www.cybrary.it Open in urlscan Pro
52.17.119.105  Public Scan

Submitted URL: http://www.cybrary.it/
Effective URL: https://www.cybrary.it/
Submission: On June 25 via manual from SA — Scanned from IT

Form analysis 3 forms found in the DOM

Name: email-formGET

<form id="email-form" name="email-form" data-name="Email Form" method="get" cb-element="signup-form" class="login_header_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c" data-wf-element-id="8a4f5ef0-33b4-25a2-94aa-87c7e1af4ef3"
  aria-label="Email Form"><input type="email" class="login_header_form-field is--footer w-input" maxlength="256" name="email 4" data-name="Email 4" cb-element="signup-email" placeholder="name@email.com" id="email-4"
    required=""><a cl-form-submit="button" href="#" class="login_header_form-submit is-alternate-gradient w-inline-block"><div>Create a Free Account</div></a><a href="https://app.cybrary.it/login/" target="_blank" class="login_sign-in-wrapper w-inline-block"><div>Sign in</div><div class="embed-wrapper w-embed"><svg width="5" height="8" viewBox="0 0 5 8" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.14473 1L3.65058 3.50585C3.92349 3.77876 3.92349 4.22124 3.65058 4.49415L1.14473 7" stroke="black"></path>
</svg></div></a></form>

Name: email-formGET

<form id="email-form" name="email-form" data-name="Email Form" method="get" cb-element="signup-form" class="login_header_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c" data-wf-element-id="8a4f5ef0-33b4-25a2-94aa-87c7e1af4ef3"
  aria-label="Email Form"><input type="email" class="login_header_form-field is--footer w-input" maxlength="256" name="email 4" data-name="Email 4" cb-element="signup-email" placeholder="name@email.com" id="email-4"
    required=""><a cl-form-submit="button" href="#" class="login_header_form-submit is-alternate-gradient w-inline-block"><div>Create a Free Account</div></a><a href="https://app.cybrary.it/login/" target="_blank" class="login_sign-in-wrapper w-inline-block"><div>Sign in</div><div class="embed-wrapper w-embed"><svg width="5" height="8" viewBox="0 0 5 8" fill="none" xmlns="http://www.w3.org/2000/svg">
<path d="M1.14473 1L3.65058 3.50585C3.92349 3.77876 3.92349 4.22124 3.65058 4.49415L1.14473 7" stroke="black"></path>
</svg></div></a></form>

Name: wf-form-Modal-Registration-FormPOST

<form id="wf-form-Modal-Registration-Form" name="wf-form-Modal-Registration-Form" data-name="Modal Registration Form" method="post" cb-element="modal-form" class="modal_form" data-wf-page-id="63eef15e3ff8fdd8b89a688c"
  data-wf-element-id="7ebe0b2d-fa1a-4f45-c31c-1af397dad224" aria-label="Modal Registration Form">
  <div class="modal_form_field-wrap"><label for="modalEmail" class="modal_form_field-label">Email Address*</label><input type="email" class="modal_form_field w-input" maxlength="256" name="modalEmail" data-name="modalEmail" cb-element="modal-email"
      placeholder="name@email.com" id="modalEmail" required=""></div>
  <div class="modal_form_field-wrap"><label for="modalPassword" class="modal_form_field-label">Password*</label><input type="password" class="modal_form_field w-input" maxlength="256" name="modalPassword" data-name="modalPassword"
      cb-element="modal-password" placeholder="••••••••" id="modalPassword" required="">
    <div cb-element="modal-password-alert" class="modal_form_password-alert"><em>Your password does not meet the minimum security qualifications, please try again.</em></div>
  </div>
  <div class="common_process_accordion_embed w-embed w-script"><!-- [Finsweet Attributes] A11Y -->
    <script>
      (() => {
        var t = "https://cdn.jsdelivr.net/npm/@finsweet/attributes-a11y@1/a11y.js",
          e = document.querySelector(`script[src="${t}"]`);
        e || (e = document.createElement("script"), e.async = !0, e.src = t, document.head.append(e));
      })();
    </script>
  </div>
  <div class="modal_accordion_item" style="border-color: rgb(99, 99, 99);">
    <div cb-element="conditions-header" tabindex="0" role="button" aria-expanded="false" class="modal_accordion_header"><img cb-element="password-invalid" loading="lazy"
        src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d73253081f95e7114665d_Question.svg" alt="" class="modal_dd_icon-invalid"><img cb-element="password-valid" loading="lazy"
        src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645bff6cfbbd3e0a6295dcdd_ShieldCheck.svg" alt="" class="modal_dd_icon-valid">
      <div cb-element="password-requirements-text">See Password Requirements</div>
      <div class="modal_accordion_arrow-wrapper"><img loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d7aac8db87a42878a0352_dropdown%20arrow.svg" alt="" class="modal_accordion_icon"></div>
    </div>
    <div cb-element="password-conditions" aria-labelledby="accordion-header-1" class="modal_accordion_content" style="width: 100%; height: 0rem; display: none;">
      <div class="modal_dd_list-wrap">
        <div class="modal_dd_requirement">
          <div cb-element="length-check" class="modal_dd_check-wrap"><img loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" alt="" class="modal_dd_check-icon"></div>
          <div>At least 8 character(s)</div>
        </div>
        <div class="modal_dd_requirement">
          <div cb-element="number-check" class="modal_dd_check-wrap"><img loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" alt="" class="modal_dd_check-icon"></div>
          <div>At least 1 number(s)</div>
        </div>
        <div class="modal_dd_requirement">
          <div cb-element="lowercase-check" class="modal_dd_check-wrap"><img loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" alt="" class="modal_dd_check-icon"></div>
          <div>At least 1 lowercase letter(s)</div>
        </div>
        <div class="modal_dd_requirement">
          <div cb-element="uppercase-check" class="modal_dd_check-wrap"><img loading="lazy" src="https://assets-global.website-files.com/63eef15e3ff8fd318e9a6888/645d74f16881ba8c7f7221ce_Check.svg" alt="" class="modal_dd_check-icon"></div>
          <div>At least 1 uppercase letter(s)</div>
        </div>
      </div>
    </div>
  </div><label class="w-checkbox modal_checkbox_field">
    <div class="w-checkbox-input w-checkbox-input--inputType-custom modal_checkbox"></div><input type="checkbox" id="subscribe" name="subscribe" data-name="subscribe" style="opacity:0;position:absolute;z-index:-1"><span
      class="modal_checkbox_label w-form-label" for="subscribe">I want to receive new courses, feature updates, news, and discounts from Cybrary</span>
  </label><label class="w-checkbox modal_checkbox_field">
    <div class="w-checkbox-input w-checkbox-input--inputType-custom modal_checkbox"></div><input type="checkbox" id="tos" name="tos" data-name="tos" required="" style="opacity:0;position:absolute;z-index:-1"><span
      class="modal_checkbox_label w-form-label" for="tos">By creating an account, you agree to the Terms of Service and Privacy Policy</span>
  </label><input type="submit" value="Create Free Account" data-wait="Please wait..." class="button in-modal w-button" name=""><a href="https://app.cybrary.it/login" class="modal_link-login">Already have an account?</a>
  <div class="modal_terms-text">This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.</div>
</form>

