. Back Threat Actor Campaigns CVE Series Cybrary Challenges MITRE ATT&CK MITRE ATT&CK Business Resources Learn how Cybrary can help your team thrive. Back Case Studies Research Papers Articles White Pages Teams Pricing Compare features across all plans. Teams Back For Security Teams MITRE ATT&CK Baselining For Government Teams Resources Pricing Free Teams DemoSign upLogin Dashboard Profile Membership Settings Account Settings Support Logout Start learning with free on-demand video training Sign upLogin Amazon Web Services is currently experiencing an outage that may impact your experience on the Cybrary application. We apologize for any inconvenience and will be monitoring this situation closely THE BEST WAY TO LEARN CYBERSECURITY SKILLS ONLINE Cybrary's accessible, affordable training platform provides curated career paths, threat-informed training, and certification preparation for professionals at all levels. Go to Dashboard Start Learning for Free Cybrary for Teams Trusted by leading organizations Create a free account to start exploring the platform. Create a Free Account Sign in Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. or sign up with Sign in View all SSO options Cybrary for teams View all SSO options LAUNCH YOUR CAREER Start your cyber journey confidently with curated paths that teach the foundational concepts related to real, on-the-job skills. GET CERTIFIED Ace the exam with certification prep content developed by industry-leading instructors. Test yourself with our practice exams. UPSKILL AND PRACTICE Master hands-on skills and familiarize yourself with the latest vulnerabilities and threats so you can prepare for real-world attacks. LEARN Learn key concepts with expert-led video courses for all professional levels. Start learning PRACTICE Practice cybersecurity skills with hands-on, virtual labs. Start learning PROVE Prove your abilities with practice tests and assessments. Start learning CYBRARY FOR TEAMS Upskill your team with Cybrary's suite of learning activities and management tools, including hands-on practice labs, assessments, and custom guided pathways. Request a demo and learn how Cybrary tailors our deep library of trainings to your team's unique needs. Schedule a Demo STAND OUT FROM THE CROWD AND ADVANCE YOUR CAREER WITH CYBRARY Certification Prep Career Paths CVE Series Train Your Team Threat Actor Campaigns Free Content POPULAR COURSES Full Catalog Course Free 30 H: 52 M 7 CEUS PENETRATION TESTING AND ETHICAL HACKING To assess the strength of your organization’s cybersecurity posture, you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This ethical hacking course will give you those skills and prepare you for related certification exams so you can prove your capabilities. Learn More & Enroll Course Free 18 H: 28 M 10 CEUS COMPTIA SECURITY+ (SY0-601) Ready to start your cybersecurity journey? The CompTIA Security+ SYO-601 credential is one of the most essential certifications in the world of information security today. Learn about essential introductory security and risk management concepts from world-famous cybersecurity instructor, Kelly Handerhan. Learn More & Enroll Course Free 32 H: 34 M 16 CEUS CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP) CISSP certification is essential for cybersecurity professionals aiming to move up in their career. This course will cover all aspects of security, risk management, and architecture to help you prepare for the CISSP exam. Learn from experienced professionals and gain the knowledge needed to become a certified security expert. Learn More & Enroll Course Free 27 H: 53 M 31 CEUS CISCO CERTIFIED NETWORK ASSOCIATE (CCNA) CERTIFICATION Our online, self-paced Cisco Certified Network Associate CCNA training teaches students to install, configure, troubleshoot and operate LAN, WAN and dial access services for medium-sized networks. You'll also learn how to describe the operation of data networks. Learn More & Enroll NEW COURSES Full Catalog Course 0 H: 50 M 1 CEUS REGISTRY RUN KEYS Many organizations do not monitor for additions to the Windows Registry that could be used to trigger autostart execution on system boot or logon. This allows adversaries to launch programs that run at higher privileges and paves the way for more damaging activity. Learn how to detect and mitigate this activity to secure your network. Learn More & Enroll Course 0 H: 50 M 1 CEUS OBTAIN CAPABILITIES: TOOL While you may be prepared to detect the use of malware on your system, what if an adversary uses a legitimate software tool for a nefarious purpose? Adversaries may buy or steal software and use it in unexpected ways. Learn how adversaries leverage this technique so you can defend your organization. Learn More & Enroll Course 0 H: 50 M 1 CEUS LATERAL TOOL TRANSFER Once adversaries compromise your network, they can transfer tools between systems in order to stage them for later use or to support lateral movement. They may use file sharing protocols or copy files with existing tools like scp, sftp and ftp. Learn how to spot and mitigate this behavior so you can stop adversaries in their tracks. Learn More & Enroll Course 0 H: 50 M 1 CEUS SCHEDULED TASK Some organizations do not configure their operating systems and account management to properly protect the use of task scheduling functionality. As a result, adversaries can abuse this capability to execute malicious code on a victim’s system. Get hands-on practice detecting this technique so you can protect your organization. Learn More & Enroll Course 0 H: 50 M 1 CEUS USER DISCOVERY Once on a victim's system, adversaries will perform user discovery to determine information, such as the primary user’s identity and capabilities. They may seek out users with access to remote systems so they can cast their net wider. Discover the attacker instead of the other way around with this dynamic, lab-based course! Learn More & Enroll Course 0 H: 50 M 1 CEUS LOCAL ACCOUNTS Organizations that do not enforce strong password policies and audit privileged account management