www.cybrary.it Open in urlscan Pro
63.35.51.142  Public Scan

URL: https://www.cybrary.it/
Submission: On March 04 via manual from US — Scanned from IT

Form analysis 3 forms found in the DOM

Name: email-formGET

<form id="email-form" name="email-form" data-name="Email Form" method="get" cb-element="signup-form" class="login_header_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c" data-wf-element-id="8a4f5ef0-33b4-25a2-94aa-87c7e1af4ef3"
  aria-label="Email Form"><input class="login_header_form-field is--footer w-input" maxlength="256" name="email 4" data-name="Email 4" cb-element="signup-email" aria-label="signup form" placeholder="name@email.com" type="email" id="email-4"
    required=""><a cl-form-submit="button" href="#" class="login_header_form-submit is-alternate-gradient w-inline-block"><div>Create a Free Account</div></a><a href="https://app.cybrary.it/login/" target="_blank" class="login_sign-in-wrapper w-inline-block"><div>Sign in</div><div class="embed-wrapper w-embed"><svg width="5" height="8" viewBox="0 0 5 8" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.14473 1L3.65058 3.50585C3.92349 3.77876 3.92349 4.22124 3.65058 4.49415L1.14473 7" stroke="black"></path>
</svg></div></a></form>

Name: email-formGET

<form id="email-form" name="email-form" data-name="Email Form" method="get" cb-element="signup-form" class="login_header_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c" data-wf-element-id="8a4f5ef0-33b4-25a2-94aa-87c7e1af4ef3"
  aria-label="Email Form"><input class="login_header_form-field is--footer w-input" maxlength="256" name="email 4" data-name="Email 4" cb-element="signup-email" aria-label="signup form" placeholder="name@email.com" type="email" id="email-4"
    required=""><a cl-form-submit="button" href="#" class="login_header_form-submit is-alternate-gradient w-inline-block"><div>Create a Free Account</div></a><a href="https://app.cybrary.it/login/" target="_blank" class="login_sign-in-wrapper w-inline-block"><div>Sign in</div><div class="embed-wrapper w-embed"><svg width="5" height="8" viewBox="0 0 5 8" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.14473 1L3.65058 3.50585C3.92349 3.77876 3.92349 4.22124 3.65058 4.49415L1.14473 7" stroke="black"></path>
</svg></div></a></form>

Name: wf-form-Modal-Registration-FormPOST

<form id="wf-form-Modal-Registration-Form" name="wf-form-Modal-Registration-Form" data-name="Modal Registration Form" method="post" cb-element="modal-form" class="modal_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c"
  data-wf-element-id="7ebe0b2d-fa1a-4f45-c31c-1af397dad224" aria-label="Modal Registration Form">
  <div class="modal_form_field-wrap"><label for="modalEmail" class="modal_form_field-label">Email Address*</label><input class="modal_form_field w-input" maxlength="256" name="modalEmail" data-name="modalEmail" cb-element="modal-email"
      placeholder="name@email.com" type="email" id="modalEmail" required=""></div>
  <div class="modal_form_field-wrap"><label for="modalPassword" class="modal_form_field-label">Password*</label><input class="modal_form_field w-input" maxlength="256" name="modalPassword" data-name="modalPassword" cb-element="modal-password"
      placeholder="••••••••" type="password" id="modalPassword" required="">
    <div cb-element="modal-password-alert" class="modal_form_password-alert"><em>Your password does not meet the minimum security qualifications, please try again.</em></div>
  </div>
  <div class="common_process_accordion_embed w-embed w-script"><!-- [Finsweet Attributes] A11Y -->
    <script>
      (() => {
        var t = "https://cdn.jsdelivr.net/npm/@finsweet/attributes-a11y@1/a11y.js",
          e = document.querySelector(`script[src="${t}"]`);
        e || (e = document.createElement("script"), e.async = !0, e.src = t, document.head.append(e));
      })();
    </script>
  </div>
  <div class="modal_accordion_item" style="border-color: rgb(99, 99, 99);">
    <div cb-element="conditions-header" tabindex="0" role="button" aria-expanded="false" class="modal_accordion_header"><img cb-element="password-invalid" alt=""
        src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d73253081f95e7114665d_Question.svg" loading="lazy" class="modal_dd_icon-invalid"><img cb-element="password-valid" alt=""
        src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645bff6cfbbd3e0a6295dcdd_ShieldCheck.svg" loading="lazy" class="modal_dd_icon-valid">
      <div cb-element="password-requirements-text">See Password Requirements</div>
      <div class="modal_accordion_arrow-wrapper"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d7aac8db87a42878a0352_dropdown%20arrow.svg" class="modal_accordion_icon"></div>
    </div>
    <div cb-element="password-conditions" aria-labelledby="accordion-header-1" class="modal_accordion_content" style="width: 100%; height: 0rem; display: none;">
      <div class="modal_dd_list-wrap">
        <div class="modal_dd_requirement">
          <div cb-element="length-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
          <div>At least 8 character(s)</div>
        </div>
        <div class="modal_dd_requirement">
          <div cb-element="number-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
          <div>At least 1 number(s)</div>
        </div>
        <div class="modal_dd_requirement">
          <div cb-element="lowercase-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
          <div>At least 1 lowercase letter(s)</div>
        </div>
        <div class="modal_dd_requirement">
          <div cb-element="uppercase-check" class="modal_dd_check-wrap"><img alt="" loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" class="modal_dd_check-icon"></div>
          <div>At least 1 uppercase letter(s)</div>
        </div>
      </div>
    </div>
  </div><label class="w-checkbox modal_checkbox_field">
    <div class="w-checkbox-input w-checkbox-input--inputType-custom modal_checkbox"></div><input id="subscribe" type="checkbox" name="subscribe" data-name="subscribe" style="opacity:0;position:absolute;z-index:-1"><span
      class="modal_checkbox_label w-form-label" for="subscribe">I want to receive new courses, feature updates, news, and discounts from Cybrary</span>
  </label><label class="w-checkbox modal_checkbox_field">
    <div class="w-checkbox-input w-checkbox-input--inputType-custom modal_checkbox"></div><input id="tos" type="checkbox" name="tos" data-name="tos" required="" style="opacity:0;position:absolute;z-index:-1"><span
      class="modal_checkbox_label w-form-label" for="tos">By creating an account, you agree to the Terms of Service and Privacy Policy</span>
  </label><input type="submit" data-wait="Please wait..." class="button in-modal w-button" value="Create Free Account" name=""><a href="https://app.cybrary.it/login" class="modal_link-login">Already have an account?</a>
  <div class="modal_terms-text">This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.</div>
</form>

