Browse the Full Catalog
Cybrary’s comprehensive, framework-aligned catalog has been reorganized to provide you with an intentional, guided learning experience. Advance your career, prep for certifications, and build your skills whenever, wherever.
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/668e459f9b23d37a2e368bd0_image%209-min.png)
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/668e459e709cb0ddfad1ddfe_image%2013-min.png)
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/668e4c9dbb0bd2a224bb0c27_image%2010-min.png)
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/668e459f8bbef917ac53fb75_image%207-min.png)
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/668e4ca77bff8d347b6c26c4_image%207-min.png)
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/668e4ca77bff8d347b6c26c4_image%207-min.png)
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/668e4ca77bff8d347b6c26c4_image%207-min.png)
![](https://cdn.prod.website-files.com/63eef15e3ff8fd318e9a6888/6696341be1289f088f24c855_image%2013.png)
The content and tools you need to build real-world skills
Rapidly develop your skills via an integrated and engaging learning
experience on the Cybrary platform.
Bite-sized Video Training
Manageable instruction from industry experts
Hands-On Learning
Put your skills to the test in virtual labs, challenges, and simulated environments
Practice Exams
Prepare for industry certifications with insider tips and practice exams
Earn Industry Badges
Complete coursework to earn industry-recognized badges via Credly
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c16e7d5c861ce9d596b1_AZ-104.png)
Microsoft Azure AZ-104 Certification Training
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3c0276e5718758c0462_CISA.png)
CISA Certification Prep
ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based auditing practices. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3a5e2a2e042263c6559_CRISC.png)
CRISC Certification Prep
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64745f6020d0ddbe59277b04_AWS_Certified_SAA.png)
AWS Solutions Architect Certification Training (SAA-C03)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c349d1f6c9a99bb388ae_CompTIA_Network_.png)
CompTIA Network+ Certification Training (N10-008)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c32ad1f6c9a99bb35db9_AWS_Certified_CP.png)
AWS Cloud Practitioner Certification Training
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c29b84b7c5e183ae27ce_HCISPP.png)
HCISPP
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c29797e20ef212d01eff_MS-500.png)
Microsoft 365 Certification Training
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c1b3b299c17024b611e1_CompTIA_Project_.png)
CompTIA Project+ Certification Training (PK0-004)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6696933df4381b0427a7f665_CP_IT_CyberSec_Foundations%20(1).png)
IT & Cybersecurity Foundations Career Path
Get everything you need to start your cybersecurity career journey, and stop wasting your time (and money) sorting through unreliable information from questionable sources. While this industry offers very lucrative career opportunities, finding accurate, relevant information to break into the field can be incredibly frustrating. That’s why we’ve crafted this IT and Cybersecurity Foundations path, featuring thoughtful, bite-sized content from expert instructors covering core concepts found across all cybersecurity roles. These instructors have helped thousands of other beginners grasp essential IT and cybersecurity topics. Get ready to take your first steps into cybersecurity by diving into core concepts needed for any cybersecurity role. Build practical skills and gain confidence as you begin your cybersecurity journey.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/66969329bf3cce22dff563c8_SOC_Analyst__1_%20(1).png)
SOC Analyst Career Path
SOC Analysts are the front line of defensive security operations and the most in-demand job in cybersecurity. They are responsible for receiving, analyzing, and triaging security tickets as part of an organization’s Security Operations Center. This career path is designed to provide you with foundational knowledge and key skills required to succeed as an entry-level SOC Analyst. Over the course of 20 courses and hands-on virtual labs, you will learn Defensive Security Fundamentals, Log Analysis, Network-Based Detection, and Host-Based Detection. Completing this career path and the associated Assessments will prepare you for pursuing a career as a SOC Analyst and further specializing in advanced skills like Threat Intelligence, Threat Hunting, Incident Response, Malware Analysis, and Digital Forensics.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6696936b2bde50f8976dbbcd_Penetration_Tester__1_.png)
Penetration Tester Career Path
Penetration Testers are professional ethical hackers. They are responsible for assessing an organization's defenses from the perspective of a threat actor. This program is designed to provide you with the foundational knowledge and key skills required to succeed as an entry-level Penetration Tester. Over the course of 22 courses and hands-on virtual labs, you will learn Offensive Security Fundamentals, Reconnaissance and Enumeration, Application Attacks, Network Attacks, and Evasion.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/669693acdb7ea7788272457e_CP_SecurityEngineer%20(1).png)
Security Engineer Career Path
Security Engineers are security-minded architects and builders. They are responsible for planning and implementing security controls throughout an IT environment. This career path is designed to provide you with foundational knowledge and key skills required to succeed as an entry-level Security Engineer. In this path, you will learn Security Engineering Fundamentals, Infrastructure Security, Application Security, and Data Security.