can fall victim to attackers who leverage access to local accounts. With it, they can gain initial access, persistence, privilege escalation, or defense evasion. Learn how to detect and prevent this type of activity in this dynamic lab-based course. Learn More & Enroll Course Free 1 H: 25 M 1 CEUS ACTIVE SCANNING AND EXPLOIT PUBLIC-FACING APPLICATION Threat actors will often perform Active Scanning to learn the landscape of a victim's network and plan their next steps. One of those next steps could be exploiting vulnerable public-facing applications to gain access and pursue their end-goals. Master the skills to detect and mitigate these techniques and secure your network. Learn More & Enroll Course Free 1 H: 10 M 1 CEUS OS CREDENTIAL DUMPING Once attackers have a presence on your system, they may dump credentials from the operating system to gain further access and perform lateral movement. Learn to detect and dump attackers in this lab-based course. Learn More & Enroll Course Free 1 H: 10 M 1 CEUS SERVER SOFTWARE COMPONENT: WEB SHELL Bad actors can gain persistence on your network by abusing software development features that allow legitimate developers to extend server applications. In this way, they can install malicious code for later use. Learn to detect and thwart this activity and protect your network. Learn More & Enroll Course Free 1 H: 25 M 1 CEUS EXFILTRATION OVER ALTERNATIVE PROTOCOL AND CLEAR CLI HISTORY Financially motivated adversaries will often steal valuable data and exfiltrate it over an alternate protocol like FTP, SMTP or, HTTP/S. They could also encrypt or obfuscate these alternate channels to protect their nefarious activities. Learn to exfiltrate the attackers by detecting and mitigating these techniques. Learn More & Enroll Course Free 1 H: 2 M 1 CEUS OWASP TOP 10 - 2021 The OWASP Top 10 features the most critical web application security vulnerabilities. Build your offensive security and penetration testing skills with this one-of-a-kind course! Learn More & Enroll Course Free 14 H: 26 M 15 CEUS ADVANCED PENETRATION TESTING The Advanced Penetration Testing course teaches the cyber attack lifecycle from the perspective of an adversary. Become more familiar with the most widely used penetration-testing tools, manipulate network traffic, and perform web application attacks such as cross-site scripting and SQL injection. Learn More & Enroll Course Free 8 H: 41 M 9 CEUS COMPTIA A+ 220-1101 Ready to start your career in IT and cybersecurity? Earn your CompTIA A+ certification on your journey to becoming a systems administrator, network administrator, or other cybersecurity professional. Prepare to ace the updated 220-1101 exam with this engaging course! Learn More & Enroll Course Free 9 H: 10 M 9 CEUS INTRO TO MALWARE ANALYSIS AND REVERSE ENGINEERING Are you on the path to becoming a SOC Analyst or preparing for your CEH exam? This malware analysis course will help you advance your career and protect your organization from critical threats. Learn how to perform analysis on all major files types, carve malicious executables from documents, and recognize common malware tactics. Learn More & Enroll Course Free 2 H: 26 M 3 CEUS POWERSHELL FOR SECURITY PROFESSIONALS Unlock the power! Learn to apply PowerShell from both the red and blue team perspectives. In this PowerShell for Security Professionals course, you will learn the fundamentals of PowerShell and how it can be used to improve the automation of tasks across large organizational networks. Learn More & Enroll Course 1 H: 40 M 2 CEUS SYSTEM BINARY PROXY EXECUTION AND A SPEARPHISH PAYLOAD Spearphishing is one of the oldest tricks in the book, and in this course you will learn more about how it actually works. Plus, see how adversaries can hide malicious code in compiled HTML files. Detect and mitigate these techniques in our hands-on course. Learn More & Enroll Course 1 H: 25 M 1 CEUS PERSISTENCE VIA WINDOWS SERVICES Windows Services are the main vehicle used by the Windows OS to start and run background functions that do not require user interaction. Configuring malware to run as a service is a common strategy for trying to blend malicious code execution in with other legitimate Windows functions. Prevent adversaries from gaining persistence in this course. Learn More & Enroll Course 1 H: 38 M 2 CEUS LOCAL ACCOUNT DISCOVERY, CREATION, AND MANIPULATION After gaining initial access on a system, adversaries may want to do some discovery work on local accounts and maintain persistence on a victim system as they create and manipulate accounts in order to maintain their access. Learn to detect such suspicious activity in this course! Learn More & Enroll Course 1 H: 30 M 2 CEUS AUTOMATED ARCHIVE AND EXFILTRATION Once an adversary has firmly established access within a target environment and identified data of interest, they want to gather and exfiltrate that data. Learn to detect such late-stage threat actor campaign techniques of automated archive and exfiltration in our hands-on course. Learn More & Enroll Course 1 H: 20 M 1 CEUS USING LOLBINS FOR TOOL DOWNLOADS LOLbins won't have you laughing when threat actors "live off the land" to leverage tools and capabilities that are already present in the target environment to achieve objectives. Learn how to detect common adversary techniques such as Ingress Tool Transfer in this course. Learn More & Enroll Course 1 H: 30 M 2 CEUS RANSOMWARE WITH RECOVERY DISRUPTION After an adversary has exfiltrated data from a target system, the potential final stages in an attack include encrypting data for impact and inhibiting system recovery. Learn how to detect endgame ransomware techniques before a threat actor can accomplish their nefarious objectives! Learn More & Enroll Course Free 3 H: 50 M 4 CEUS ENTRY-LEVEL CYBERSECURITY TRAINING Are you new to cybersecurity and looking for a stepping stone into this exciting career field? Cybersecurity skills are in high demand, and the field is projected to grow 33% by 2030. This Entry-Level Cybersecurity Training course