Text Content

Catalog
Career Paths
Launch or advance your career with curated collections of courses, labs, and
more.
Back
Foundations
IT and Cybersecurity Foundations
Defensive Security
Become an Incident Handler
Become a SOC Analyst - Level 3
Become a SOC Analyst - Level 2
Become a SOC Analyst - Level 1
Offensive Security
Become a Penetration Tester
Engineering and Operations
Become a Network Engineer
Become a Cyber Security Engineer
Become an Azure Cloud Engineer
Become a System Administrator
Governance, Risk Management & Compliance
ISO 27001:2013 - Information Security Management Systems
Cloud Governance Principles
Privacy Program Management
NIST 800-53r5: Introduction to Security and Privacy Controls
PCI DSS: Payment Card Industry Data Security Standard
End User Cyber Fundamentals
Leadership & Management
Become a CISO
50 CISO Security Controls
12 Competencies of the Effective CISO
Certification Prep
Prepare for and maintain leading cybersecurity certifications
Back
Beginner
CompTIA Security+ (SY0-601)
CompTIA Project+ (PK0-004)
AZ-900 Microsoft Azure Fundamentals
ITIL 4 Foundation
Computer Hacking and Forensics
CompTIA A+ 220-1101
View All
Intermediate
Certified Information Systems Auditor (CISA)
CertNexus Cybersec First Responder
Certified Cloud Security Professional (CCSP)
AWS Certified Security-Specialty (2022)
View All
Advanced
CRISC
AZ-305 Designing Microsoft Azure Infrastructure Solutions
CompTIA CASP+ (CAS-004)
Certified Information Systems Security Professional (CISSP)
Mission Readiness
Learn how to detect and mitigate the latest threats and vulnerabilities.
Back
Threat Actor Campaigns
Magic Hound
Raspberry Robin
Double Trouble with Double Dragon
Weak Link in the Supply Chain
Spinning a Web Shell for Initial Access
Exfiltration and Extortion
View All
CVE Series
CVE Series: F5 BIG-IP (CVE-2022-1388)
CVE Series: CouchDB RCE (CVE-2022-24706)
CVE Series: Atlassian Bitbucket Command Injection (CVE-2022-36804)
CVE Series: Grafana Directory Traversal (CVE-2021-43798)
CVE Series: Blind NoSQL Injection (CVE-2021-22911)
CVE Series: Apache HTTPD (CVE-2021-42013)
View All
Cybrary Challenges
Challenge: Space Mission
Challenge: A Message Within A Message
Challenge: Don't Believe What You Hear
Challenge: Chatting with ChatGPT
Challenge: Saving a Fellow Monster
Challenge: Gobble Gobble Conceal & Deceive
View All
MITRE ATT&CK

MITRE ATT&CK
Browse the Catalog

Instructors

For Individuals
Career Paths
Launch or advance your career with curated collections of courses, labs, and
more.
Back
Foundations
IT and Cybersecurity Foundations
Defensive Security
Become an Incident Handler
Become a SOC Analyst - Level 3
Become a SOC Analyst - Level 2
Become a SOC Analyst - Level 1
Offensive Security
Become a Penetration Tester
Engineering and Operations
Become a Network Engineer
Become a Cyber Security Engineer
Become an Azure Cloud Engineer
Become a System Administrator
Governance, Risk Management & Compliance

Leadership & Management
Become a CISO
50 CISO Security Controls
12 Competencies of the Effective CISO
Forums
Discuss all things cybersecurity for free among the vast Cybrary community

Free Access
Get a taste of the catalog with certification prep, introductory courses, and
more.

Insider Pro
Everything you need to learn, practice, and prove your cybersecurity skills.

For Teams
Build your team’s cybersecurity skills and achieve new certifications, all in
one place

Compare Plans
Compare features across all plans.

Individual
Back
Cybrary Insider Pro

MITRE ATT&CK
Free Access

Career Paths

Success Stories

For Teams
Teams Exclusive
Upskill your team to better defend your organization from attacks.
Back
Cybrary Select

Cybrary Live

Teams Features
Build your team’s cybersecurity skills and achieve new certifications, all in
one place

For Government
Support your organization with a custom plan that works for your organization.

Mission Readiness
Learn how to detect and mitigate the latest threats and vulnerabilities.
Back
Threat Actor Campaigns

CVE Series

Cybrary Challenges

MITRE ATT&CK

MITRE ATT&CK
Business Resources
Learn how Cybrary can help your team thrive.
Back
Case Studies
Research Papers
Articles
White Pages
Teams Pricing
Compare features across all plans.

Teams
Back
For Security Teams

MITRE ATT&CK
Baselining

For Government

Teams Resources

Pricing
Free Teams DemoSign upLogin
Dashboard
Profile
Membership Settings
Account Settings
Support
Logout
Start learning with free on-demand video training
Sign upLogin


Amazon Web Services is currently experiencing an outage that may impact your
experience on the Cybrary application. We apologize for any inconvenience and
will be monitoring this situation closely







THE BEST WAY TO LEARN CYBERSECURITY SKILLS ONLINE

Cybrary's accessible, affordable training platform provides curated career
paths, threat-informed training, and certification preparation for professionals
at all levels.

Go to Dashboard
Start Learning for Free
Cybrary for Teams


Trusted by leading organizations


Create a free account to start exploring the platform.
Create a Free Account
Sign in

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

or sign up with

Sign in

View all SSO options

Cybrary for teams

View all SSO options





LAUNCH YOUR CAREER

Start your cyber journey confidently with curated paths that teach the
foundational concepts related to real, on-the-job skills.


GET CERTIFIED

Ace the exam with certification prep content developed by industry-leading
instructors. Test yourself with our practice exams.


UPSKILL AND PRACTICE

Master hands-on skills and familiarize yourself with the latest vulnerabilities
and threats so you can prepare for real-world attacks.


LEARN



Learn key concepts with expert-led video courses for all professional levels.

Start learning



PRACTICE



Practice cybersecurity skills with hands-on, virtual labs.

Start learning



PROVE



Prove your abilities with practice tests and assessments.

Start learning




CYBRARY FOR TEAMS

Upskill your team with Cybrary's suite of learning activities and management
tools, including hands-on practice labs, assessments, and custom guided
pathways. Request a demo and learn how Cybrary tailors our deep library of
trainings to your team's unique needs.