Text Content

Explore
Career Paths
Launch or advance your career with curated collections of courses, labs, and
more.
Back
Foundations
Cybersecurity Foundations
IT Foundations
Defensive Security
Become a SOC Analyst - Level 1
Become a SOC Analyst - Level 2
Become a SOC Analyst - Level 3
Become an Incident Handler
Offensive Security
Become a Penetration Tester
Engineering and Operations
Become a Cyber Security Engineer
Become a Network Engineer
Become a System Administrator
Become an Azure Cloud Engineer
Governance, Risk Management & Compliance
ISO 27001:2013 - Information Security Management Systems
Cloud Governance Principles
Privacy Program Management
NIST 800-53: Introduction to Security and Privacy Controls
PCI DSS: Payment Card Industry Data Security Standard
End User Cyber Fundamentals
Leadership & Management
12 Competencies of the Effective CISO
50 CISO Security Controls
Become a CISO
Certification Prep
Prepare for and maintain leading cybersecurity certifications
Back
Beginner
CompTIA Project+ (PK0-004)
AZ-900 Microsoft Azure Fundamentals
ITIL 4 Foundation
Computer Hacking and Forensics
CompTIA A+ 220-1101
View All
Intermediate
Certified Information Systems Auditor (CISA)
CertNexus Cybersec First Responder
Certified Cloud Security Professional (CCSP)
AWS Certified Security-Specialty (2022)
View All
Advanced
CRISC
AZ-305 Designing Microsoft Azure Infrastructure Solutions
CompTIA CASP+ (CAS-004)
Certified Information Systems Security Professional (CISSP)
Mission Readiness
Learn how to detect and mitigate the latest threats and vulnerabilities.
Back
Threat Actor Campaigns
Magic Hound
Raspberry Robin
Double Trouble with Double Dragon
Weak Link in the Supply Chain
Spinning a Web Shell for Initial Access
Exfiltration and Extortion
View All
CVE Series
CVE Series: F5 BIG-IP (CVE-2022-1388)
CVE Series: CouchDB RCE (CVE-2022-24706)
CVE Series: Atlassian Bitbucket Command Injection (CVE-2022-36804)
CVE Series: Grafana Directory Traversal (CVE-2021-43798)
CVE Series: Blind NoSQL Injection (CVE-2021-22911)
CVE Series: Apache HTTPD (CVE-2021-42013)
View All
Cybrary Challenges
Challenge: Space Mission
Challenge: A Message Within A Message
Challenge: Don't Believe What You Hear
Challenge: Chatting with ChatGPT
Challenge: Saving a Fellow Monster
Challenge: Gobble Gobble Conceal & Deceive
View All
MITRE ATT&CK
MITRE ATT&CK Defender™ ATT&CK® Adversary Emulation
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
MITRE ATT&CK Defender™ ATT&CK® Threat Hunting
MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence Certification
Training
Application of the MITRE ATT&CK Framework
View All
Teams Exclusive
Upskill your team to better defend your organization from attacks.
Back
Cybrary Select
Red Team Exercises and Operations (RTXO) Content Series
Digital Forensics and Incident Response (DFIR) Content Series
Cybrary Live

Browse the Catalog

Solutions
Free Access
Get a taste of the catalog with certification prep, introductory courses, and
more.

For Individuals
Everything you need to learn, practice, and prove your cybersecurity skills.

For Teams
Upskill your team with the full catalog plus exclusive Red Team and DFIR
content.

For Government
Support your organization with a custom plan that works for your organization.

Compare Plans
Compare features across all plans.

Resources
Business Resources
Learn how Cybrary can help your team thrive.
Back
Case Studies
Research Papers
Articles
White Pages
Career Resources
Discover all the information you need to launch a cybersecurity career.
Back
How to Retool IT Skills for Cybersecurity Roles
The Complete Cybersecurity Career Playbook
Podcasts
Listen to industry experts talk about the latest news and trends in security.
Back
Go For It
401 Access Denied
Cybrary Podcasts
Intruder Alert: Conversations with Cybrary's Hackers
Webinars
Get industry advice straight from the experts' mouths.
Back
Cybrary Threat Intelligence Group (CTIG)
Team Management
Career & Skills Development
Certifications
News & Events
Study Guides
Supplement Certification Prep courses to prepare for exams.
Back
CompTIA A+
Computer Hacking Forensic Investigator
CompTIA Sec+
Cisco CCNA
CompTIA Network+
Project Management Professional
CompTIA CASP
Certified Ethical Hacker
ISC2 CISSP
Blog
Read about skills development, security trends CTIG research, and more.

Company
About
Learn about Cybrary and the people behind the product.

Press
Read the latest news about Cybrary.

Success Stories
Discover how individuals have used Cybrary to advance their careers.

Instructors
Learn about our expert instructors.

Careers
Join the Cybrary team.

Cybrary Impact Hub
Read about Cybrary's initiatives and non-profit partnerships.

Pricing
LoginSign up
Dashboard
Profile
Membership Settings
Account Settings
Support
Logout
Start learning with free on-demand video training
Sign upLogin


Amazon Web Services is currently experiencing an outage that may impact your
experience on the Cybrary application. We apologize for any inconvenience and
will be monitoring this situation closely






THE BEST WAY TO LEARN CYBERSECURITY SKILLS ONLINE

Cybrary's accessible, affordable training platform provides curated career
paths, threat-informed training, and certification preparation for professionals
at all levels.

Start Learning for Free
Cybrary for Teams


Trusted by leading organizations


Join over 3 million learners improving their cybersecurity skills
Create a Free Account
Sign in

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

or sign up with

Sign in

View all SSO options

Cybrary for teams

View all SSO options





LAUNCH YOUR CAREER

Start your cyber journey confidently with curated paths that teach the
foundational concepts related to real, on-the-job skills.


GET CERTIFIED

Ace the exam with certification prep content developed by industry-leading
instructors. Test yourself with our practice exams.


UPSKILL AND PRACTICE

Master hands-on skills and familiarize yourself with the latest vulnerabilities
and threats so you can prepare for real-world attacks.


LEARN



Learn key concepts with expert-led video courses for all professional levels.

Start learning



PRACTICE



Practice cybersecurity skills with hands-on, virtual labs.

Start learning



PROVE



Prove your abilities with practice tests and assessments.

Start learning




CYBRARY FOR TEAMS

Upskill your team with Cybrary's suite of learning activities and management
tools, including hands-on practice labs, assessments, and custom guided
pathways. Request a demo and learn how Cybrary tailors our deep library of
trainings to your team's unique needs.

Schedule a Demo




LIVE CERTIFICATION PREP TRAINING

Designed to complement Cybrary’s on-demand certification prep content, Cybrary
Live allows team members to interact directly with expert instructors in a boot
camp-style virtual classroom environment.

Learn More



ADVANCED RED TEAM AND DFIR CONTENT

Cybrary Select offers content focused on the industry’s most cutting-edge
skills. Keep your team challenged and engaged with specialized security
concepts, operational tactics, leadership skills, and more.