will give you the foundational knowledge you need to get started. Learn More & Enroll Course Free 2 H: 57 M 3 CEUS INTRO TO PYTHON If you need to learn the basics of Python for cyber security, then this introductory Python course is right for you. Instructor Joe Perry teaches you a framework that is a must-know for any cyber security professional. Understand the basics of the language, solve problems with scripts, and identify useful Python modules. Learn More & Enroll Course Free 2 H: 43 M 3 CEUS PYTHON FOR CYBERSECURITY PROFESSIONALS Computing devices can be used for and against us. The way to get more done in less time is through the language of computers, which is programming. Python provides a powerful, beginner-friendly platform for programming, and this course will teach you to develop basic python scripts that can be used in the context of cybersecurity. Learn More & Enroll Course 1 H: 19 M 1 CEUS COMPROMISE SOFTWARE SUPPLY CHAIN Threat actors use the technique Compromise Software Supply Chain by altering software that they know their victims will use. They include a backdoor that will give them access to their victim's network once the software is installed. You will detect this technique in a virtual lab and master how to mitigate this threat. Learn More & Enroll Course 1 H: 10 M 1 CEUS DISABLE WINDOWS EVENT LOG AND TIMESTOMP Sophisticated threat actors like APT29 will use the techniques Disable Windows Event Logging and Timestomp for defense evasion to prevent defenders from seeing their presence on the network. You will detect this nefarious activity in our virtual lab so you can react to advanced attackers and outsmart them. Learn More & Enroll Course 1 H: 15 M 1 CEUS UNSECURED CREDENTIALS AND DOMAIN ACCOUNTS Threat actors use the techniques Unsecured Credentials and Domain Accounts to obtain credential access and gain persistence. In this emulation of how the threat group APT29 would use these techniques, you will get hands-on practice detecting this activity so you can protect your organization from highly sophisticated advanced persistent threats. Learn More & Enroll Course 1 H: 10 M 1 CEUS APPLICATION LAYER PROTOCOL FOR C2 AND EXFIL TO CLOUD Threat actors like APT29 use Application Layer Protocols for Command and Control (C2) so they can blend in and avoid detection. They also may attempt to steal data and exfiltrate it to a cloud storage service as the end-goal of their attack. In this course, you will learn about these techniques and get practice detecting them in our virtual lab. Learn More & Enroll Course 1 H: 5 M 1 CEUS LATERAL MOVEMENT: WINDOWS REMOTE MANAGEMENT In order to achieve lateral movement, threat actors will use a valid account to access remote systems, such as the Windows Remote Management service. In this way, the threat actor can move around the network and search for valuable information or greater access. Learn more and get hands-on with this technique by detecting it in our virtual lab. Learn More & Enroll Course Free 5 H: 22 M 6 CEUS COMMAND LINE BASICS In this course you will learn the fundamentals of Command Line, a fundamental tool for any user of Windows and Linux machines. Command line allows developers to manipulate files easily and quickly. Learning command line saves developers time and resources. Learn More & Enroll Course Free 4 H: 20 M 5 CEUS WEB APPLICATION PENETRATION TESTING If you want to be a penetration tester, you need to get inside the mind of a hacker and learn why sites get hacked. In this Web Application Penetration Testing course by Cydefe, you’ll build upon your existing Linux skills and get hands-on experience with setting up your own pentesting environment. Learn More & Enroll Course Free 11 H: 55 M 11 CEUS COMPTIA A+ 220-1102 Ready to pass your CompTIA A+ 220-1102 exam on your path to becoming an IT and cybersecurity professional? In this course, you will learn the fundamentals of operating systems, security, software troubleshooting, and operating procedures. Gain the skills you’ll need to become a systems administrator or network administrator. Learn More & Enroll Course Free 2 H: 58 M 3 CEUS VMWARE FOUNDATIONS In the VMware Foundations course, students will learn virtualization basics and core concepts, the components and features of the VMware vSphere, and managing virtual machines. Upon completion, students will have a basic understanding of the vSphere. Learn More & Enroll Course Free 7 H: 20 M 6 CEUS AWS CERTIFIED SECURITY-SPECIALTY (2022) The AWS Certified Security-Specialty (AWSCS-S) is for cloud professionals who are interested in the security side of AWS cloud infrastructure. In this course, you will learn the necessary knowledge to pass the AWS SCS-C01 exam. This certification is recommended for those with two or more years of experience with securing AWS cloud workloads. Learn More & Enroll Course 1 H: 35 M 2 CEUS REPLICATION THROUGH REMOVABLE MEDIA In this course, students will learn the basics of how an adversary can use removable media devices to not only gain access to an unauthorized host, but also enable autorun scripts to download additional infrastructure and payloads to a victim host. Learn More & Enroll Course 1 H: 35 M 2 CEUS SYSTEM BINARY PROXY EXECUTION: MSIEXEC In the course, you will learn how a malicious user can obfuscate some of their payload actions through downloaded DLL files by utilizing the built in rundll32.exe. By using rundll32, an attacker can make their activity look like a normal Windows system binary process being executed under the rundll32. Learn More & Enroll Course 1 H: 35 M 2 CEUS SYSTEM BINARY PROXY EXECUTION: RUNDLL32 In the course, you will learn how a malicious user can obfuscate some of their payload actions through downloaded DLL files using the built-in rundll32.exe. Using rundll32, an attacker can make their activity look like a normal Windows system binary process being executed under rundll32. Learn More & Enroll Course 1 H: 35 M 2 CEUS COMMAND AND SCRIPTING INTERPRETER: WINDOWS COMMAND SHELL In this course, you will learn how the native CMD