Schedule a Demo




STAND OUT FROM THE CROWD AND ADVANCE YOUR CAREER WITH CYBRARY

Certification Prep

Career Paths

CVE Series

Train Your Team

Threat Actor Campaigns

Free Content



POPULAR COURSES

Full Catalog

Course
Free
30
H:
52
M
7
 CEUS


PENETRATION TESTING AND ETHICAL HACKING

To assess the strength of your organization’s cybersecurity posture, you need to
gather information, perform scanning and enumeration, and show how an adversary
could hack into your systems. This ethical hacking course will give you those
skills and prepare you for related certification exams so you can prove your
capabilities.
Learn More & Enroll
Course
Free
18
H:
28
M
10
 CEUS


COMPTIA SECURITY+ (SY0-601)

Ready to start your cybersecurity journey? The CompTIA Security+ SYO-601
credential is one of the most essential certifications in the world of
information security today. Learn about essential introductory security and risk
management concepts from world-famous cybersecurity instructor, Kelly Handerhan.
Learn More & Enroll
Course
Free
32
H:
34
M
16
 CEUS


CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP)

CISSP certification is essential for cybersecurity professionals aiming to move
up in their career. This course will cover all aspects of security, risk
management, and architecture to help you prepare for the CISSP exam. Learn from
experienced professionals and gain the knowledge needed to become a certified
security expert.
Learn More & Enroll
Course
Free
27
H:
53
M
31
 CEUS


CISCO CERTIFIED NETWORK ASSOCIATE (CCNA) CERTIFICATION

Our online, self-paced Cisco Certified Network Associate CCNA training teaches
students to install, configure, troubleshoot and operate LAN, WAN and dial
access services for medium-sized networks. You'll also learn how to describe the
operation of data networks.
Learn More & Enroll



NEW COURSES

Full Catalog

Course
0
H:
50
M
1
 CEUS


REGISTRY RUN KEYS

Many organizations do not monitor for additions to the Windows Registry that
could be used to trigger autostart execution on system boot or logon. This
allows adversaries to launch programs that run at higher privileges and paves
the way for more damaging activity. Learn how to detect and mitigate this
activity to secure your network.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


OBTAIN CAPABILITIES: TOOL

While you may be prepared to detect the use of malware on your system, what if
an adversary uses a legitimate software tool for a nefarious purpose?
Adversaries may buy or steal software and use it in unexpected ways. Learn how
adversaries leverage this technique so you can defend your organization.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


LATERAL TOOL TRANSFER

Once adversaries compromise your network, they can transfer tools between
systems in order to stage them for later use or to support lateral movement.
They may use file sharing protocols or copy files with existing tools like scp,
sftp and ftp. Learn how to spot and mitigate this behavior so you can stop
adversaries in their tracks.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


SCHEDULED TASK

Some organizations do not configure their operating systems and account
management to properly protect the use of task scheduling functionality. As a
result, adversaries can abuse this capability to execute malicious code on a
victim’s system. Get hands-on practice detecting this technique so you can
protect your organization.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


USER DISCOVERY

Once on a victim's system, adversaries will perform user discovery to determine
information, such as the primary user’s identity and capabilities. They may seek
out users with access to remote systems so they can cast their net wider.
Discover the attacker instead of the other way around with this dynamic,
lab-based course!
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


LOCAL ACCOUNTS

Organizations that do not enforce strong password policies and audit privileged
account management can fall victim to attackers who leverage access to local
accounts. With it, they can gain initial access, persistence, privilege
escalation, or defense evasion. Learn how to detect and prevent this type of
activity in this dynamic lab-based course.
Learn More & Enroll
Course
Free
1
H:
25
M
1
 CEUS


ACTIVE SCANNING AND EXPLOIT PUBLIC-FACING APPLICATION

Threat actors will often perform Active Scanning to learn the landscape of a
victim's network and plan their next steps. One of those next steps could be
exploiting vulnerable public-facing applications to gain access and pursue their
end-goals. Master the skills to detect and mitigate these techniques and secure
your network.
Learn More & Enroll
Course
Free
1
H:
10
M
1
 CEUS


OS CREDENTIAL DUMPING

Once attackers have a presence on your system, they may dump credentials from
the operating system to gain further access and perform lateral movement. Learn
to detect and dump attackers in this lab-based course.
Learn More & Enroll
Course
Free
1
H:
10
M
1
 CEUS


SERVER SOFTWARE COMPONENT: WEB SHELL

Bad actors can gain persistence on your network by abusing software development
features that allow legitimate developers to extend server applications. In this
way, they can install malicious code for later use. Learn to detect and thwart
this activity and protect your network.
Learn More & Enroll
Course
Free
1
H:
25
M
1
 CEUS


EXFILTRATION OVER ALTERNATIVE PROTOCOL AND CLEAR CLI HISTORY

Financially motivated adversaries will often steal valuable data and exfiltrate
it over an alternate protocol like FTP, SMTP or, HTTP/S. They could also encrypt
or obfuscate these alternate channels to protect their nefarious activities.
Learn to exfiltrate the attackers by detecting and mitigating these techniques.
Learn More & Enroll
Course
Free
1
H:
2
M
1
 CEUS


OWASP TOP 10 - 2021

The OWASP Top 10 features the most critical web application security
vulnerabilities. Build your offensive security and penetration testing skills
with this one-of-a-kind course!
Learn More & Enroll
Course
Free
14
H:
26
M
15
 CEUS


ADVANCED PENETRATION TESTING

The Advanced Penetration Testing course teaches the cyber attack lifecycle from
the perspective of an adversary. Become more familiar with the most widely used
penetration-testing tools, manipulate network traffic, and perform web
application attacks such as cross-site scripting and SQL injection.
Learn More & Enroll
Course
Free
8
H:
41
M
9
 CEUS


COMPTIA A+ 220-1101

Ready to start your career in IT and cybersecurity? Earn your CompTIA A+
certification on your journey to becoming a systems administrator, network
administrator, or other cybersecurity professional. Prepare to ace the updated
220-1101 exam with this engaging course!
Learn More & Enroll
Course
Free
9
H:
10
M
9
 CEUS


INTRO TO MALWARE ANALYSIS AND REVERSE ENGINEERING

Are you on the path to becoming a SOC Analyst or preparing for your CEH exam?
This malware analysis course will help you advance your career and protect your
organization from critical threats. Learn how to perform analysis on all major
files types, carve malicious executables from documents, and recognize common
malware tactics.
Learn More & Enroll
Course
Free
2
H:
26
M
3
 CEUS


POWERSHELL FOR SECURITY PROFESSIONALS

Unlock the power! Learn to apply PowerShell from both the red and blue team
perspectives. In this PowerShell for Security Professionals course, you will
learn the fundamentals of PowerShell and how it can be used to improve the
automation of tasks across large organizational networks.
Learn More & Enroll
Course
1
H:
40
M
2
 CEUS


SYSTEM BINARY PROXY EXECUTION AND A SPEARPHISH PAYLOAD

Spearphishing is one of the oldest tricks in the book, and in this course you
will learn more about how it actually works. Plus, see how adversaries can hide
malicious code in compiled HTML files. Detect and mitigate these techniques in
our hands-on course.
Learn More & Enroll
Course
1
H:
25
M
1
 CEUS


PERSISTENCE VIA WINDOWS SERVICES

Windows Services are the main vehicle used by the Windows OS to start and run
background functions that do not require user interaction. Configuring malware
to run as a service is a common strategy for trying to blend malicious code
execution in with other legitimate Windows functions. Prevent adversaries from
gaining persistence in this course.
Learn More & Enroll
Course
1
H:
38
M
2
 CEUS


LOCAL ACCOUNT DISCOVERY, CREATION, AND MANIPULATION

After gaining initial access on a system, adversaries may want to do some
discovery work on local accounts and maintain persistence on a victim system as
they create and manipulate accounts in order to maintain their access. Learn to
detect such suspicious activity in this course!
Learn More & Enroll
Course
1
H:
30
M
2
 CEUS