Learn More



STAND OUT FROM THE CROWD AND ADVANCE YOUR CAREER WITH CYBRARY

Certification Prep

Career Paths

CVE Series

Train Your Team

Threat Actor Campaigns

Free Content



POPULAR COURSES

Full Catalog

Course
Free
32
H:
29
M
16
 CEUS


CERTIFIED INFORMATION SYSTEMS SECURITY PROFESSIONAL (CISSP)

CISSP certification is essential for cybersecurity professionals aiming to move
up in their career. This course will cover all aspects of security, risk
management, and architecture to help you prepare for the CISSP exam. Learn from
experienced professionals and gain the knowledge needed to become a certified
security expert.
Learn More & Enroll
Course
Free
27
H:
53
M
31
 CEUS


CISCO CERTIFIED NETWORK ASSOCIATE (CCNA) CERTIFICATION

Our online, self-paced Cisco Certified Network Associate CCNA training teaches
students to install, configure, troubleshoot and operate LAN, WAN and dial
access services for medium-sized networks. You'll also learn how to describe the
operation of data networks.
Learn More & Enroll
Course
Free
3
H:
50
M
4
 CEUS


ENTRY-LEVEL CYBERSECURITY TRAINING

Are you new to cybersecurity and looking for a stepping stone into this exciting
career field? Cybersecurity skills are in high demand, and the field is
projected to grow 33% by 2030. This Entry-Level Cybersecurity Training course
will give you the foundational knowledge you need to get started.
Learn More & Enroll



NEW COURSES

Full Catalog

Course
0
H:
50
M
1
 CEUS


REGISTRY RUN KEYS

Many organizations do not monitor for additions to the Windows Registry that
could be used to trigger autostart execution on system boot or logon. This
allows adversaries to launch programs that run at higher privileges and paves
the way for more damaging activity. Learn how to detect and mitigate this
activity to secure your network.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


OBTAIN CAPABILITIES: TOOL

While you may be prepared to detect the use of malware on your system, what if
an adversary uses a legitimate software tool for a nefarious purpose?
Adversaries may buy or steal software and use it in unexpected ways. Learn how
adversaries leverage this technique so you can defend your organization.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


LATERAL TOOL TRANSFER

Once adversaries compromise your network, they can transfer tools between
systems in order to stage them for later use or to support lateral movement.
They may use file sharing protocols or copy files with existing tools like scp,
sftp and ftp. Learn how to spot and mitigate this behavior so you can stop
adversaries in their tracks.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


SCHEDULED TASK

Some organizations do not configure their operating systems and account
management to properly protect the use of task scheduling functionality. As a
result, adversaries can abuse this capability to execute malicious code on a
victim’s system. Get hands-on practice detecting this technique so you can
protect your organization.
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


USER DISCOVERY

Once on a victim's system, adversaries will perform user discovery to determine
information, such as the primary user’s identity and capabilities. They may seek
out users with access to remote systems so they can cast their net wider.
Discover the attacker instead of the other way around with this dynamic,
lab-based course!
Learn More & Enroll
Course
0
H:
50
M
1
 CEUS


LOCAL ACCOUNTS

Organizations that do not enforce strong password policies and audit privileged
account management can fall victim to attackers who leverage access to local
accounts. With it, they can gain initial access, persistence, privilege
escalation, or defense evasion. Learn how to detect and prevent this type of
activity in this dynamic lab-based course.
Learn More & Enroll
Course
Free
1
H:
25
M
1
 CEUS


ACTIVE SCANNING AND EXPLOIT PUBLIC-FACING APPLICATION

Threat actors will often perform Active Scanning to learn the landscape of a
victim's network and plan their next steps. One of those next steps could be
exploiting vulnerable public-facing applications to gain access and pursue their
end-goals. Master the skills to detect and mitigate these techniques and secure
your network.
Learn More & Enroll
Course
Free
1
H:
10
M
1
 CEUS


OS CREDENTIAL DUMPING

Once attackers have a presence on your system, they may dump credentials from
the operating system to gain further access and perform lateral movement. Learn
to detect and dump attackers in this lab-based course.
Learn More & Enroll
Course
Free
1
H:
10
M
1
 CEUS


SERVER SOFTWARE COMPONENT: WEB SHELL

Bad actors can gain persistence on your network by abusing software development
features that allow legitimate developers to extend server applications. In this
way, they can install malicious code for later use. Learn to detect and thwart
this activity and protect your network.
Learn More & Enroll
Course
Free
1
H:
25
M
1
 CEUS


EXFILTRATION OVER ALTERNATIVE PROTOCOL AND CLEAR CLI HISTORY

Financially motivated adversaries will often steal valuable data and exfiltrate
it over an alternate protocol like FTP, SMTP or, HTTP/S. They could also encrypt
or obfuscate these alternate channels to protect their nefarious activities.
Learn to exfiltrate the attackers by detecting and mitigating these techniques.
Learn More & Enroll
Course
Free
1
H:
2
M
1
 CEUS


OWASP TOP 10 - 2021

The OWASP Top 10 features the most critical web application security
vulnerabilities. Build your offensive security and penetration testing skills
with this one-of-a-kind course!
Learn More & Enroll
Course
Free
14
H:
26
M
15
 CEUS


ADVANCED PENETRATION TESTING

The Advanced Penetration Testing course teaches the cyber attack lifecycle from
the perspective of an adversary. Become more familiar with the most widely used
penetration-testing tools, manipulate network traffic, and perform web
application attacks such as cross-site scripting and SQL injection.
Learn More & Enroll
Course
Free
8
H:
42
M
9
 CEUS


COMPTIA A+ 220-1101

Ready to start your career in IT and cybersecurity? Earn your CompTIA A+
certification on your journey to becoming a systems administrator, network
administrator, or other cybersecurity professional. Prepare to ace the updated
220-1101 exam with this engaging course!
Learn More & Enroll
Course
Free
9
H:
10
M
9
 CEUS


INTRO TO MALWARE ANALYSIS AND REVERSE ENGINEERING

Are you on the path to becoming a SOC Analyst or preparing for your CEH exam?
This malware analysis course will help you advance your career and protect your
organization from critical threats. Learn how to perform analysis on all major
files types, carve malicious executables from documents, and recognize common
malware tactics.
Learn More & Enroll
Course
Free
2
H:
26
M
3
 CEUS


POWERSHELL FOR SECURITY PROFESSIONALS

Unlock the power! Learn to apply PowerShell from both the red and blue team
perspectives. In this PowerShell for Security Professionals course, you will
learn the fundamentals of PowerShell and how it can be used to improve the
automation of tasks across large organizational networks.
Learn More & Enroll
Course
1
H:
40
M
2
 CEUS


SYSTEM BINARY PROXY EXECUTION AND A SPEARPHISH PAYLOAD

Spearphishing is one of the oldest tricks in the book, and in this course you
will learn more about how it actually works. Plus, see how adversaries can hide
malicious code in compiled HTML files. Detect and mitigate these techniques in
our hands-on course.
Learn More & Enroll
Course
1
H:
25
M
1
 CEUS