scripting language for Windows can be abused to allow an attacker to execute remote commands, establish persistence and create autorun files to carry out an attack within the Raspberry Robin attack cycle. Learn More & Enroll Course 1 H: 35 M 2 CEUS APPLICATION LAYER PROTOCOL: WEB PROTOCOLS In this course, students will learn how C2 connections are established and used by attackers in a real-world demonstration to give learners a sense of how to detect malicious HTTP traffic. This is the last course in the Raspberry Robin Attack series. Learn More & Enroll Course Free 0 H: 48 M 1 CEUS CORPORATE CYBERSECURITY MANAGEMENT Cyber risk, legal considerations and insurance are often overlooked by businesses and this sets them up for major financial devastation should an incident occur. Learn More & Enroll Course 1 H: 35 M 2 CEUS SEARCH OPEN TECHNICAL DATABASES: SCAN DATABASES This course covers various aspects of the Search Open Technical Databases: Scan Databases TTP, including its components, associated risks, and detection techniques. Participants will learn how to detect and mitigate the risks associated with this TTP (T1596.005) and techniques for validating alerts and conducting pre and post-alert preparations. Learn More & Enroll Course 1 H: 35 M 2 CEUS EXPLOIT PUBLIC-FACING APPLICATION This course covers the MITRE technique T1190: Exploit Public-Facing Application. This technique involves an adversary exploiting a vulnerability in a public-facing application to gain unauthorized access to a target network. Students will learn about the types of public-facing applications and common vulnerabilities that attackers may target. Learn More & Enroll Course 1 H: 55 M 2 CEUS INGRESS TOOL TRANSFER This course gives cybersecurity professionals an in-depth understanding of the MITRE TTP T1105 technique. This involves using legitimate tools to transfer malicious files onto a target network and the techniques used to evade detection. The course will also cover prevention strategies for this type of attack. Learn More & Enroll Course 0 H: 58 M 1 CEUS CISO COMPETENCY - INNOVATION This is the first course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Innovation. The habit of innovation is an essential competency for any CISO trying to navigate variety of dynamic threats, risks, oppurtunities, and failures, so it is essential in an evolving business environment. Learn More & Enroll Course 0 H: 55 M 1 CEUS CISO COMPETENCY - FINANCE & ADMINISTRATION This is the second course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Finance & Administration. An awareness and understanding of corporate finance and business administration is essential to succeed as an exec. This includes expertise in competing for budget, resources, staff, and more. Learn More & Enroll Course 1 H: 35 M 2 CEUS EXFILTRATION OVER C2 CHANNEL This course covers the Mitre TTP T1041- Exfiltration Over C2 channel, which involves exfiltrating data over a command and control (C2) channel. This technique is commonly used by threat actors to evade detection and exfiltrate sensitive information from compromised networks. Learn More & Enroll Course 0 H: 59 M 1 CEUS CISO COMPETENCY - SECURITY This is the fourth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Cyber Security Expertise. The CISO must serve as the governing expert in cyber security for the organization. The CISO must possess excellent working-knowledge of critical security issues. Learn More & Enroll Course 1 H: 0 M 1 CEUS CISO COMPETENCY - BUSINESS This is the third course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Business Operations. Modern CISOs must have in-depth knowledge in optimizing the increasingly-complex, connection between security and business operations. Learn More & Enroll Course 1 H: 1 M 1 CEUS CISO COMPETENCY - DISCRETION This is the fifth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Discretion and Trust. The CISO must be able to exhibit and manage high levels of discretion and trust in dealing with sensitive information regarding threats, investigations, and on-going initiatives. Learn More & Enroll Course 0 H: 58 M 1 CEUS CISO COMPETENCY - PUBLIC SPEAKING This is the sixth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Public Speaking. As a senior executive, the CISO must have the ability to speak confidently and effectively before groups ranging from large audiences to corporate boards. Learn More & Enroll Course 1 H: 2 M 1 CEUS CISO COMPETENCY - PRODUCTIVITY This is the seventh course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Personal Productivity. The CISO should be able to optimize personal productivity by developing effective time management processes and prioritization skills. Learn More & Enroll Course 0 H: 56 M 1 CEUS CISO COMPETENCY - TECHNOLOGY This is the eighth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Technology. The CISO must consistantly produce deep insights into the current status and trends associated with information technology, especially in relation to security. Learn More & Enroll Course 1 H: 2 M 1 CEUS CISO COMPETENCY - THREATS This is the ninth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Threat Insights. The CISO must maintain accurate and realistic insights into the evolving threats facing cyber security teams, and produce qualitative and quantitative assessments for risk decisions. Learn More & Enroll Course 0 H: 59 M 1 CEUS CISO COMPETENCY - COMPLIANCE This is the tenth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Balancing Compliance. The effective CISO navigates compliance and security in supporting a balanced cyber risk management program, with an in depth understanding of industry frameworks. Learn More & Enroll Course 0 H: 59 M 1 CEUS CISO COMPETENCY - RISK This is the eleventh course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Risk Orientation. Developing a complete risk structure and framework for enterprise security prioritizes safeguards, minimizes expenses, and maximizes support and mitigation for business operations. Learn More & Enroll