AUTOMATED ARCHIVE AND EXFILTRATION

Once an adversary has firmly established access within a target environment and
identified data of interest, they want to gather and exfiltrate that data. Learn
to detect such late-stage threat actor campaign techniques of automated archive
and exfiltration in our hands-on course.
Learn More & Enroll
Course
1
H:
20
M
1
 CEUS


USING LOLBINS FOR TOOL DOWNLOADS

LOLbins won't have you laughing when threat actors "live off the land" to
leverage tools and capabilities that are already present in the target
environment to achieve objectives. Learn how to detect common adversary
techniques such as Ingress Tool Transfer in this course.
Learn More & Enroll
Course
1
H:
30
M
2
 CEUS


RANSOMWARE WITH RECOVERY DISRUPTION

After an adversary has exfiltrated data from a target system, the potential
final stages in an attack include encrypting data for impact and inhibiting
system recovery. Learn how to detect endgame ransomware techniques before a
threat actor can accomplish their nefarious objectives!
Learn More & Enroll
Course
Free
3
H:
50
M
4
 CEUS


ENTRY-LEVEL CYBERSECURITY TRAINING

Are you new to cybersecurity and looking for a stepping stone into this exciting
career field? Cybersecurity skills are in high demand, and the field is
projected to grow 33% by 2030. This Entry-Level Cybersecurity Training course
will give you the foundational knowledge you need to get started.
Learn More & Enroll
Course
Free
2
H:
57
M
3
 CEUS


INTRO TO PYTHON

If you need to learn the basics of Python for cyber security, then this
introductory Python course is right for you. Instructor Joe Perry teaches you a
framework that is a must-know for any cyber security professional. Understand
the basics of the language, solve problems with scripts, and identify useful
Python modules.
Learn More & Enroll
Course
Free
2
H:
43
M
3
 CEUS


PYTHON FOR CYBERSECURITY PROFESSIONALS

Computing devices can be used for and against us. The way to get more done in
less time is through the language of computers, which is programming. Python
provides a powerful, beginner-friendly platform for programming, and this course
will teach you to develop basic python scripts that can be used in the context
of cybersecurity.
Learn More & Enroll
Course
1
H:
19
M
1
 CEUS


COMPROMISE SOFTWARE SUPPLY CHAIN

Threat actors use the technique Compromise Software Supply Chain by altering
software that they know their victims will use. They include a backdoor that
will give them access to their victim's network once the software is installed.
You will detect this technique in a virtual lab and master how to mitigate this
threat.
Learn More & Enroll
Course
1
H:
10
M
1
 CEUS


DISABLE WINDOWS EVENT LOG AND TIMESTOMP

Sophisticated threat actors like APT29 will use the techniques Disable Windows
Event Logging and Timestomp for defense evasion to prevent defenders from seeing
their presence on the network. You will detect this nefarious activity in our
virtual lab so you can react to advanced attackers and outsmart them.
Learn More & Enroll
Course
1
H:
15
M
1
 CEUS


UNSECURED CREDENTIALS AND DOMAIN ACCOUNTS

Threat actors use the techniques Unsecured Credentials and Domain Accounts to
obtain credential access and gain persistence. In this emulation of how the
threat group APT29 would use these techniques, you will get hands-on practice
detecting this activity so you can protect your organization from highly
sophisticated advanced persistent threats.
Learn More & Enroll
Course
1
H:
10
M
1
 CEUS


APPLICATION LAYER PROTOCOL FOR C2 AND EXFIL TO CLOUD

Threat actors like APT29 use Application Layer Protocols for Command and Control
(C2) so they can blend in and avoid detection. They also may attempt to steal
data and exfiltrate it to a cloud storage service as the end-goal of their
attack. In this course, you will learn about these techniques and get practice
detecting them in our virtual lab.
Learn More & Enroll
Course
1
H:
5
M
1
 CEUS


LATERAL MOVEMENT: WINDOWS REMOTE MANAGEMENT

In order to achieve lateral movement, threat actors will use a valid account to
access remote systems, such as the Windows Remote Management service. In this
way, the threat actor can move around the network and search for valuable
information or greater access. Learn more and get hands-on with this technique
by detecting it in our virtual lab.
Learn More & Enroll
Course
Free
5
H:
22
M
6
 CEUS


COMMAND LINE BASICS

In this course you will learn the fundamentals of Command Line, a fundamental
tool for any user of Windows and Linux machines. Command line allows developers
to manipulate files easily and quickly. Learning command line saves developers
time and resources.
Learn More & Enroll
Course
Free
4
H:
20
M
5
 CEUS


WEB APPLICATION PENETRATION TESTING

If you want to be a penetration tester, you need to get inside the mind of a
hacker and learn why sites get hacked. In this Web Application Penetration
Testing course by Cydefe, you’ll build upon your existing Linux skills and get
hands-on experience with setting up your own pentesting environment.
Learn More & Enroll
Course
Free
11
H:
55
M
11
 CEUS


COMPTIA A+ 220-1102

Ready to pass your CompTIA A+ 220-1102 exam on your path to becoming an IT and
cybersecurity professional? In this course, you will learn the fundamentals of
operating systems, security, software troubleshooting, and operating procedures.
Gain the skills you’ll need to become a systems administrator or network
administrator.
Learn More & Enroll
Course
Free
2
H:
58
M
3
 CEUS


VMWARE FOUNDATIONS

In the VMware Foundations course, students will learn virtualization basics and
core concepts, the components and features of the VMware vSphere, and managing
virtual machines. Upon completion, students will have a basic understanding of
the vSphere.
Learn More & Enroll
Course
Free
7
H:
20
M
6
 CEUS


AWS CERTIFIED SECURITY-SPECIALTY (2022)

The AWS Certified Security-Specialty (AWSCS-S) is for cloud professionals who
are interested in the security side of AWS cloud infrastructure. In this course,
you will learn the necessary knowledge to pass the AWS SCS-C01 exam. This
certification is recommended for those with two or more years of experience with
securing AWS cloud workloads.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


REPLICATION THROUGH REMOVABLE MEDIA

In this course, students will learn the basics of how an adversary can use
removable media devices to not only gain access to an unauthorized host, but
also enable autorun scripts to download additional infrastructure and payloads
to a victim host.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


SYSTEM BINARY PROXY EXECUTION: MSIEXEC

In the course, you will learn how a malicious user can obfuscate some of their
payload actions through downloaded DLL files by utilizing the built in
rundll32.exe. By using rundll32, an attacker can make their activity look like a
normal Windows system binary process being executed under the rundll32.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


SYSTEM BINARY PROXY EXECUTION: RUNDLL32

In the course, you will learn how a malicious user can obfuscate some of their
payload actions through downloaded DLL files using the built-in rundll32.exe.
Using rundll32, an attacker can make their activity look like a normal Windows
system binary process being executed under rundll32.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