PERSISTENCE VIA WINDOWS SERVICES

Windows Services are the main vehicle used by the Windows OS to start and run
background functions that do not require user interaction. Configuring malware
to run as a service is a common strategy for trying to blend malicious code
execution in with other legitimate Windows functions. Prevent adversaries from
gaining persistence in this course.
Learn More & Enroll
Course
1
H:
38
M
2
 CEUS


LOCAL ACCOUNT DISCOVERY, CREATION, AND MANIPULATION

After gaining initial access on a system, adversaries may want to do some
discovery work on local accounts and maintain persistence on a victim system as
they create and manipulate accounts in order to maintain their access. Learn to
detect such suspicious activity in this course!
Learn More & Enroll
Course
1
H:
30
M
2
 CEUS


AUTOMATED ARCHIVE AND EXFILTRATION

Once an adversary has firmly established access within a target environment and
identified data of interest, they want to gather and exfiltrate that data. Learn
to detect such late-stage threat actor campaign techniques of automated archive
and exfiltration in our hands-on course.
Learn More & Enroll
Course
1
H:
20
M
1
 CEUS


USING LOLBINS FOR TOOL DOWNLOADS

LOLbins won't have you laughing when threat actors "live off the land" to
leverage tools and capabilities that are already present in the target
environment to achieve objectives. Learn how to detect common adversary
techniques such as Ingress Tool Transfer in this course.
Learn More & Enroll
Course
1
H:
30
M
2
 CEUS


RANSOMWARE WITH RECOVERY DISRUPTION

After an adversary has exfiltrated data from a target system, the potential
final stages in an attack include encrypting data for impact and inhibiting
system recovery. Learn how to detect endgame ransomware techniques before a
threat actor can accomplish their nefarious objectives!
Learn More & Enroll
Course
Free
3
H:
50
M
4
 CEUS


ENTRY-LEVEL CYBERSECURITY TRAINING

Are you new to cybersecurity and looking for a stepping stone into this exciting
career field? Cybersecurity skills are in high demand, and the field is
projected to grow 33% by 2030. This Entry-Level Cybersecurity Training course
will give you the foundational knowledge you need to get started.
Learn More & Enroll
Course
Free
2
H:
57
M
3
 CEUS


INTRO TO PYTHON

If you need to learn the basics of Python for cyber security, then this
introductory Python course is right for you. Instructor Joe Perry teaches you a
framework that is a must-know for any cyber security professional. Understand
the basics of the language, solve problems with scripts, and identify useful
Python modules.
Learn More & Enroll
Course
Free
2
H:
43
M
3
 CEUS


PYTHON FOR CYBERSECURITY PROFESSIONALS

Computing devices can be used for and against us. The way to get more done in
less time is through the language of computers, which is programming. Python
provides a powerful, beginner-friendly platform for programming, and this course
will teach you to develop basic python scripts that can be used in the context
of cybersecurity.
Learn More & Enroll
Course
1
H:
19
M
1
 CEUS


COMPROMISE SOFTWARE SUPPLY CHAIN

Threat actors use the technique Compromise Software Supply Chain by altering
software that they know their victims will use. They include a backdoor that
will give them access to their victim's network once the software is installed.
You will detect this technique in a virtual lab and master how to mitigate this
threat.
Learn More & Enroll
Course
1
H:
10
M
1
 CEUS


DISABLE WINDOWS EVENT LOG AND TIMESTOMP

Sophisticated threat actors like APT29 will use the techniques Disable Windows
Event Logging and Timestomp for defense evasion to prevent defenders from seeing
their presence on the network. You will detect this nefarious activity in our
virtual lab so you can react to advanced attackers and outsmart them.
Learn More & Enroll
Course
1
H:
15
M
1
 CEUS


UNSECURED CREDENTIALS AND DOMAIN ACCOUNTS

Threat actors use the techniques Unsecured Credentials and Domain Accounts to
obtain credential access and gain persistence. In this emulation of how the
threat group APT29 would use these techniques, you will get hands-on practice
detecting this activity so you can protect your organization from highly
sophisticated advanced persistent threats.
Learn More & Enroll
Course
1
H:
10
M
1
 CEUS


APPLICATION LAYER PROTOCOL FOR C2 AND EXFIL TO CLOUD

Threat actors like APT29 use Application Layer Protocols for Command and Control
(C2) so they can blend in and avoid detection. They also may attempt to steal
data and exfiltrate it to a cloud storage service as the end-goal of their
attack. In this course, you will learn about these techniques and get practice
detecting them in our virtual lab.
Learn More & Enroll
Course
1
H:
5
M
1
 CEUS


LATERAL MOVEMENT: WINDOWS REMOTE MANAGEMENT

In order to achieve lateral movement, threat actors will use a valid account to
access remote systems, such as the Windows Remote Management service. In this
way, the threat actor can move around the network and search for valuable
information or greater access. Learn more and get hands-on with this technique
by detecting it in our virtual lab.
Learn More & Enroll
Course
Free
5
H:
22
M
6
 CEUS


COMMAND LINE BASICS

In this course you will learn the fundamentals of Command Line, a fundamental
tool for any user of Windows and Linux machines. Command line allows developers
to manipulate files easily and quickly. Learning command line saves developers
time and resources.
Learn More & Enroll
Course
Free
4
H:
20
M
5
 CEUS


WEB APPLICATION PENETRATION TESTING

If you want to be a penetration tester, you need to get inside the mind of a
hacker and learn why sites get hacked. In this Web Application Penetration
Testing course by Cydefe, you’ll build upon your existing Linux skills and get
hands-on experience with setting up your own pentesting environment.
Learn More & Enroll
Course
Free
11
H:
55
M
11
 CEUS


COMPTIA A+ 220-1102

Ready to pass your CompTIA A+ 220-1102 exam on your path to becoming an IT and
cybersecurity professional? In this course, you will learn the fundamentals of
operating systems, security, software troubleshooting, and operating procedures.
Gain the skills you’ll need to become a systems administrator or network
administrator.
Learn More & Enroll
Course
Free
2
H:
58
M
3
 CEUS


VMWARE FOUNDATIONS

In the VMware Foundations course, students will learn virtualization basics and
core concepts, the components and features of the VMware vSphere, and managing
virtual machines. Upon completion, students will have a basic understanding of
the vSphere.
Learn More & Enroll
Course
Free
6
H:
47
M
6
 CEUS


AWS CERTIFIED SECURITY-SPECIALTY (2022)

The AWS Certified Security-Specialty (AWSCS-S) is for cloud professionals who
are interested in the security side of AWS cloud infrastructure. In this course,
you will learn the necessary knowledge to pass the AWS SCS-C01 exam. This
certification is recommended for those with two or more years of experience with
securing AWS cloud workloads.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


REPLICATION THROUGH REMOVABLE MEDIA

In this course, students will learn the basics of how an adversary can use
removable media devices to not only gain access to an unauthorized host, but
also enable autorun scripts to download additional infrastructure and payloads
to a victim host.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


SYSTEM BINARY PROXY EXECUTION: MSIEXEC

In the course, you will learn how a malicious user can obfuscate some of their
payload actions through downloaded DLL files by utilizing the built in
rundll32.exe. By using rundll32, an attacker can make their activity look like a
normal Windows system binary process being executed under the rundll32.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