Completing this career path and the associated Assessments will prepare you for pursuing a career as a Security Engineer and further specializing in advanced skills like Cloud Security and Cybersecurity Architecture.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6696931789122d841184b367_CP_Leadrship_Management%20(1).png)
Leadership and Management Career Path
Effective Leadership and Management is critical to any security-related function. Leaders and Managers are responsible for providing the vision and advocacy required for an organization to effectively manage cyber risks. This career path is designed to provide you with foundational knowledge and key skills required to succeed as an effective leader within any security domain.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3bb7d5c861ce9d74645_OWASP_Top_10-A8.png)
OWASP Top 10 - A08:2021 - Software and Data Integrity Failures
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3b9b299c17024b849e6_OWASP_Top_10-A4.png)
OWASP Top 10 - A04:2021 - Insecure Design
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3b184b7c5e183af1a14_OWASP_Top_10-A9.png)
OWASP Top 10 - A09:2021 - Security Logging and Monitoring Failures
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c39d276e5718758be74b_OWASP_Top_10-A10.png)
OWASP Top 10 - A10:2021 - Server-Side Request Forgery (SSRF)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c34284b7c5e183aee810_OWASP_Top_10-A5.png)
OWASP Top 10 - A05:2021 - Security Misconfiguration
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c340b299c17024b7b537_OWASP_Top_10-A2.png)
OWASP Top 10 - A02:2021 - Cryptographic Failures
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3384fd4b0c351af9341_OWASP_Top_10-A7.png)
OWASP Top 10 - A07:2021 - Identification and Authentication Failures
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c33508b9d6c5a117f755_OWASP_Top_10-A6.png)
OWASP Top 10 - A06:2021 - Vulnerable and Outdated Components
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c332b299c17024b7a0fd_OWASP_Top_10-A3.png)
OWASP Top 10 - A03:2021 - Injection
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c32fbc42ab1b36f22d9a_OWASP_Top_10-A1.png)
OWASP Top 10 - A01:2021 - Broken Access Control
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c32497e20ef212d0882d_OWASP_Top_10-A4.png)
OWASP Top 10 - A04:2017 - XML External Entities
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/648c453a2e58311bafd02845_TAC_Royal_Ransomware_Group_1.png)
Protocol Tunneling
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/648c45286f76cd78e7a6a0b5_TAC_Royal_Ransomware_Group_3.png)
Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c33ad1f6c9a99bb377c8_SSH_Authorized_Keys.png)
SSH Authorized Keys
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c079d9cffd9ef8a351ea_WeakLinkInTheSupplyChain_4.png)
Lateral Movement: Windows Remote Management
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0b5046b92b8127ae9b1_TAC_2022_Double_Dragon_2.png)
Persistence via Windows Services
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0b02fb9a4a0ef347129_TAC_2022_Double_Dragon_1.png)
System Binary Proxy Execution and a Spearphish Payload
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c01694fdd269537ab8e1_Server_Software_Component__Web_Shell.png)
Server Software Component: Web Shell
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c00d743e430cbf97f5f4_Scheduled_Task.png)
Scheduled Task
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c00494fdd269537ab6c9_Registry_Run_Keys.png)
Registry Run Keys
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6545fb16b2bd2202e5b7e77f_Defensive_Security_and_Cyber_Risk.png)
Defensive Security and Cyber Risk
In this course, you will learn the basics of defensive security and cyber risk. You will review foundational risk management concepts such as calculating risk and strategies for dealing with risk. You will also explore the NIST CSF as a framework for understanding defensive security.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64e8d5f3fee03974d0a7fff9_SC-300.png)
SC-300 Microsoft Identity and Access Administrator
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64e784d38835d8cfd88b476b_SC-200_cover.png)