Course 1 H: 3 M 1 CEUS CISO COMPETENCY - LEADERSHIP This is the twelfth course in Ed Amoroso's Twelve Competencies of the Effective CISO, which focuses on the CISO Competency in Leadership and Vision. Every successful CISO incorporates leadership skills and a clear vision into their approach to guiding their program, staff, and other stakeholders, including the CEO and Board. Learn More & Enroll Course 0 H: 58 M 1 CEUS CISO SECURITY CONTROLS: ENTERPRISE CONTROLS This is the first course in Ed Amoroso's 50 Security Controls, which covers the enterprise controls derived from the TAG Cyber Fifty Enterprise Controls. The enterprise controls provide students with an executive high-level strategy with which to secure their organization from threats, data breach, and intrusion. Learn More & Enroll Course 0 H: 41 M 1 CEUS CISO SECURITY CONTROLS: NETWORK CONTROLS This is the second course in Ed Amoroso's 50 Security Controls, which covers the network controls derived from the TAG Cyber Fifty Enterprise Controls. The network controls provide students with an executive high-level strategy in network security and covers trends in the network control areas. Learn More & Enroll Course 0 H: 59 M 1 CEUS CISO SECURITY CONTROLS: ENDPOINT CONTROLS This is the third course in Ed Amoroso's 50 Security Controls, which covers the endpoint controls derived from the TAG Cyber Fifty Enterprise Controls. Learn More & Enroll Course 0 H: 56 M 1 CEUS CISO SECURITY CONTROLS: GOVERNANCE CONTROLS This is the fourth course in Ed Amoroso's 50 Security Controls, which covers the governance controls derived from the TAG Cyber Fifty Enterprise Controls. The governance controls provide students with executive strategies, to implement and maintain a variety of dynamic security management domains. Learn More & Enroll Course 0 H: 57 M 1 CEUS CISO SECURITY CONTROLS: DATA CONTROLS This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the data controls derived from the TAG Cyber Fifty Enterprise Controls. The data controls provide students with a high-level overview of data security, encryption, and vulnerability management policy. Learn More & Enroll Course 0 H: 59 M 1 CEUS CISO SECURITY CONTROLS: INDUSTRY CONTROLS This is the sixth course in Ed Amoroso's 50 Security Controls, which covers the industry controls derived from the TAG Cyber Fifty Enterprise Controls. The industry controls provide students with an executive anlysis of trends in the security industry in valued training and development. Learn More & Enroll Course Free 1 H: 46 M 2 CEUS EXECUTIVE RMF This course will discuss the NIST Risk Management Framework (RMF) from an executive perspective. Each module will not only address each step in the RMF process, but how this process can be implemented into your organization or business. Learn More & Enroll Course Free 7 H: 47 M 9 CEUS SCANNING, ENUMERATION, AND VULNERABILITIES This course covers basic scanning, enumeration, and vulnerability scanning as part of a penetration test. Learn More & Enroll Course Free 17 H: 43 M 18 CEUS COMPUTER HACKING AND FORENSICS If you love the idea of doing digital forensics investigations to catch cybercriminals and want to earn your CHFI certification, this course is for you. Learn how to detect online criminal activity, gather evidence, and recover deleted data. Prepare for the EC Council’s CHFI certification and be ready to fill jobs that are in high demand. Learn More & Enroll Course Free 27 H: 53 M 31 CEUS CISCO CERTIFIED NETWORK ASSOCIATE (CCNA) CERTIFICATION Our online, self-paced Cisco Certified Network Associate CCNA training teaches students to install, configure, troubleshoot and operate LAN, WAN and dial access services for medium-sized networks. You'll also learn how to describe the operation of data networks. Learn More & Enroll Course Free 11 H: 47 M 14 CEUS SNIFFING This course covers basic sniffing as part of a penetration test. Attackers and penetration testers use sniffing to analyze network packets for information. Learn More & Enroll Course Free 5 H: 8 M 5 CEUS HYPER-V Microsoft Hyper-V is a technology that allows you to create virtual environments like operating systems, virtual servers, and virtual components like hard drives and network switches. In this Hyper-V training, you’ll learn how to build, configure, and understand virtual machines in both the server and client environments. Learn More & Enroll Course Free 1 H: 41 M 2 CEUS CYBERSECURITY KILL CHAIN™ Learn a foundational concept within cybersecurity in this Cybersecurity Kill Chain™ course. This course simulates an example attack and exposes the 7 phases of the Lockheed Martin Cyber Kill Chain™. Then you’ll apply the knowledge gained to design a defense-in-depth model to defend against the attack. Learn More & Enroll Course 0 H: 4 M 0 CEUS HOW TO USE BINWALK (BSWJ) In this “How to Use binwalk (BSWJ)” course, cybersecurity expert Joe Perry takes you on another “Breaking Stuff with Joe” (BSWJ) adventure by showing you how to use the analysis tool binwalk to find executable code and embedded files inside binary files. Such images can be used to crack IoT devices. Learn More & Enroll Course Free 13 H: 10 M 13 CEUS PENETRATION TESTING EXECUTION STANDARD (PTES) This Penetration Testing Execution Standard (PTES) course provides a comprehensive set of standards for penetration testing. The PTES guides information security professionals while also helping inform organizations what can be expected from penetration tests. Business and security professionals will benefit from this course. Learn More & Enroll Course Free 13 H: 15 M 14 CEUS ASSEMBLY Assembly is the lowest-level programming language and is useful in reverse engineering and malware analysis. It can also be used for direct hardware manipulation or to address critical performance issues. This course requires a background in basic programming concepts and access to a Linux system. Learn Assembly online today! Learn More & Enroll Course Free 8 H: 29 M 10 CEUS APPLICATION OF THE MITRE ATT&CK FRAMEWORK This MITRE ATT&CK training is designed