SYSTEM BINARY PROXY EXECUTION: RUNDLL32

In the course, you will learn how a malicious user can obfuscate some of their
payload actions through downloaded DLL files using the built-in rundll32.exe.
Using rundll32, an attacker can make their activity look like a normal Windows
system binary process being executed under rundll32.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


COMMAND AND SCRIPTING INTERPRETER: WINDOWS COMMAND SHELL

In this course, you will learn how the native CMD scripting language for Windows
can be abused to allow an attacker to execute remote commands, establish
persistence and create autorun files to carry out an attack within the Raspberry
Robin attack cycle.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


APPLICATION LAYER PROTOCOL: WEB PROTOCOLS

In this course, students will learn how C2 connections are established and used
by attackers in a real-world demonstration to give learners a sense of how to
detect malicious HTTP traffic. This is the last course in the Raspberry Robin
Attack series.
Learn More & Enroll
Course
Free
0
H:
48
M
1
 CEUS


CORPORATE CYBERSECURITY MANAGEMENT

Cyber risk, legal considerations and insurance are often overlooked by
businesses and this sets them up for major financial devastation should an
incident occur.
Learn More & Enroll
Course
Free
1
H:
33
M
1
 CEUS


CAREERS IN CYBERSECURITY

Getting started in cybersecurity can be tough, and the number of careers seems
endless. This course will get you hands-on with six of the most common
cybersecurity roles, including penetration tester, digital forensics, cloud
security, governance, security analyst, and security engineer. Decide which
career is right for you today!
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


SEARCH OPEN TECHNICAL DATABASES: SCAN DATABASES

This course covers various aspects of the Search Open Technical Databases: Scan
Databases TTP, including its components, associated risks, and detection
techniques. Participants will learn how to detect and mitigate the risks
associated with this TTP (T1596.005) and techniques for validating alerts and
conducting pre and post-alert preparations.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


EXPLOIT PUBLIC-FACING APPLICATION

This course covers the MITRE technique T1190: Exploit Public-Facing Application.
This technique involves an adversary exploiting a vulnerability in a
public-facing application to gain unauthorized access to a target network.
Students will learn about the types of public-facing applications and common
vulnerabilities that attackers may target.
Learn More & Enroll
Course
1
H:
55
M
2
 CEUS


INGRESS TOOL TRANSFER

This course gives cybersecurity professionals an in-depth understanding of the
MITRE TTP T1105 technique. This involves using legitimate tools to transfer
malicious files onto a target network and the techniques used to evade
detection. The course will also cover prevention strategies for this type of
attack.
Learn More & Enroll
Course
0
H:
58
M
1
 CEUS


CISO COMPETENCY - INNOVATION

This is the first course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Innovation. The habit of
innovation is an essential competency for any CISO trying to navigate variety of
dynamic threats, risks, oppurtunities, and failures, so it is essential in an
evolving business environment.
Learn More & Enroll
Course
0
H:
55
M
1
 CEUS


CISO COMPETENCY - FINANCE & ADMINISTRATION

This is the second course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Finance & Administration. An
awareness and understanding of corporate finance and business administration is
essential to succeed as an exec. This includes expertise in competing for
budget, resources, staff, and more.
Learn More & Enroll
Course
1
H:
35
M
2
 CEUS


EXFILTRATION OVER C2 CHANNEL

This course covers the Mitre TTP T1041- Exfiltration Over C2 channel, which
involves exfiltrating data over a command and control (C2) channel. This
technique is commonly used by threat actors to evade detection and exfiltrate
sensitive information from compromised networks.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO COMPETENCY - SECURITY

This is the fourth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Cyber Security Expertise. The CISO
must serve as the governing expert in cyber security for the organization. The
CISO must possess excellent working-knowledge of critical security issues.
Learn More & Enroll
Course
1
H:
0
M
1
 CEUS


CISO COMPETENCY - BUSINESS

This is the third course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Business Operations. Modern CISOs
must have in-depth knowledge in optimizing the increasingly-complex, connection
between security and business operations.
Learn More & Enroll
Course
1
H:
1
M
1
 CEUS


CISO COMPETENCY - DISCRETION

This is the fifth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Discretion and Trust. The CISO
must be able to exhibit and manage high levels of discretion and trust in
dealing with sensitive information regarding threats, investigations, and
on-going initiatives.
Learn More & Enroll
Course
0
H:
58
M
1
 CEUS


CISO COMPETENCY - PUBLIC SPEAKING

This is the sixth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Public Speaking. As a senior
executive, the CISO must have the ability to speak confidently and effectively
before groups ranging from large audiences to corporate boards.
Learn More & Enroll
Course
1
H:
2
M
1
 CEUS


CISO COMPETENCY - PRODUCTIVITY

This is the seventh course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Personal Productivity. The CISO
should be able to optimize personal productivity by developing effective time
management processes and prioritization skills.
Learn More & Enroll
Course
0
H:
56
M
1
 CEUS


CISO COMPETENCY - TECHNOLOGY

This is the eighth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Technology. The CISO must
consistantly produce deep insights into the current status and trends associated
with information technology, especially in relation to security.
Learn More & Enroll
Course
1
H:
2
M
1
 CEUS


CISO COMPETENCY - THREATS

This is the ninth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Threat Insights. The CISO must
maintain accurate and realistic insights into the evolving threats facing cyber
security teams, and produce qualitative and quantitative assessments for risk
decisions.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO COMPETENCY - COMPLIANCE

This is the tenth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Balancing Compliance. The
effective CISO navigates compliance and security in supporting a balanced cyber
risk management program, with an in depth understanding of industry frameworks.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO COMPETENCY - RISK

This is the eleventh course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Risk Orientation. Developing a
complete risk structure and framework for enterprise security prioritizes
safeguards, minimizes expenses, and maximizes support and mitigation for
business operations.
Learn More & Enroll
Course
1
H:
3
M
1
 CEUS


CISO COMPETENCY - LEADERSHIP

This is the twelfth course in Ed Amoroso's Twelve Competencies of the Effective
CISO, which focuses on the CISO Competency in Leadership and Vision. Every
successful CISO incorporates leadership skills and a clear vision into their
approach to guiding their program, staff, and other stakeholders, including the
CEO and Board.
Learn More & Enroll
Course
0
H:
58
M
1
 CEUS


CISO SECURITY CONTROLS: ENTERPRISE CONTROLS

This is the first course in Ed Amoroso's 50 Security Controls, which covers the
enterprise controls derived from the TAG Cyber Fifty Enterprise Controls. The
enterprise controls provide students with an executive high-level strategy with
which to secure their organization from threats, data breach, and intrusion.
Learn More & Enroll
Course
0
H:
41
M
1
 CEUS


CISO SECURITY CONTROLS: NETWORK CONTROLS

This is the second course in Ed Amoroso's 50 Security Controls, which covers the
network controls derived from the TAG Cyber Fifty Enterprise Controls. The
network controls provide students with an executive high-level strategy in
network security and covers trends in the network control areas.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO SECURITY CONTROLS: ENDPOINT CONTROLS

This is the third course in Ed Amoroso's 50 Security Controls, which covers the
endpoint controls derived from the TAG Cyber Fifty Enterprise Controls.
Learn More & Enroll
Course
0
H:
56
M
1
 CEUS