SC-200 Microsoft Security Operations Analyst
Learn to reduce risk by rapidly remediating active attacks in your environment, advising on improvements to threat protection practices, and referring policy violations to appropriate stakeholders. You will get the most out of this course if you are familiar with Microsoft 365, Azure cloud services, and Windows and Linux operating systems.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64ca1595384202ef12d7cb0a_JumpStart_Quantum_Spark_1134x675.png)
Check Point Jump Start: Quantum Spark Network Security
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c10257915bfdaf94549d_Noobz_Course_Draft_Designs___45_.png)
Careers In Cybersecurity
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c2dabc42ab1b36f1c643_PT_and_EH.png)
Ethical Hacking Course & Training
Our ethical hacking course and training seeks to assess the strength of your organization’s cybersecurity posture, whereby you need to gather information, perform scanning and enumeration, and show how an adversary could hack into your systems. This ethical hacking course will give you those skills and prepare you for related certification exams so you can prove your capabilities.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64ca067210f57a2bd2b09b91_CIS_Control_5.png)
CIS Critical Security Control 5: Account Management
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/649857aa58d0e80e18596e10_CIS_Control_7.png)
CIS Critical Security Control 7: Continuous Vulnerability Management
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6496e44beca44e2335e4df12_CIS_Control_6.png)
CIS Critical Security Control 6: Access Control Management
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/648c454bf4c5c42bd609384e_TAC_Royal_Ransomware_Group_4.png)
Lateral Movement: Remote Desktop Protocol (RDP)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/648c45442e58311bafd0293e_TAC_Royal_Ransomware_Group_2.png)
Valid Accounts: Local Accounts
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/648c453a2e58311bafd02845_TAC_Royal_Ransomware_Group_1.png)
Protocol Tunneling
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/648c45286f76cd78e7a6a0b5_TAC_Royal_Ransomware_Group_3.png)
Exfiltration Over Alternative Protocol: Asymmetric Encrypted Non-C2 Protocol
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64709678a0cdd982242804a2_CIS_Control_3.png)
CIS Critical Security Control 3: Data Protection
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c1717d5c861ce9d59709_CompTIA_Security_.png)
Comptia Security+ Certification Prep
CompTIA’s Security+ is a globally recognized certification that equips IT professionals with cybersecurity principles and security best practices, and is often used as a requirement for entry-level cybersecurity positions. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c16e7d5c861ce9d596b1_AZ-104.png)
Microsoft Azure AZ-104 Certification Training
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3c57d5c861ce9d74868_BSWJ_NIKTO.jpeg)
How to Use Nikto (BSWR)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3c0276e5718758c0462_CISA.png)
CISA Certification Prep
ISACA’s Certified Information Systems Auditor (CISA) certification is for entry to mid-career professionals who want to understand the process of planning, executing, and reporting on risk-based auditing practices. This certification prep path is designed to provide you with a comprehensive overview of the concepts and skills you will need to pass the certification exam.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3bb7d5c861ce9d74645_OWASP_Top_10-A8.png)
OWASP Top 10 - A08:2021 - Software and Data Integrity Failures
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3b9b299c17024b849e6_OWASP_Top_10-A4.png)
OWASP Top 10 - A04:2021 - Insecure Design
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3b184b7c5e183af1a14_OWASP_Top_10-A9.png)
OWASP Top 10 - A09:2021 - Security Logging and Monitoring Failures
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/651d1d1484ca0164b68d3aa8_Challenge_MotorMayhem-cover.png)
Cybrary Challenge: Motor Mayhem
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/64e4de2da0db77446569f81d_Cybrary_Challenge_MemoryMysteries.png)
