Purpose Statement
Cybrary Career Paths are comprehensive training programs designed to prepare you for the most in-demand roles in the cybersecurity workforce. Each path follows a Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain. As you progress through the path, your progress will be measured in real time using Experience Points (XP) that serve as a comprehensive capability score for each topic. Upon completing all of the requirements for a path, you will be rewarded with a shareable digital badge via Credly.
31
H
40
M
Time
beginner
difficulty
0
ceu/cpe
Overview
Who is this career path for?
This path is for newcomers who are just beginning to explore IT and cybersecurity careers and skillsets. Whether you’ve recently graduated with a technical degree or are making a pivot from a technical or operations-focused role.What skills will I gain by completing this path?
This path covers foundational skills that all cybersecurity roles and job functions are built upon. You’ll learn key concepts and skills including: Wireshark, NMAP, Cryptography, Firewall, IDS, and Vulnerability scanner basics.Will this prepare me for an entry-level role?
This course will prepare you to begin the search for your first cybersecurity role. While more specialized skills may be needed for your desired role, this path is designed to get you comfortable with essential concepts and on-the-job skills, giving you confidence to start the application and interview process.What prerequisites are needed for this career path? Do I need on-the-job experience?
No previous experience, knowledge, or skills are required for this path. All you need is intellectual curiosity and a growth-oriented mindset. On-the-job experience is not required but may be helpful for learners transitioning from a technical role in a different field.Frequently Asked Questions
No items found.
Path Outline
No items found.
No items found.
Network Reference Models
In this hands-on lab, you will learn about the OSI and TCP/IP Reference Models and how they are used to organize the communications standards used by computer networks. You will then explore the different layers of the two models using Wireshark and a PCAP file containing wireless network traffic.