COMMAND AND SCRIPTING INTERPRETER: WINDOWS COMMAND SHELL

In this course, you will learn how the native CMD scripting language for Windows
can be abused to allow an attacker to execute remote commands, establish
persistence and create autorun files to carry out an attack within the Raspberry
Robin attack cycle.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


APPLICATION LAYER PROTOCOL: WEB PROTOCOLS

In this course, students will learn how C2 connections are established and used
by attackers in a real-world demonstration to give learners a sense of how to
detect malicious HTTP traffic. This is the last course in the Raspberry Robin
Attack series.
Learn More & Enroll
Course
Free
0
H:
48
M
1
 CEUS


CORPORATE CYBERSECURITY MANAGEMENT

Cyber risk, legal considerations and insurance are often overlooked by
businesses and this sets them up for major financial devastation should an
incident occur.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


SEARCH OPEN TECHNICAL DATABASES: SCAN DATABASES

This course covers various aspects of the Search Open Technical Databases: Scan
Databases TTP, including its components, associated risks, and detection
techniques. Participants will learn how to detect and mitigate the risks
associated with this TTP (T1596.005) and techniques for validating alerts and
conducting pre and post-alert preparations.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


EXPLOIT PUBLIC-FACING APPLICATION

This course covers the MITRE technique T1190: Exploit Public-Facing Application.
This technique involves an adversary exploiting a vulnerability in a
public-facing application to gain unauthorized access to a target network.
Students will learn about the types of public-facing applications and common
vulnerabilities that attackers may target.
Learn More & Enroll
Course
1
H:
55
M
2
 CEUS


INGRESS TOOL TRANSFER

This course gives cybersecurity professionals an in-depth understanding of the
MITRE TTP T1105 technique. This involves using legitimate tools to transfer
malicious files onto a target network and the techniques used to evade
detection. The course will also cover prevention strategies for this type of
attack.
Learn More & Enroll
Course
0
H:
58
M
1
 CEUS


CISO COMPETENCY - INNOVATION

This is the first course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Innovation. The habit of
innovation is an essential competency for any CISO trying to navigate variety of
dynamic threats, risks, oppurtunities, and failures, so it is essential in an
evolving business environment.
Learn More & Enroll
Course
0
H:
55
M
1
 CEUS


CISO COMPETENCY - FINANCE & ADMINISTRATION

This is the second course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Finance & Administration. An
awareness and understanding of corporate finance and business administration is
essential to succeed as an exec. This includes expertise in competing for
budget, resources, staff, and more.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


EXFILTRATION OVER C2 CHANNEL

This course covers the Mitre TTP T1041- Exfiltration Over C2 channel, which
involves exfiltrating data over a command and control (C2) channel. This
technique is commonly used by threat actors to evade detection and exfiltrate
sensitive information from compromised networks.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO COMPETENCY - SECURITY

This is the fourth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Cyber Security Expertise. The CISO
must serve as the governing expert in cyber security for the organization. The
CISO must possess excellent working-knowledge of critical security issues.
Learn More & Enroll
Course
1
H:
0
M
1
 CEUS


CISO COMPETENCY - BUSINESS

This is the third course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Business Operations. Modern CISOs
must have in-depth knowledge in optimizing the increasingly-complex, connection
between security and business operations.
Learn More & Enroll
Course
1
H:
1
M
1
 CEUS


CISO COMPETENCY - DISCRETION

This is the fifth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Discretion and Trust. The CISO
must be able to exhibit and manage high levels of discretion and trust in
dealing with sensitive information regarding threats, investigations, and
on-going initiatives.
Learn More & Enroll
Course
0
H:
58
M
1
 CEUS


CISO COMPETENCY - PUBLIC SPEAKING

This is the sixth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Public Speaking. As a senior
executive, the CISO must have the ability to speak confidently and effectively
before groups ranging from large audiences to corporate boards.
Learn More & Enroll
Course
1
H:
2
M
1
 CEUS


CISO COMPETENCY - PRODUCTIVITY

This is the seventh course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Personal Productivity. The CISO
should be able to optimize personal productivity by developing effective time
management processes and prioritization skills.
Learn More & Enroll
Course
0
H:
56
M
1
 CEUS


CISO COMPETENCY - TECHNOLOGY

This is the eighth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Technology. The CISO must
consistantly produce deep insights into the current status and trends associated
with information technology, especially in relation to security.
Learn More & Enroll
Course
1
H:
2
M
1
 CEUS


CISO COMPETENCY - THREATS

This is the ninth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Threat Insights. The CISO must
maintain accurate and realistic insights into the evolving threats facing cyber
security teams, and produce qualitative and quantitative assessments for risk
decisions.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO COMPETENCY - COMPLIANCE

This is the tenth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Balancing Compliance. The
effective CISO navigates compliance and security in supporting a balanced cyber
risk management program, with an in depth understanding of industry frameworks.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO COMPETENCY - RISK

This is the eleventh course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Risk Orientation. Developing a
complete risk structure and framework for enterprise security prioritizes
safeguards, minimizes expenses, and maximizes support and mitigation for
business operations.
Learn More & Enroll
Course
1
H:
3
M
1
 CEUS


CISO COMPETENCY - LEADERSHIP

This is the twelfth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Leadership and Vision. Every
successful CISO incorporates leadership skills and a clear vision into their
approach to guiding their program, staff, and other stakeholders, including the
CEO and Board.
Learn More & Enroll
Course
0
H:
58
M
1
 CEUS


CISO SECURITY CONTROLS: ENTERPRISE CONTROLS

This is the first course in Ed Amoroso's 50 Security Controls, which covers the
enterprise controls derived from the TAG Cyber Fifty Enterprise Controls. The
enterprise controls provide students with an executive high-level strategy with
which to secure their organization from threats, data breach, and intrusion.
Learn More & Enroll
Course
0
H:
41
M
1
 CEUS


CISO SECURITY CONTROLS: NETWORK CONTROLS

This is the second course in Ed Amoroso's 50 Security Controls, which covers the
network controls derived from the TAG Cyber Fifty Enterprise Controls. The
network controls provide students with an executive high-level strategy in
network security and covers trends in the network control areas.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO SECURITY CONTROLS: ENDPOINT CONTROLS

This is the third course in Ed Amoroso's 50 Security Controls, which covers the
endpoint controls derived from the TAG Cyber Fifty Enterprise Controls.
Learn More & Enroll
Course
0
H:
56
M
1
 CEUS


CISO SECURITY CONTROLS: GOVERNANCE CONTROLS

This is the fourth course in Ed Amoroso's 50 Security Controls, which covers the
governance controls derived from the TAG Cyber Fifty Enterprise Controls. The
governance controls provide students with executive strategies, to implement and
maintain a variety of dynamic security management domains.
Learn More & Enroll
Course
0
H:
57
M
1
 CEUS


CISO SECURITY CONTROLS: DATA CONTROLS

This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the
data controls derived from the TAG Cyber Fifty Enterprise Controls. The data
controls provide students with a high-level overview of data security,
encryption, and vulnerability management policy.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO SECURITY CONTROLS: INDUSTRY CONTROLS