Challenge: Memory Mysteries
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c16cb299c17024b59f95_Cybrary_Challenge_Between2Numbers__1_.png)
Challenge: Between Two Numbers
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c145b299c17024b564cd_Cybrary_Challenge_SavingAFellowSpy.png)
Challenge: Saving A Fellow Spy
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c10557915bfdaf945a30_Cybrary_Challenge_SpaceMission.png)
Challenge: Space Mission
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0fbbc42ab1b36f038eb_Challenge_A_message_within_a_messageFront.png)
Challenge: A Message Within A Message
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0f7276e5718758a8efa_Noobz_Course_Draft_Designs___33_.png)
Challenge: Don't Believe What You Hear
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0ea57915bfdaf9435c2_Noobz_Course_Draft_Designs___24_.png)
Challenge: Chatting with ChatGPT
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0e6743e430cbf98971a_Noobz_Course_Draft_Designs___11_.png)
Challenge: Saving a Fellow Monster
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0cf94fdd269537b56ca_Noobz_Course_Draft_Designs___4_.png)
Challenge: Gobble Gobble Conceal & Deceive
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0c7d9cffd9ef8a38786_Nubion_Course_Draft_Designs___60_.png)
Challenge: For the Rebellion or the Empire
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0c294fdd269537b52b3_Nubion_Course_Draft_Designs___1_.jpeg)
Challenge: Update B4 It's 2Late
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0a2743e430cbf98687e_Nubion_Course_Draft_Designs___21_.png)
Challenge: MFA ... All Day Every Day
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c08fbc42ab1b36effab5_Challenge-Episode_II__Attack_of_the_Encoders.png)
Challenge: Episode II - Attack of the Encoders
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c087b299c17024b4aa51_Challenge-TheBase64ics_Updated_2.png)
Challenge: The Base(64)ics
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c08457915bfdaf93b6d0_Challenge-SpinyShell_Defense.png)
Challenge: Spiny Shell
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/66973cb0fd2eb3f9d1bef0f4_CVE_Jenkins_FileLeak.png)
CVE Series: Jenkins Arbitrary File Leak Vulnerability (CVE-2024-23897)
CVE-2024-23897 is a critical security flaw affecting Jenkins, a Java-based open-source automation server widely used for application building, testing, and deployment. It allows unauthorized access to files through the Jenkins integrated command line interface (CLI), potentially leading to remote code execution (RCE).
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/66973d0cb122053d5e0c9369_Screenshot_2024-02-14_at_2.30.49_PM.png)
CVE Series: “Leaky Vessels” Container Breakout (CVE-2024-21626)
CVE-2024-21626 is a severe vulnerability affecting all versions of runc up to 1.1.11, a critical component utilized by Docker and other containerization technologies like Kubernetes. This vulnerability enables an attacker to escape from a container to the underlying host operating system. Put on your red team hat to exploit this vulnerability.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/66973d3963ddd4eec74dbcb9_Screenshot_2024-01-23_at_9.13.43_AM.png)
CVE Series: Authentication Bypass in Apache Superset (CVE-2023-27524)
CVE-2023-27524 is a critical vulnerability in Apache Superset, affecting versions up to 2.0.1. It enables attackers to bypass authentication by exploiting weak or default SECRET_KEY values. Attackers can forge session cookies to gain admin access, leading to potential remote code execution and unauthorized data access.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/66973d2da7bc8a495c7b0ae0_CVE_Confluence_AuthVulnerability.png)
CVE Series: Confluence Authentication Vulnerability (CVE-2023-22515)
Confluence suffers from a Broken Access Control vulnerability that affects Data Center and Server versions 8.0.0 to 8.3.2, 8.4.0 to 8.4.2, and 8.5.0 to 8.5.1. Threat actors exploit this vulnerability to obtain administrator access to Confluence servers. Put on your Red Team hat to create your own malicious admin account leveraging this CVE!