CISO SECURITY CONTROLS: GOVERNANCE CONTROLS

This is the fourth course in Ed Amoroso's 50 Security Controls, which covers the
governance controls derived from the TAG Cyber Fifty Enterprise Controls. The
governance controls provide students with executive strategies, to implement and
maintain a variety of dynamic security management domains.
Learn More & Enroll
Course
0
H:
57
M
1
 CEUS


CISO SECURITY CONTROLS: DATA CONTROLS

This is the fifth course in Ed Amoroso's 50 Security Controls, which covers the
data controls derived from the TAG Cyber Fifty Enterprise Controls. The data
controls provide students with a high-level overview of data security,
encryption, and vulnerability management policy.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


CISO SECURITY CONTROLS: INDUSTRY CONTROLS

This is the sixth course in Ed Amoroso's 50 Security Controls, which covers the
industry controls derived from the TAG Cyber Fifty Enterprise Controls. The
industry controls provide students with an executive anlysis of trends in the
security industry in valued training and development.
Learn More & Enroll
Course
Free
1
H:
46
M
2
 CEUS


EXECUTIVE RMF

This course will discuss the NIST Risk Management Framework (RMF) from an
executive perspective. Each module will not only address each step in the RMF
process, but how this process can be implemented into your organization or
business.
Learn More & Enroll
Course
Free
8
H:
49
M
9
 CEUS


SCANNING, ENUMERATION, AND VULNERABILITIES

This course covers basic scanning, enumeration, and vulnerability scanning as
part of a penetration test.
Learn More & Enroll
Course
Free
17
H:
43
M
18
 CEUS


COMPUTER HACKING AND FORENSICS

If you love the idea of doing digital forensics investigations to catch
cybercriminals and want to earn your CHFI certification, this course is for you.
Learn how to detect online criminal activity, gather evidence, and recover
deleted data. Prepare for the EC Council’s CHFI certification and be ready to
fill jobs that are in high demand.
Learn More & Enroll
Course
Free
27
H:
53
M
31
 CEUS


CISCO CERTIFIED NETWORK ASSOCIATE (CCNA) CERTIFICATION

Our online, self-paced Cisco Certified Network Associate CCNA training teaches
students to install, configure, troubleshoot and operate LAN, WAN and dial
access services for medium-sized networks. You'll also learn how to describe the
operation of data networks.
Learn More & Enroll
Course
Free
14
H:
17
M
14
 CEUS


SNIFFING

This course covers basic sniffing as part of a penetration test. Attackers and
penetration testers use sniffing to analyze network packets for information.
Learn More & Enroll
Course
Free
5
H:
8
M
5
 CEUS


HYPER-V

Microsoft Hyper-V is a technology that allows you to create virtual environments
like operating systems, virtual servers, and virtual components like hard drives
and network switches. In this Hyper-V training, you’ll learn how to build,
configure, and understand virtual machines in both the server and client
environments.
Learn More & Enroll
Course
Free
1
H:
41
M
2
 CEUS


CYBERSECURITY KILL CHAIN™

Learn a foundational concept within cybersecurity in this Cybersecurity Kill
Chain™ course. This course simulates an example attack and exposes the 7 phases
of the Lockheed Martin Cyber Kill Chain™. Then you’ll apply the knowledge gained
to design a defense-in-depth model to defend against the attack.
Learn More & Enroll
Course
0
H:
4
M
0
 CEUS


HOW TO USE BINWALK (BSWJ)

In this “How to Use binwalk (BSWJ)” course, cybersecurity expert Joe Perry takes
you on another “Breaking Stuff with Joe” (BSWJ) adventure by showing you how to
use the analysis tool binwalk to find executable code and embedded files inside
binary files. Such images can be used to crack IoT devices.
Learn More & Enroll
Course
Free
13
H:
10
M
13
 CEUS


PENETRATION TESTING EXECUTION STANDARD (PTES)

This Penetration Testing Execution Standard (PTES) course provides a
comprehensive set of standards for penetration testing. The PTES guides
information security professionals while also helping inform organizations what
can be expected from penetration tests. Business and security professionals will
benefit from this course.
Learn More & Enroll
Course
Free
13
H:
15
M
14
 CEUS


ASSEMBLY

Assembly is the lowest-level programming language and is useful in reverse
engineering and malware analysis. It can also be used for direct hardware
manipulation or to address critical performance issues. This course requires a
background in basic programming concepts and access to a Linux system. Learn
Assembly online today!
Learn More & Enroll
Course
Free
8
H:
29
M
10
 CEUS


APPLICATION OF THE MITRE ATT&CK FRAMEWORK

This MITRE ATT&CK training is designed to teach students how to apply the matrix
to help mitigate current threats. Students will move through the 12 core areas
of the framework to develop a thorough understanding of various access ATT&CK
vectors.
Learn More & Enroll
Course
Free
1
H:
53
M
2
 CEUS


AZURE STORAGE ACCOUNTS

On the path to becoming a Microsoft Azure Cloud Engineer? Azure Storage Accounts
are essential for storing and securing your data in the cloud. This course
covers storage account configuration options, as well as uploading, securing,
and managing data in the accounts.
Learn More & Enroll
Course
Free
3
H:
20
M
4
 CEUS


CYBER NETWORK SECURITY

If you want to become a network engineer, you’ll want to learn more about
incident response and business continuity planning. In the Cyber Network
Security course, cybersecurity analyst Pete Cipolone provides an overview of
network terminology. Learn about different threats, regulations, and
cybersecurity ethical considerations.
Learn More & Enroll
Course
Free
0
H:
53
M
1
 CEUS


INCIDENT RESPONSE STEPS

In Incident Response Steps, David Biser accentuates the significance of planning
out a response for when an incident occurs. He lays out an overview of the
important steps of an incident response plan and gives a breakdown of each step.
Learn More & Enroll
Course
0
H:
53
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: NEGOTIATION SKILLS FOR CYBER LEADERS

In this session of Enterprise Security Leadership in the Modern Era, Ed Amoroso
reviews the 8 rules of good negotiations and how they align not only to
professional and personal life, but how they are central to maintaining proper
Cybersecurity.
Learn More & Enroll
Course
Free
3
H:
47
M
4
 CEUS


MALWARE THREATS

Interested in penetration testing and malware analysis? This malware course
introduces you to different types of malware, like viruses, worms, and Trojans.
Gain hands-on experience in analyzing malicious files, identifying malicious
processes, and more.
Learn More & Enroll
Course
Free
1
H:
59
M
2
 CEUS


INTRODUCTION TO SPLUNK

Splunk is a software platform that indexes data and makes it searchable,
allowing it to be turned into operational intelligence. This Splunk training
course will quickly introduce you to Splunk and its many capabilities for
organizing and managing data. Take this course if you’re on the path to becoming
a SOC Analyst.
Learn More & Enroll
Course
Free
2
H:
0
M
2
 CEUS


PHISHING

If you’re looking to enter any field in cybersecurity, you’ll want to learn the
basics of phishing attacks. In this phishing course, you will learn how to craft
the perfect phishing email and defend against these increasingly clever social
engineering attempts.
Learn More & Enroll
Course
1
H:
1
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: CONFLICT RESOLUTION FOR CYBER LEADERS