This is the sixth course in Ed Amoroso's 50 Security Controls, which covers the
industry controls derived from the TAG Cyber Fifty Enterprise Controls. The
industry controls provide students with an executive anlysis of trends in the
security industry in valued training and development.
Learn More & Enroll
Course
Free
1
H:
46
M
2
 CEUS


EXECUTIVE RMF

This course will discuss the NIST Risk Management Framework (RMF) from an
executive perspective. Each module will not only address each step in the RMF
process, but how this process can be implemented into your organization or
business.
Learn More & Enroll
Course
Free
7
H:
47
M
9
 CEUS


SCANNING, ENUMERATION, AND VULNERABILITIES

This course covers basic scanning, enumeration, and vulnerability scanning as
part of a penetration test.
Learn More & Enroll
Course
Free
17
H:
43
M
18
 CEUS


COMPUTER HACKING AND FORENSICS

If you love the idea of doing digital forensics investigations to catch
cybercriminals and want to earn your CHFI certification, this course is for you.
Learn how to detect online criminal activity, gather evidence, and recover
deleted data. Prepare for the EC Council’s CHFI certification and be ready to
fill jobs that are in high demand.
Learn More & Enroll
Course
Free
27
H:
53
M
31
 CEUS


CISCO CERTIFIED NETWORK ASSOCIATE (CCNA) CERTIFICATION

Our online, self-paced Cisco Certified Network Associate CCNA training teaches
students to install, configure, troubleshoot and operate LAN, WAN and dial
access services for medium-sized networks. You'll also learn how to describe the
operation of data networks.
Learn More & Enroll
Course
Free
11
H:
47
M
14
 CEUS


SNIFFING

This course covers basic sniffing as part of a penetration test. Attackers and
penetration testers use sniffing to analyze network packets for information.
Learn More & Enroll
Course
Free
5
H:
8
M
5
 CEUS


HYPER-V

Microsoft Hyper-V is a technology that allows you to create virtual environments
like operating systems, virtual servers, and virtual components like hard drives
and network switches. In this Hyper-V training, you’ll learn how to build,
configure, and understand virtual machines in both the server and client
environments.
Learn More & Enroll
Course
Free
1
H:
41
M
2
 CEUS


CYBERSECURITY KILL CHAIN™

Learn a foundational concept within cybersecurity in this Cybersecurity Kill
Chain™ course. This course simulates an example attack and exposes the 7 phases
of the Lockheed Martin Cyber Kill Chain™. Then you’ll apply the knowledge gained
to design a defense-in-depth model to defend against the attack.
Learn More & Enroll
Course
0
H:
4
M
0
 CEUS


HOW TO USE BINWALK (BSWJ)

In this “How to Use binwalk (BSWJ)” course, cybersecurity expert Joe Perry takes
you on another “Breaking Stuff with Joe” (BSWJ) adventure by showing you how to
use the analysis tool binwalk to find executable code and embedded files inside
binary files. Such images can be used to crack IoT devices.
Learn More & Enroll
Course
Free
13
H:
10
M
13
 CEUS


PENETRATION TESTING EXECUTION STANDARD (PTES)

This Penetration Testing Execution Standard (PTES) course provides a
comprehensive set of standards for penetration testing. The PTES guides
information security professionals while also helping inform organizations what
can be expected from penetration tests. Business and security professionals will
benefit from this course.
Learn More & Enroll
Course
Free
13
H:
15
M
14
 CEUS


ASSEMBLY

Assembly is the lowest-level programming language and is useful in reverse
engineering and malware analysis. It can also be used for direct hardware
manipulation or to address critical performance issues. This course requires a
background in basic programming concepts and access to a Linux system. Learn
Assembly online today!
Learn More & Enroll
Course
Free
8
H:
29
M
10
 CEUS


APPLICATION OF THE MITRE ATT&CK FRAMEWORK

This MITRE ATT&CK training is designed to teach students how to apply the matrix
to help mitigate current threats. Students will move through the 12 core areas
of the framework to develop a thorough understanding of various access ATT&CK
vectors.
Learn More & Enroll
Course
Free
1
H:
53
M
2
 CEUS


AZURE STORAGE ACCOUNTS

On the path to becoming a Microsoft Azure Cloud Engineer? Azure Storage Accounts
are essential for storing and securing your data in the cloud. This course
covers storage account configuration options, as well as uploading, securing,
and managing data in the accounts.
Learn More & Enroll
Course
Free
3
H:
20
M
4
 CEUS


CYBER NETWORK SECURITY

If you want to become a network engineer, you’ll want to learn more about
incident response and business continuity planning. In the Cyber Network
Security course, cybersecurity analyst Pete Cipolone provides an overview of
network terminology. Learn about different threats, regulations, and
cybersecurity ethical considerations.
Learn More & Enroll
Course
Free
0
H:
29
M
1
 CEUS


INCIDENT RESPONSE STEPS

In Incident Response Steps, David Biser accentuates the significance of planning
out a response for when an incident occurs. He lays out an overview of the
important steps of an incident response plan and gives a breakdown of each step.
Learn More & Enroll
Course
0
H:
53
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: NEGOTIATION SKILLS FOR CYBER LEADERS

In this session of Enterprise Security Leadership in the Modern Era, Ed Amoroso
reviews the 8 rules of good negotiations and how they align not only to
professional and personal life, but how they are central to maintaining proper
Cybersecurity.
Learn More & Enroll
Course
Free
1
H:
47
M
4
 CEUS


MALWARE THREATS

Interested in penetration testing and malware analysis? This malware course
introduces you to different types of malware, like viruses, worms, and Trojans.
Gain hands-on experience in analyzing malicious files, identifying malicious
processes, and more.
Learn More & Enroll
Course
Free
1
H:
59
M
2
 CEUS


INTRODUCTION TO SPLUNK

Splunk is a software platform that indexes data and makes it searchable,
allowing it to be turned into operational intelligence. This Splunk training
course will quickly introduce you to Splunk and its many capabilities for
organizing and managing data. Take this course if you’re on the path to becoming
a SOC Analyst.
Learn More & Enroll
Course
Free
1
H:
30
M
2
 CEUS


PHISHING

If you’re looking to enter any field in cybersecurity, you’ll want to learn the
basics of phishing attacks. In this phishing course, you will learn how to craft
the perfect phishing email and defend against these increasingly clever social
engineering attempts.
Learn More & Enroll
Course
1
H:
1
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: CONFLICT RESOLUTION FOR CYBER LEADERS

Learn from Ed Amoroso and guest Chris Kubecka as they uncover the uncomfortable
topic of conflict management, and reveal real-world examples and experiences
that leaders can use in current situations.
Learn More & Enroll
Course
Free
1
H:
40
M
1
 CEUS


KALI LINUX FUNDAMENTALS

If you’re interested in penetration testing and ethical hacking, then this Kali
Linux course is a great place to start your training. Learn about the
industry-standard tool for penetration and security testing. This is a
foundational course that is designed to provide the basics of Kali distribution,
installation, troubleshooting, and navigation.
Learn More & Enroll
Course
Free
0
H:
25
M
2
 CEUS