to teach students how to apply the matrix to help mitigate current threats. Students will move through the 12 core areas of the framework to develop a thorough understanding of various access ATT&CK vectors. Learn More & Enroll Course Free 1 H: 53 M 2 CEUS AZURE STORAGE ACCOUNTS On the path to becoming a Microsoft Azure Cloud Engineer? Azure Storage Accounts are essential for storing and securing your data in the cloud. This course covers storage account configuration options, as well as uploading, securing, and managing data in the accounts. Learn More & Enroll Course Free 3 H: 20 M 4 CEUS CYBER NETWORK SECURITY If you want to become a network engineer, you’ll want to learn more about incident response and business continuity planning. In the Cyber Network Security course, cybersecurity analyst Pete Cipolone provides an overview of network terminology. Learn about different threats, regulations, and cybersecurity ethical considerations. Learn More & Enroll Course Free 0 H: 29 M 1 CEUS INCIDENT RESPONSE STEPS In Incident Response Steps, David Biser accentuates the significance of planning out a response for when an incident occurs. He lays out an overview of the important steps of an incident response plan and gives a breakdown of each step. Learn More & Enroll Course 0 H: 53 M 1 CEUS ENTERPRISE SECURITY LEADERSHIP: NEGOTIATION SKILLS FOR CYBER LEADERS In this session of Enterprise Security Leadership in the Modern Era, Ed Amoroso reviews the 8 rules of good negotiations and how they align not only to professional and personal life, but how they are central to maintaining proper Cybersecurity. Learn More & Enroll Course Free 1 H: 47 M 4 CEUS MALWARE THREATS Interested in penetration testing and malware analysis? This malware course introduces you to different types of malware, like viruses, worms, and Trojans. Gain hands-on experience in analyzing malicious files, identifying malicious processes, and more. Learn More & Enroll Course Free 1 H: 59 M 2 CEUS INTRODUCTION TO SPLUNK Splunk is a software platform that indexes data and makes it searchable, allowing it to be turned into operational intelligence. This Splunk training course will quickly introduce you to Splunk and its many capabilities for organizing and managing data. Take this course if you’re on the path to becoming a SOC Analyst. Learn More & Enroll Course Free 1 H: 30 M 2 CEUS PHISHING If you’re looking to enter any field in cybersecurity, you’ll want to learn the basics of phishing attacks. In this phishing course, you will learn how to craft the perfect phishing email and defend against these increasingly clever social engineering attempts. Learn More & Enroll Course 1 H: 1 M 1 CEUS ENTERPRISE SECURITY LEADERSHIP: CONFLICT RESOLUTION FOR CYBER LEADERS Learn from Ed Amoroso and guest Chris Kubecka as they uncover the uncomfortable topic of conflict management, and reveal real-world examples and experiences that leaders can use in current situations. Learn More & Enroll Course Free 1 H: 40 M 1 CEUS KALI LINUX FUNDAMENTALS If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is a great place to start your training. Learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation. Learn More & Enroll Course Free 0 H: 25 M 2 CEUS INTRO TO BURP SUITE PRO Learn to identify potential attack routes and security-related weaknesses in your web applications using Burp Suite Pro, one of the web application scanning tools preferred by security engineers and ethical hackers. This Burp Suite training course will give you the basic knowledge you need to get up and running with this tool. Learn More & Enroll Course Free 7 H: 26 M 7 CEUS INCIDENT RESPONSE AND ADVANCED FORENSICS Need some incident response training on your path to becoming a network engineer or cyber defense analyst? This course will introduce you to incident response and prepare you to conduct forensic collections. Learn how to develop protection plans, dive into insider and malware threats, and commence incident recovery. Learn More & Enroll Course Free 6 H: 17 M 7 CEUS NMAP The network mapper (NMAP) is one of the highest quality and powerful free network utilities in the cybersecurity professional's arsenal. This NMAP course offers the NMAP skills and commands needed to become a better network administrator, incident responder, or penetration tester. Learn NMAP fundamentals and even create personal hands-on labs. Learn More & Enroll Course Free 1 H: 57 M 1 CEUS SOCIAL ENGINEERING Do you have what it takes to learn the art of social engineering, or master manipulation in cybersecurity? This social engineering course is essential for any aspiring penetration tester. Learn about different types of social engineering attacks and gain hands-on experience in two labs using the Social Engineering Toolkit (SET). Learn More & Enroll Course 0 H: 59 M 1 CEUS ENTERPRISE SECURITY LEADERSHIP: TEAM DYNAMICS FOR CYBER LEADERS Team dynamics, like many other areas of role and career development, is important in an industry plagued with misconceptions and global pressure. Taking on a leadership role in cybersecurity comes with a different set of responsibilities. Learn More & Enroll Course 0 H: 59 M 1 CEUS ENTERPRISE SECURITY LEADERSHIP: LEARNING METHODS FOR CYBER LEADERS Ed Amoroso and Cybrary’s own, Leif Jackson dive into the working model of training: Learn, Discuss, Practice, Apply, and Challenge. Learn More & Enroll Course Free 4 H: 13 M 5 CEUS ADVANCED CYBER THREAT INTELLIGENCE Do you want to take your cyber threat intelligence skills to the next level so you can better protect your organization? Learn to leverage existing data sources, reduce false positives, and use models like the Cyber Kill Chain, and the MITRE ATT&CK framework to structure your analysis in this Advanced Cyber Threat Intelligence course. Learn More & Enroll Course Free 7 H: 56 M 11 CEUS FUNDAMENTALS OF VULNERABILITY MANAGEMENT Get an introduction to protecting your network with this Fundamentals of Vulnerability Management training. Ken Underhill explains how to use automation to manage