Learn from Ed Amoroso and guest Chris Kubecka as they uncover the uncomfortable
topic of conflict management, and reveal real-world examples and experiences
that leaders can use in current situations.
Learn More & Enroll
Course
Free
1
H:
40
M
1
 CEUS


KALI LINUX FUNDAMENTALS

If you’re interested in penetration testing and ethical hacking, then this Kali
Linux course is a great place to start your training. Learn about the
industry-standard tool for penetration and security testing. This is a
foundational course that is designed to provide the basics of Kali distribution,
installation, troubleshooting, and navigation.
Learn More & Enroll
Course
Free
0
H:
50
M
2
 CEUS


INTRO TO BURP SUITE PRO

Learn to identify potential attack routes and security-related weaknesses in
your web applications using Burp Suite Pro, one of the web application scanning
tools preferred by security engineers and ethical hackers. This Burp Suite
training course will give you the basic knowledge you need to get up and running
with this tool.
Learn More & Enroll
Course
Free
7
H:
56
M
7
 CEUS


INCIDENT RESPONSE AND ADVANCED FORENSICS

Need some incident response training on your path to becoming a network engineer
or cyber defense analyst? This course will introduce you to incident response
and prepare you to conduct forensic collections. Learn how to develop protection
plans, dive into insider and malware threats, and commence incident recovery.
Learn More & Enroll
Course
Free
7
H:
1
M
7
 CEUS


NMAP

The network mapper (NMAP) is one of the highest quality and powerful free
network utilities in the cybersecurity professional's arsenal. This NMAP course
offers the NMAP skills and commands needed to become a better network
administrator, incident responder, or penetration tester. Learn NMAP
fundamentals and even create personal hands-on labs.
Learn More & Enroll
Course
Free
2
H:
42
M
1
 CEUS


SOCIAL ENGINEERING

Do you have what it takes to learn the art of social engineering, or master
manipulation in cybersecurity? This social engineering course is essential for
any aspiring penetration tester. Learn about different types of social
engineering attacks and gain hands-on experience in two labs using the Social
Engineering Toolkit (SET).
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: TEAM DYNAMICS FOR CYBER LEADERS

Team dynamics, like many other areas of role and career development, is
important in an industry plagued with misconceptions and global pressure. Taking
on a leadership role in cybersecurity comes with a different set of
responsibilities.
Learn More & Enroll
Course
0
H:
59
M
1
 CEUS


ENTERPRISE SECURITY LEADERSHIP: LEARNING METHODS FOR CYBER LEADERS

Ed Amoroso and Cybrary’s own, Leif Jackson dive into the working model of
training: Learn, Discuss, Practice, Apply, and Challenge.
Learn More & Enroll
Course
Free
4
H:
43
M
5
 CEUS


ADVANCED CYBER THREAT INTELLIGENCE

Do you want to take your cyber threat intelligence skills to the next level so
you can better protect your organization? Learn to leverage existing data
sources, reduce false positives, and use models like the Cyber Kill Chain, and
the MITRE ATT&CK framework to structure your analysis in this Advanced Cyber
Threat Intelligence course.
Learn More & Enroll
Course
Free
10
H:
26
M
11
 CEUS


FUNDAMENTALS OF VULNERABILITY MANAGEMENT

Get an introduction to protecting your network with this Fundamentals of
Vulnerability Management training. Ken Underhill explains how to use automation
to manage vulnerabilities and goes over the vulnerability management lifecycle.
You’ll walk away with a solid framework and understanding of different types of
vulnerabilities and assessments.
Learn More & Enroll
Course
Free
2
H:
41
M
3
 CEUS


FUNDAMENTALS OF CYBERSECURITY ARCHITECTURE

This cyber security architecture class aims to give an appreciation of the
various aspects of consideration that goes into a proper security architecture.
Learn More & Enroll
Course
Free
1
H:
56
M
2
 CEUS


OPEN SOURCE INTELLIGENCE (OSINT) FUNDAMENTALS

Open source intelligence (OSINT) is the process of collecting and analyzing
publicly available information that can be exploited by adversaries. Learn
techniques for gathering intelligence from public data sources and how to
leverage this knowledge to defend your organization from those who wish to do
harm.
Learn More & Enroll
Course
Free
1
H:
50
M
2
 CEUS


DFIR INVESTIGATIONS AND WITNESS TESTIMONY

Is it time for you to testify? This course is for digital forensics and incident
response professionals who are preparing to testify. Learn more about what makes
an expert witness, as well as what is involved in the process from collection
and analysis to testimony. Gain confidence with defending your work before you
take the witness stand!
Learn More & Enroll
Course
Free
1
H:
1
M
2
 CEUS


MITRE ATT&CK DEFENDER™ (MAD) ATT&CK® FUNDAMENTALS BADGE TRAINING

MITRE ATT&CK® Defender™ (MAD) is a cybersecurity training and certification
program produced by MITRE's own subject matter experts. Explore how a
threat-informed mindset can help you focus your efforts on improving and
understanding how your defenses fare against real-world adversaries in this MAD
ATT&CK® Fundamentals Badge Training course.
Learn More & Enroll
Course
Free
2
H:
25
M
3
 CEUS


MITRE ATT&CK DEFENDER™ (MAD) ATT&CK® CYBER THREAT INTELLIGENCE CERTIFICATION
TRAINING

Analysts and researchers gain hands-on instruction directly from MITRE’s experts
in this MITRE ATT&CK Defender™ (MAD) ATT&CK® Cyber Threat Intelligence
Certification course. Prepare for the certification and learn how to map raw
data to ATT&CK, as well as how to operationalize the intelligence through
recommendations to defenders.
Learn More & Enroll
Course
Free
29
H:
13
M
7
 CEUS


PENETRATION TESTING AND ETHICAL HACKING

To assess the strength of your organization’s cybersecurity posture, you need to
gather information, perform scanning and enumeration, and show how an adversary
could hack into your systems. This ethical hacking course will give you those
skills and prepare you for related certification exams so you can prove your
capabilities.
Learn More & Enroll
Course
Free
2
H:
6
M
3
 CEUS


IDENTIFYING WEB ATTACKS THROUGH LOGS

Log analysis involves reviewing and evaluating system activities to help
mitigate risks. If you’re training to be a SOC Analyst, then you’ll need log
analysis training. This course will review web application infrastructure, web
servers, and logs. You will explore attack scenarios and identify the attack
through logs generated by the web server.
Learn More & Enroll
Course
Free
1
H:
41
M
2
 CEUS


INTRODUCTION TO IT & CYBERSECURITY

Are you new to IT & cybersecurity and wondering which role might suit you best?
In this cybersecurity for beginners overview, we cover the roles of Network
Administrator, Incident Responder, System Administrator, Penetration Tester,
Cloud Engineer, Cybersecurity Manager, and Privacy Analyst. Find the role for
you in this exciting field.
Learn More & Enroll
Course
Free
1
H:
20
M
1
 CEUS


PASSWORD CRACKING 101

You may wonder what a hash is and how adversaries exploit hashes to crack
passwords. Learn how they do it and then practice doing it yourself in this
Password Cracking 101 course, which is perfect for both Red Teamers who are
learning privilege escalation and Blue Teamers who are learning how to audit
password strength.
Learn More & Enroll




INDUSTRY-LEADING
‍CERTIFICATION PREPARATION

Explore our on-demand courses developed by seasoned certified cybersecurity
practitioners, aligned to the certification exam’s key learning objectives.