INTRO TO BURP SUITE PRO

Learn to identify potential attack routes and security-related weaknesses in
your web applications using Burp Suite Pro, one of the web application scanning
tools preferred by security engineers and ethical hackers. This Burp Suite
training course will give you the basic knowledge you need to get up and running
with this tool.
Learn More & Enroll
Course
Free
7
H:
26
M
7
 CEUS


INCIDENT RESPONSE AND ADVANCED FORENSICS

Need some incident response training on your path to becoming a network engineer
or cyber defense analyst? This course will introduce you to incident response
and prepare you to conduct forensic collections. Learn how to develop protection
plans, dive into insider and malware threats, and commence incident recovery.
Learn More & Enroll
Course
Free
6
H:
17
M
7
 CEUS


NMAP

The network mapper (NMAP) is one of the highest quality and powerful free
network utilities in the cybersecurity professional's arsenal. This NMAP course
offers the NMAP skills and commands needed to become a better network
administrator, incident responder, or penetration tester. Learn NMAP
fundamentals and even create personal hands-on labs.
Learn More & Enroll
Course
Free
1
H:
57
M
1
 CEUS


SOCIAL ENGINEERING

Do you have what it takes to learn the art of social engineering, or master
manipulation in cybersecurity? This social engineering course is essential for
any aspiring penetration tester. Learn about different types of social
engineering attacks and gain hands-on experience in two labs using the Social
Engineering Toolkit (SET).
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: TEAM DYNAMICS FOR CYBER LEADERS

Team dynamics, like many other areas of role and career development, is
important in an industry plagued with misconceptions and global pressure. Taking
on a leadership role in cybersecurity comes with a different set of
responsibilities.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: LEARNING METHODS FOR CYBER LEADERS

Ed Amoroso and Cybrary’s own, Leif Jackson dive into the working model of
training: Learn, Discuss, Practice, Apply, and Challenge.
Learn More & Enroll
Course
Free
4
H:
13
M
5
 CEUS


ADVANCED CYBER THREAT INTELLIGENCE

Do you want to take your cyber threat intelligence skills to the next level so
you can better protect your organization? Learn to leverage existing data
sources, reduce false positives, and use models like the Cyber Kill Chain, and
the MITRE ATT&CK framework to structure your analysis in this Advanced Cyber
Threat Intelligence course.
Learn More & Enroll
Course
Free
7
H:
56
M
11
 CEUS


FUNDAMENTALS OF VULNERABILITY MANAGEMENT

Get an introduction to protecting your network with this Fundamentals of
Vulnerability Management training. Ken Underhill explains how to use automation
to manage vulnerabilities and goes over the vulnerability management lifecycle.
You’ll walk away with a solid framework and understanding of different types of
vulnerabilities and assessments.
Learn More & Enroll
Course
Free
2
H:
41
M
3
 CEUS


FUNDAMENTALS OF CYBERSECURITY ARCHITECTURE

This cyber security architecture class aims to give an appreciation of the
various aspects of consideration that goes into a proper security architecture.
Learn More & Enroll
Course
Free
1
H:
56
M
2
 CEUS


OPEN SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS

Open source intelligence (OSINT) is the process of collecting and analyzing
publicly available information that can be exploited by adversaries. Learn
techniques for gathering intelligence from public data sources and how to
leverage this knowledge to defend your organization from those who wish to do
harm.
Learn More & Enroll
Course
Free
1
H:
50
M
2
 CEUS


DFIR INVESTIGATIONS AND WITNESS TESTIMONY

Is it time for you to testify? This course is for digital forensics and incident
response professionals who are preparing to testify. Learn more about what makes
an expert witness, as well as what is involved in the process from collection
and analysis to testimony. Gain confidence with defending your work before you
take the witness stand!
Learn More & Enroll
Course
Free
2
H:
6
M
3
 CEUS


IDENTIFYING WEB ATTACKS THROUGH LOGS

Log analysis involves reviewing and evaluating system activities to help
mitigate risks. If you’re training to be a SOC Analyst, then you’ll need log
analysis training. This course will review web application infrastructure, web
servers, and logs. You will explore attack scenarios and identify the attack
through logs generated by the web server.
Learn More & Enroll
Course
Free
1
H:
41
M
2
 CEUS


INTRODUCTION TO IT & CYBERSECURITY

Are you new to IT & cybersecurity and wondering which role might suit you best?
In this cybersecurity for beginners overview, we cover the roles of Network
Administrator, Incident Responder, System Administrator, Penetration Tester,
Cloud Engineer, Cybersecurity Manager, and Privacy Analyst. Find the role for
you in this exciting field.
Learn More & Enroll
Course
Free
1
H:
20
M
1
 CEUS


PASSWORD CRACKING 101

You may wonder what a hash is and how adversaries exploit hashes to crack
passwords. Learn how they do it and then practice doing it yourself in this
Password Cracking 101 course, which is perfect for both Red Teamers who are
learning privilege escalation and Blue Teamers who are learning how to audit
password strength.
Learn More & Enroll
Course
Free
21
H:
49
M
22
 CEUS


OFFENSIVE PENETRATION TESTING

As a pentester, you need to understand the methods of real-life attackers and
use the tools, techniques, and resources they exploit. Join ethical hacker Clint
Kehr as he guides you from basic hacking concepts to advanced exploitation
techniques in this Offensive Penetration Testing Course. Develop the hacker
mindset or hone your existing skills.
Learn More & Enroll
Course
Free
13
H:
3
M
13
 CEUS


CERTIFIED CLOUD SECURITY PROFESSIONAL (CCSP)

As you develop your skills for a cloud security engineer, architect, or manager
role, you’ll want to take this Certified Cloud Security Professional (CCSP)
certification course. Information Security Analyst Graham Wicas will give you
the training to understand all six domains of the CCSP exam, including cloud
data security and legal compliance.
Learn More & Enroll
Course
Free
4
H:
1
M
4
 CEUS


MICROSOFT 365 FUNDAMENTALS (MS-900)

Microsoft 365 combines Microsoft Office with cloud-based software-as-a-service
products and is one of the most widely used solutions today. Prove your
foundational knowledge of how to deploy and manage cloud services in Microsoft
365 by getting the knowledge you need to pass the MS-900 certification in this
Microsoft 365 Fundamentals course.
Learn More & Enroll
Course
0
H:
5
M
0
 CEUS


HOW TO USE UNICORNSCAN (BSWR)

As a defender, you can use Unicornscan to evaluate your network and identify
vulnerabilities. In this Unicornscan tutorial, Robert Smith shows you how to use
this popular port scanning tool to determine what ports are being used for
network communications so you can protect them. It’s another great Breaking
Stuff with Robert (BSWR) session.
Learn More & Enroll


new release
Baseline & Benchmark
Learn how to start measuring the skills of your team -->



INDUSTRY-LEADING
‍CERTIFICATION PREPARATION

Explore our on-demand courses developed by seasoned certified cybersecurity
practitioners, aligned to the certification exam’s key learning objectives.