vulnerabilities and goes over the vulnerability management lifecycle. You’ll walk away with a solid framework and understanding of different types of vulnerabilities and assessments. Learn More & Enroll Course Free 2 H: 41 M 3 CEUS FUNDAMENTALS OF CYBERSECURITY ARCHITECTURE This cyber security architecture class aims to give an appreciation of the various aspects of consideration that goes into a proper security architecture. Learn More & Enroll Course Free 1 H: 56 M 2 CEUS OPEN SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS Open source intelligence (OSINT) is the process of collecting and analyzing publicly available information that can be exploited by adversaries. Learn techniques for gathering intelligence from public data sources and how to leverage this knowledge to defend your organization from those who wish to do harm. Learn More & Enroll Course Free 1 H: 50 M 2 CEUS DFIR INVESTIGATIONS AND WITNESS TESTIMONY Is it time for you to testify? This course is for digital forensics and incident response professionals who are preparing to testify. Learn more about what makes an expert witness, as well as what is involved in the process from collection and analysis to testimony. Gain confidence with defending your work before you take the witness stand! Learn More & Enroll Course Free 2 H: 6 M 3 CEUS IDENTIFYING WEB ATTACKS THROUGH LOGS Log analysis involves reviewing and evaluating system activities to help mitigate risks. If you’re training to be a SOC Analyst, then you’ll need log analysis training. This course will review web application infrastructure, web servers, and logs. You will explore attack scenarios and identify the attack through logs generated by the web server. Learn More & Enroll Course Free 1 H: 41 M 2 CEUS INTRODUCTION TO IT & CYBERSECURITY Are you new to IT & cybersecurity and wondering which role might suit you best? In this cybersecurity for beginners overview, we cover the roles of Network Administrator, Incident Responder, System Administrator, Penetration Tester, Cloud Engineer, Cybersecurity Manager, and Privacy Analyst. Find the role for you in this exciting field. Learn More & Enroll Course Free 1 H: 20 M 1 CEUS PASSWORD CRACKING 101 You may wonder what a hash is and how adversaries exploit hashes to crack passwords. Learn how they do it and then practice doing it yourself in this Password Cracking 101 course, which is perfect for both Red Teamers who are learning privilege escalation and Blue Teamers who are learning how to audit password strength. Learn More & Enroll Course Free 21 H: 49 M 22 CEUS OFFENSIVE PENETRATION TESTING As a pentester, you need to understand the methods of real-life attackers and use the tools, techniques, and resources they exploit. Join ethical hacker Clint Kehr as he guides you from basic hacking concepts to advanced exploitation techniques in this Offensive Penetration Testing Course. Develop the hacker mindset or hone your existing skills. Learn More & Enroll Course Free 13 H: 3 M 13 CEUS CERTIFIED CLOUD SECURITY PROFESSIONAL (CCSP) As you develop your skills for a cloud security engineer, architect, or manager role, you’ll want to take this Certified Cloud Security Professional (CCSP) certification course. Information Security Analyst Graham Wicas will give you the training to understand all six domains of the CCSP exam, including cloud data security and legal compliance. Learn More & Enroll Course Free 4 H: 1 M 4 CEUS MICROSOFT 365 FUNDAMENTALS (MS-900) Microsoft 365 combines Microsoft Office with cloud-based software-as-a-service products and is one of the most widely used solutions today. Prove your foundational knowledge of how to deploy and manage cloud services in Microsoft 365 by getting the knowledge you need to pass the MS-900 certification in this Microsoft 365 Fundamentals course. Learn More & Enroll Course 0 H: 5 M 0 CEUS HOW TO USE UNICORNSCAN (BSWR) As a defender, you can use Unicornscan to evaluate your network and identify vulnerabilities. In this Unicornscan tutorial, Robert Smith shows you how to use this popular port scanning tool to determine what ports are being used for network communications so you can protect them. It’s another great Breaking Stuff with Robert (BSWR) session. Learn More & Enroll new release Baseline & Benchmark Learn how to start measuring the skills of your team --> INDUSTRY-LEADING CERTIFICATION PREPARATION Explore our on-demand courses developed by seasoned certified cybersecurity practitioners, aligned to the certification exam’s key learning objectives. Start learning for free WORDS FROM OUR USERS We're proud of our happy customers. Hear what our team customers have to say about their experiences with our courses. I've been having concerns on how to start in terms of building my #cybercareer with a sustained path. So I got introduced to Cybrary and I was able to enroll and startup early last week and I have gone through two sessions, getting to know Cybrary and also a view of what cybersecurity is from their perspective. That gave me an overall view of what jobs are found in the space, their general responsibilities, required skills, necessary certifications and their average salary pay... Cybrary has given me a greater reason to pursue my hearts desire at all cost. Jamal O. Student Thanks to Cybrary I'm now a more complete professional! Everyone in [the] cybersecurity area should consider enrollment in any Cybrary courses. João S. IT Administrator - CISSP The interviewer said the certifications and training I had completed on my own time showed that I was a quick learner, and they gave me a job offer. Justin B. IT Specialist Our partnership with Cybrary has given us the opportunity to provide world-class training materials at no cost to our clients, thanks to the funding we’ve received from the government. Cybrary offers a proven method for building a more skilled cybersecurity workforce. Katie Adams Senior Director All of the knowledge, skills, and abilities gained through the program were essential to me impressing the employer during the interview. Gabby