Skill Paths
Staying ahead in cybersecurity is all about keeping your skills and reflexes sharp. That’s why we’ve designed topic-specific learning pathways. With each Skill Path, you’ll test your abilities as you drill down into command line interfaces, network troubleshooting, vulnerability scanning, and much more.
Skill Development Tailored to Your Needs
Cybrary Skill Paths allow learners to focus their attention on a single topic within a Career Path. Each Skill Path follows our Learn, Practice, Prove model and includes different activity types aligned to key topics within the path’s security domain.
As you learn a skill, your progress will be measured in real-time using Experience Points (XP), which serve as a comprehensive capability score for each topic. Upon completion, you will be rewarded with a shareable digital badge via Credly.
Everything You Need to Succeed
Upgrade to Cybrary Insider Pro or Cybrary for Teams to gain full access to our Skill Paths.
Application Attacks
Application Attacks exploit weaknesses in application security as an attack vector This skill path is designed to provide you with a general understanding of Application Attacks in the context of a Penetration Tester work role.
In this skill path, you will learn the basics of Application Attacks for Penetration Testers, Injection Attacks, SSRF Attacks, Deserialization Attacks, and API Attacks.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a Penetration Tester. Upon completing this skill path, you are encouraged to enroll in the complete Penetration Tester career path.
Evasion
Evasion is the process of avoiding detection by defensive security controls during an engagement. This skill path is designed to provide you with a general understanding of Evasion in the context of a Penetration Tester work role.
In this skill path, you will learn the basics of Evasion for Penetration Testers, Identifying Ingress and Egress Rules, Evading Microsoft Defender Antivirus, and Bypassing Web Application Firewalls.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a Penetration Tester. Upon completing this skill path, you are encouraged to enroll in the complete Penetration Tester career path.
Network Attacks
Network Attacks exploit weaknesses in network security as an attack vector. This skill path is designed to provide you with a general understanding of Network Attacks in the context of a Penetration Tester work role.
In this skill path, you will learn the basics of Network Attacks for Penetration Testers, the Metasploit Framework, Network Sniffing, and Tunneling and Pivoting.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a Penetration Tester. Upon completing this skill path, you are encouraged to enroll in the complete Penetration Tester career path.
Reconnaissance and Enumeration
Reconnaissance and Enumeration is the process of researching and gathering information about a target. This skill path is designed to provide you with a general understanding of Reconnaissance and Enumeration in the context of a Penetration Tester work role.
In this skill path, you will learn the basics of Reconnaissance and Enumeration for Penetration Testers, OSINT, Network Reconnaissance, and Local Host Enumeration.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a Penetration Tester. Upon completing this skill path, you are encouraged to enroll in the complete Penetration Tester career path.
Network-Based Detection
Network-Based Detection extends the Log Analysis skillset to detecting suspicious events in the context of network communications. This skill path is designed to provide you with a general understanding of Network-Based Detection in the context of a SOC Analyst work role.
In this skill path, you will learn about the basics of Network-based Detection for SOC Analysts, Network Observables, Web Activity logs, and analyzing one of the most common attacks that a SOC Analyst will encounter - Spearphishing.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a SOC Analyst. Upon completing this skill path, you are encouraged to enroll in the complete SOC Analyst career path.
Host-Based Detection
Host-Based Detection extends the Log Analysis skillset to detecting suspicious events in the context of servers and workstations. This skill path is designed to provide you with a general understanding of Host-Based Detection in the context of a SOC Analyst work role.
In this skill path, you will learn about the basics of Host-Based Detection for SOC Analysts, Endpoint Detection and Response (EDR) tools, execution and persistence in Windows, and local and domain-based authentication in Windows.
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a SOC Analyst. Upon completing this skill path, you are encouraged to enroll in the complete SOC Analyst career path
Log Analysis
Log Analysis is the process of reviewing and interpreting the log files generated by an IT ecosystem. This skill path is designed to provide you with a general understanding of Log Analysis in the context of a SOC Analyst work role.
In this skill path, you will learn the basics of log analysis for SOC Analysts, Windows Event Logs, and different aspects of Security Information and Event Management (SIEM).
Completing this skill path and the associated Assessment will prepare you for pursuing a career as a SOC Analyst. Upon completing this skill path, you are encouraged to enroll in the complete SOC Analyst career path.
Scripting and Programming Fundamentals
Learn the basics of widely used scripting and programming languages. This skill path is designed to provide you with a general understanding of Scripting and Programming Fundamentals in the context of IT & Cybersecurity Foundations.
In this skill path, you will learn about BASH, PowerShell, and Python.
Upon completing this skill path, you are encouraged to enroll in the complete IT and Cybersecurity Foundations career path.
Cybersecurity Fundamentals
Learn the basics of cybersecurity. This skill path is designed to provide you with a general understanding of Cybersecurity Fundamentals in the context of IT & Cybersecurity Foundations.
In this skill path, you will learn about several key cybersecurity concepts and technologies, including cryptography, access control, backup and recovery, patching, antivirus, firewalls, intrusion detection systems, and vulnerability scanners.
Upon completing this skill path, you are encouraged to enroll in the complete IT and Cybersecurity Foundations career path.
Network Fundamentals
Learn the basics of communications and networking. This skill path is designed to provide you with a general understanding of Network Fundamentals in the context of IT & Cybersecurity Foundations.
In this skill path, you will learn about the OSI and TCP/IP reference models, IP addressing, network devices, Wireshark, Nmap, VPNs, and network troubleshooting.
Upon completing this skill path, you are encouraged to enroll in the complete IT and Cybersecurity Foundations career path.
Expertly Curated Skill Paths
Our Skill Paths are intentionally designed to keep you motivated, on track, and achieving your goals.
On-Demand Learning
Learn anytime, anywhere from industry leaders and subject matter experts.
Hands-On Practice
Learn by doing with live operating systems and real security tools in our on-demand lab environment.
Community of Mentors
Gain access to mentors through our supportive community of cybersecurity professionals.
Assess Your Skills
Our baselining metrics provide detailed insight into your growth and development.
Earn Credly-Certified Badges
Upon completing a Skill Path, you’ll automatically earn an industry-recognized badge to share with your current or prospective employer.