Start learning for free




WORDS FROM OUR USERS

We're proud of our happy customers. Hear what our team customers have to say
about their experiences with our courses.

I've been having concerns on how to start in terms of building my #cybercareer
with a sustained path. So I got introduced to Cybrary and I was able to enroll
and startup early last week and I have gone through two sessions, getting to
know Cybrary and also a view of what cybersecurity is from their perspective.
That gave me an overall view of what jobs are found in the space, their general
responsibilities, required skills, necessary certifications and their average
salary pay... Cybrary has given me a greater reason to pursue my hearts desire
at all cost.

Jamal O.
Student

Thanks to Cybrary I'm now a more complete professional! Everyone in [the]
cybersecurity area should consider enrollment in any Cybrary courses.

João S.
IT Administrator - CISSP

The interviewer said the certifications and training I had completed on my own
time showed that I was a quick learner, and they gave me a job offer.

Justin B.
IT Specialist

Our partnership with Cybrary has given us the opportunity to provide world-class
training materials at no cost to our clients, thanks to the funding we’ve
received from the government. Cybrary offers a proven method for building a more
skilled cybersecurity workforce.

Katie Adams
Senior Director

All of the knowledge, skills, and abilities gained through the program were
essential to me impressing the employer during the interview.

Gabby H.
Senior Security Analyst

Cybrary is a one-stop-shop for my cybersecurity learning needs. Courses on
vulnerability management, threat intelligence, and SIEM solutions were key for
my early roles. As I grow into leadership roles influencing business policy, I’m
confident Cybrary will continue developing the knowledge and skills I need to
succeed.

No Name
Senior Cybersecurity Consultant and Virtual CISO

After tens of minutes, I proudly have achieved my certificate of continuing
education for Intro to Infosec... Doing everything I can to avoid retaking the
CISSP test! Thanks Cybrary - 1 CPE at a time!

Alex H.


We’ve had six students this summer, all with different schedules, so we’ve been
trying to balance their learning experience with some practical work. It’s not
like they’re all sitting in a classroom at the same time, so the ability for
them to learn at their own pace without any additional support has probably been
the biggest benefit of using Cybrary.

Collin Ricker
Business Development Manager

Just finished the third out of four MITRE ATT&CK Defender courses on Cybrary...
If anyone is interested in learning how to do ATT&CK based SOC assessments I
would definitely recommend this course. The best part is that it is FREE!

Eric T.
AWS Certified Cloud Practitioner

Excellent new series of courses from Cybrary, each course covers a different
CVE, demonstrates vulnerability and its mitigation.

Raul C.
Cybersecurity Specialist

I've successfully completed the career path provided by Cybrary to become a SOC
Analyst - Level 2. Eventually, do what you love, and do it well - that's much
more meaningful than any metric.

Wissal Ayari
SOC Analyst

Cybrary is helping me proactively build skills and advance my career. Labs put
concepts immediately into practice, reinforcing the content (and saving me time
not having to spin up my own VM). Career paths lay everything out clearly, so I
know what skills to prioritize.

No Name
Enterprise Analyst

I got a job as a cybersecurity analyst at Radware with a salary I've never even
dreamed about AND with no prior experience.

Alexei Z.
Cybersecurity Analyst

Thank you to Cybrary for providing this opportunity to complete the Cybrary
Orientation Certification program with such sleekness and detail-oriented
learning.

Ganesh Y.


So far I have really been enjoying Cybrary's SOC Analyst Training, it has been
very informative. I just finished up with the command line section and now I'm
on to the more fun stuff (Malware Analysis). I think it's so dope that platforms
like this exist. This is a game changer.

Tobias Castleberry
SOC Analyst, Security+ Certified

I decided to check out Cybrary and the courses they had to offer after seeing a
few posts from people who had completed their courses. I'm happy to say that
their instructors are knowledgeable and clear, and their course catalogues are
extensive and offer relevant career path courses.

Nazli S.
AWS Certified Cloud Practitioner

Glad to have discovered Cybrary they are such a great tool to use to help
diversify your knowledge through lessons, assessments and practices. All
compact[ed] into highly detailed and informative chunks of information. Feeling
very content with the results.

Temi B.
Cisco Certified Network Associate

Well, it took a long time, yet I struggled hard to complete the course "Become a
SOC Analyst - Level 2" by Cybrary. Cybrary is the best platform that I have ever
come across. Tons of virtual labs, great in-depth insights from the experts, and
the best career path/learning modules.

Madiraju Pranay Kashyap
Programmar Analyst Trainee

I am currently working in a restaurant and going to school full time. But it is
not stopping me from working on gaining more and more skills. I have already
spent more than 30 hours on Become a SOC Analyst level 1 [with] Cybrary and
still have 67 hours to go.

Abibou F.
SOC Analyst Level 1 Learner




RECENT ARTICLES

View all posts

Tools & Applications


HOW TO MAKE THE MOST OF BLENDING LEARNING WITH CYBRARY LIVE

Learn how to get the most from your cybersecurity training platform by blending
on-demand learning with virtual, live courses led by industry experts.

Read More

News & Events


INTRODUCING THE NEW CYBRARY LEARNER EXPERIENCE

Cybrary is launching a key update to the Cybrary Learner experience to elevate
hands-on learning and measurement as guiding tenets of Cybrary’s mission.

Read More

Building a Security Team


DIGITAL FORENSICS AND INCIDENT RESPONSE: WHAT IT IS, WHEN YOU NEED IT, AND HOW
TO IMPLEMENT IT

A quick guide to digital forensics and incident response (DFIR): what it is,
when it’s needed, how to implement a cutting-edge program, and how to develop
DFIR skills on your team.

Read More




START LEARNING FOR FREE TODAY

Join over 3 million professionals and 96% of Fortune 1000 companies improving
their cybersecurity capabilities with Cybrary.

Create a free account
Create a Free Account
Sign in

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

or sign up with

Sign in

View all SSO options

Cybrary for teams

View all SSO options



Solutions

For Individuals

For Teams

Government

Company

About

Careers

Press

Cybrary Impact Hub

Platform

Catalog

Instructors

Alliances

Resources

Blog

Help Center

The Cybrary Podcast

Report a Vulnerability

Privacy PolicyTerms of Service

Cybrary, Inc.© 2024


Register
Join over 3 million cybersecurity professionals advancing their career
or sign up with

Email Address*
Password*
Your password does not meet the minimum security qualifications, please try
again.

See Password Requirements

At least 8 character(s)
At least 1 number(s)
At least 1 lowercase letter(s)
At least 1 uppercase letter(s)

I want to receive new courses, feature updates, news, and discounts from Cybrary

By creating an account, you agree to the Terms of Service and Privacy
PolicyAlready have an account?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of
Service apply.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.


This is some text inside of a div block.
Button Text




word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1