Start learning for free




WORDS FROM OUR USERS

Join 3 million+ users, including 96% of Fortune 1000 companies who use our
platform to upskill their teams. See what the buzz is about - start learning for
free!

I've been having concerns on how to start in terms of building my #cybercareer
with a sustained path. So I got introduced to Cybrary and I was able to enroll
and startup early last week and I have gone through two sessions, getting to
know Cybrary and also a view of what cybersecurity is from their perspective.
That gave me an overall view of what jobs are found in the space, their general
responsibilities, required skills, necessary certifications and their average
salary pay... Cybrary has given me a greater reason to pursue my hearts desire
at all cost.

Jamal O.
Student

Thanks to Cybrary I'm now a more complete professional! Everyone in [the]
cybersecurity area should consider enrollment in any Cybrary courses.

João S.
IT Administrator - CISSP

The interviewer said the certifications and training I had completed on my own
time showed that I was a quick learner, and they gave me a job offer.

Justin B.
IT Specialist

Our partnership with Cybrary has given us the opportunity to provide world-class
training materials at no cost to our clients, thanks to the funding we’ve
received from the government. Cybrary offers a proven method for building a more
skilled cybersecurity workforce.

Katie Adams
Senior Director

All of the knowledge, skills, and abilities gained through the program were
essential to me impressing the employer during the interview.

Gabby H.
Senior Security Analyst

Cybrary is a one-stop-shop for my cybersecurity learning needs. Courses on
vulnerability management, threat intelligence, and SIEM solutions were key for
my early roles. As I grow into leadership roles influencing business policy, I’m
confident Cybrary will continue developing the knowledge and skills I need to
succeed.

No Name
Senior Cybersecurity Consultant and Virtual CISO

After tens of minutes, I proudly have achieved my certificate of continuing
education for Intro to Infosec... Doing everything I can to avoid retaking the
CISSP test! Thanks Cybrary - 1 CPE at a time!

Alex H.


We’ve had six students this summer, all with different schedules, so we’ve been
trying to balance their learning experience with some practical work. It’s not
like they’re all sitting in a classroom at the same time, so the ability for
them to learn at their own pace without any additional support has probably been
the biggest benefit of using Cybrary.

Collin Ricker
Business Development Manager

Just finished the third out of four MITRE ATT&CK Defender courses on Cybrary...
If anyone is interested in learning how to do ATT&CK based SOC assessments I
would definitely recommend this course. The best part is that it is FREE!

Eric T.
AWS Certified Cloud Practitioner

Excellent new series of courses from Cybrary, each course covers a different
CVE, demonstrates vulnerability and its mitigation.

Raul C.
Cybersecurity Specialist

I've successfully completed the career path provided by Cybrary to become a SOC
Analyst - Level 2. Eventually, do what you love, and do it well - that's much
more meaningful than any metric.

Wissal Ayari
SOC Analyst

Cybrary is helping me proactively build skills and advance my career. Labs put
concepts immediately into practice, reinforcing the content (and saving me time
not having to spin up my own VM). Career paths lay everything out clearly, so I
know what skills to prioritize.

No Name
Enterprise Analyst

I got a job as a cybersecurity analyst at Radware with a salary I've never even
dreamed about AND with no prior experience.

Alexei Z.
Cybersecurity Analyst

Thank you to Cybrary for providing this opportunity to complete the Cybrary
Orientation Certification program with such sleekness and detail-oriented
learning.

Ganesh Y.


So far I have really been enjoying Cybrary's SOC Analyst Training, it has been
very informative. I just finished up with the command line section and now I'm
on to the more fun stuff (Malware Analysis). I think it's so dope that platforms
like this exist. This is a game changer.

Tobias Castleberry
SOC Analyst, Security+ Certified

I decided to check out Cybrary and the courses they had to offer after seeing a
few posts from people who had completed their courses. I'm happy to say that
their instructors are knowledgeable and clear, and their course catalogues are
extensive and offer relevant career path courses.

Nazli S.
AWS Certified Cloud Practitioner

Glad to have discovered Cybrary they are such a great tool to use to help
diversify your knowledge through lessons, assessments and practices. All
compact[ed] into highly detailed and informative chunks of information. Feeling
very content with the results.

Temi B.
Cisco Certified Network Associate

Well, it took a long time, yet I struggled hard to complete the course "Become a
SOC Analyst - Level 2" by Cybrary. Cybrary is the best platform that I have ever
come across. Tons of virtual labs, great in-depth insights from the experts, and
the best career path/learning modules.

Madiraju Pranay Kashyap
Programmar Analyst Trainee

I am currently working in a restaurant and going to school full time. But it is
not stopping me from working on gaining more and more skills. I have already
spent more than 30 hours on Become a SOC Analyst level 1 [with] Cybrary and
still have 67 hours to go.

Abibou F.
SOC Analyst Level 1 Learner




RECENT ARTICLES

View all posts

Tools & Applications


HOW TO MAKE THE MOST OF BLENDING LEARNING WITH CYBRARY LIVE

Learn how to get the most from your cybersecurity training platform by blending
on-demand learning with virtual, live courses led by industry experts.

Read More

News & Events


INTRODUCING THE NEW CYBRARY LEARNER EXPERIENCE

Cybrary is launching a key update to the Cybrary Learner experience to elevate
hands-on learning and measurement as guiding tenets of Cybrary’s mission.

Read More

Building a Security Team


DIGITAL FORENSICS AND INCIDENT RESPONSE: WHAT IT IS, WHEN YOU NEED IT, AND HOW
TO IMPLEMENT IT

A quick guide to digital forensics and incident response (DFIR): what it is,
when it’s needed, how to implement a cutting-edge program, and how to develop
DFIR skills on your team.

Read More




START LEARNING FOR FREE TODAY

Join over 3 million professionals and 96% of Fortune 1000 companies improving
their cybersecurity capabilities with Cybrary.

Create a free account
Create a Free Account
Sign in

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

or sign up with

Sign in

View all SSO options

Cybrary for teams

View all SSO options



Solutions

For Individuals

For Teams

Government

Company

About

Careers

Press

Platform

Catalog

Instructors

Alliances

Resources

Blog

Help Center

The Cybrary Podcast

Report a Vulnerability

Privacy PolicyTerms of Service

Cybrary, Inc.© 2023


Register
Join over 3 million cybersecurity professionals advancing their career
or sign up with

Email Address*
Password*
Your password does not meet the minimum security qualifications, please try
again.

See Password Requirements

At least 8 character(s)
At least 1 number(s)
At least 1 lowercase letter(s)
At least 1 uppercase letter(s)

I want to receive new courses, feature updates, news, and discounts from Cybrary

By creating an account, you agree to the Terms of Service and Privacy
PolicyAlready have an account?
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of
Service apply.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.


This is some text inside of a div block.
Button Text