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6513ebf77b017b05308e0de0_CVE_Openfire.png)
CVE Series: Openfire (CVE-2023-32315)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3be7d5c861ce9d746fc_Dirty_Pipe.png)
CVE Series: Dirty Pipe (CVE-2022-0847)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3a87d5c861ce9d743d3_Polkit.png)
CVE Series: Polkit (CVE-2021-4034)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3a04fd4b0c351affe22_Log4j.png)
CVE Series: Log4J (CVE-2021-44228)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c3454fd4b0c351afa16a_InstallerFileTakeOver.png)
CVE Series: InstallerFileTakeOver (CVE-2021-41379)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c327743e430cbf9b128c_MSHTML.png)
CVE Series: MSHTML Vulnerability (CVE-2021-40444)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c31184b7c5e183aeb00b_HiveNightmare.png)
CVE Series: HiveNightmare (CVE-2021-36934)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c305d1f6c9a99bb34162_PrintNightmare.png)
CVE Series: PrintNightmare (CVE-2021-1675 and CVE-2021-34527)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c2d5b299c17024b74311_Ghostcat.png)
CVE Series: Ghostcat (CVE-2020-1938)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0c584b7c5e183acdf53_CVE_BitbucketInjection.png)
CVE Series: Atlassian Bitbucket Command Injection (CVE-2022-36804)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0a4743e430cbf986aea_CVE_GrafanaDirectoryTraversal.png)
CVE Series: Grafana Directory Traversal (CVE-2021-43798)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c07dff95b6cfe7793143_CVE_ApacheHTTPD.png)
CVE Series: Apache HTTPD (CVE-2021-42013)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c0662fb9a4a0ef341925_CVE_ApacheSpark2.png)
CVE Series: Apache Spark (CVE-2022-33891)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c054743e430cbf981084_CVE_Django.png)
CVE Series: Django (CVE-2022-34265)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c051b61f6e49d4d331de_CVE_Follina.png)
CVE Series: Follina (CVE-2022-30190)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c04c94fdd269537ae639_CVE_ConfluenceRCE.png)
CVE Series: Confluence RCE (CVE-2022-26134)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468c002bc42ab1b36ef859c_CVE_Redis.png)
CVE Series: Redis (CVE-2022-0543)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468bffb7d5c861ce9d44585_Spring4Shell.png)
CVE Series: Spring4Shell (CVE-2022-22965)
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/648c705c2f22ab09544d2056_TAC_Royal_Ransomware_Group_0.png)
Royal Ransomware Group
Royal is a spin-off group of Conti, which first emerged in January of 2022. The group consists of veterans of the ransomware industry and brings more advanced capabilities and TTPs against their victims. Begin this campaign to learn how to detect and protect against this newer APT group!
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468f0eda0f0472902002a89_TAC_RaspberryRobin_Cover.png)
Raspberry Robin
Raspberry Robin is a malware family that continues to be manipulated by several different threat groups for their purposes. These threat actors (Clop, LockBit, and Evil Corp) specialize in establishing persistence on a compromised host and creating remote connections to use later. Once established, these C2 connections can be used for multiple purposes, including data exfiltration, espionage, and even further exploitation.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468f0eba6842502e45b6e83_TAC_Double_Dragon_2022_Cover.png)
Double Trouble with Double Dragon
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468f0e9d58b7dd3fb3797b3_WeakLinkInTheSupplyChain.png)
Weak Link in the Supply Chain
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468f0e7e5685ff7eca06b03_SpinningWebShell.png)
Spinning a Web Shell for Initial Access
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468f0e58adeabd92b1365ef_Exfiltration-and-Extortion.png)
Exfiltration and Extortion
Threat actors will use stolen data exfiltrated from victim systems to extort organizations. Once they gain a foothold, they delete critical system files and threaten to release the data or disrupt operations if the victims do not pay up. Understanding these techniques is vital to defending your organization from such attacks.
![](https://cdn.prod.website-files.com/63eef1be981a383fb127661f/6468f0e28d514f984c239b5a_Ran_omware_for_Financial_Gain.png)
Ransomware for Financial Gain
Threat actors continue to leverage ransomware to extort victim organizations. What was once a simple scheme to encrypt target data has expanded to include data disclosure and targeting a victim’s clients or suppliers. Understanding the techniques threat actors use in these attacks is vital to having an effective detection and mitigation strategy.
Our Instructors
Industry seasoned. Cybrary trained.
Our instructors are current cybersecurity professionals trained by Cybrary to deliver engaging, consistent, quality content.