H. Senior Security Analyst Cybrary is a one-stop-shop for my cybersecurity learning needs. Courses on vulnerability management, threat intelligence, and SIEM solutions were key for my early roles. As I grow into leadership roles influencing business policy, I’m confident Cybrary will continue developing the knowledge and skills I need to succeed. No Name Senior Cybersecurity Consultant and Virtual CISO After tens of minutes, I proudly have achieved my certificate of continuing education for Intro to Infosec... Doing everything I can to avoid retaking the CISSP test! Thanks Cybrary - 1 CPE at a time! Alex H. We’ve had six students this summer, all with different schedules, so we’ve been trying to balance their learning experience with some practical work. It’s not like they’re all sitting in a classroom at the same time, so the ability for them to learn at their own pace without any additional support has probably been the biggest benefit of using Cybrary. Collin Ricker Business Development Manager Just finished the third out of four MITRE ATT&CK Defender courses on Cybrary... If anyone is interested in learning how to do ATT&CK based SOC assessments I would definitely recommend this course. The best part is that it is FREE! Eric T. AWS Certified Cloud Practitioner Excellent new series of courses from Cybrary, each course covers a different CVE, demonstrates vulnerability and its mitigation. Raul C. Cybersecurity Specialist I've successfully completed the career path provided by Cybrary to become a SOC Analyst - Level 2. Eventually, do what you love, and do it well - that's much more meaningful than any metric. Wissal Ayari SOC Analyst Cybrary is helping me proactively build skills and advance my career. Labs put concepts immediately into practice, reinforcing the content (and saving me time not having to spin up my own VM). Career paths lay everything out clearly, so I know what skills to prioritize. No Name Enterprise Analyst I got a job as a cybersecurity analyst at Radware with a salary I've never even dreamed about AND with no prior experience. Alexei Z. Cybersecurity Analyst Thank you to Cybrary for providing this opportunity to complete the Cybrary Orientation Certification program with such sleekness and detail-oriented learning. Ganesh Y. So far I have really been enjoying Cybrary's SOC Analyst Training, it has been very informative. I just finished up with the command line section and now I'm on to the more fun stuff (Malware Analysis). I think it's so dope that platforms like this exist. This is a game changer. Tobias Castleberry SOC Analyst, Security+ Certified I decided to check out Cybrary and the courses they had to offer after seeing a few posts from people who had completed their courses. I'm happy to say that their instructors are knowledgeable and clear, and their course catalogues are extensive and offer relevant career path courses. Nazli S. AWS Certified Cloud Practitioner Glad to have discovered Cybrary they are such a great tool to use to help diversify your knowledge through lessons, assessments and practices. All compact[ed] into highly detailed and informative chunks of information. Feeling very content with the results. Temi B. Cisco Certified Network Associate Well, it took a long time, yet I struggled hard to complete the course "Become a SOC Analyst - Level 2" by Cybrary. Cybrary is the best platform that I have ever come across. Tons of virtual labs, great in-depth insights from the experts, and the best career path/learning modules. Madiraju Pranay Kashyap Programmar Analyst Trainee I am currently working in a restaurant and going to school full time. But it is not stopping me from working on gaining more and more skills. I have already spent more than 30 hours on Become a SOC Analyst level 1 [with] Cybrary and still have 67 hours to go. Abibou F. SOC Analyst Level 1 Learner RECENT ARTICLES View all posts Tools & Applications HOW TO MAKE THE MOST OF BLENDING LEARNING WITH CYBRARY LIVE Learn how to get the most from your cybersecurity training platform by blending on-demand learning with virtual, live courses led by industry experts. Read More News & Events INTRODUCING THE NEW CYBRARY LEARNER EXPERIENCE Cybrary is launching a key update to the Cybrary Learner experience to elevate hands-on learning and measurement as guiding tenets of Cybrary’s mission. Read More Building a Security Team DIGITAL FORENSICS AND INCIDENT RESPONSE: WHAT IT IS, WHEN YOU NEED IT, AND HOW TO IMPLEMENT IT A quick guide to digital forensics and incident response (DFIR): what it is, when it’s needed, how to implement a cutting-edge program, and how to develop DFIR skills on your team. Read More START LEARNING FOR FREE TODAY Join over 3 million professionals and 96% of Fortune 1000 companies improving their cybersecurity capabilities with Cybrary. Create a free account Create a Free Account Sign in Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. or sign up with Sign in View all SSO options Cybrary for teams View all SSO options Solutions For Individuals For Teams Government Company About Careers Press Cybrary Impact Hub Platform Catalog Instructors Alliances Resources Blog Help Center The Cybrary Podcast Report a Vulnerability Privacy PolicyTerms of Service Cybrary, Inc.© 2024 Register Join over 3 million cybersecurity professionals advancing their career or sign up with Email Address* Password* Your password does not meet the minimum security qualifications, please try again. See Password Requirements At least 8 character(s) At least 1 number(s) At least 1 lowercase letter(s) At least 1 uppercase letter(s) I want to receive new courses, feature updates, news, and discounts from Cybrary By creating an account, you agree to the Terms of Service and Privacy PolicyAlready have an account? This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply. Thank you! Your submission has been received! Oops! Something went wrong while submitting the form. This is some text inside of a div block. Button Text word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1