About this Career Path

The foundational networking and security concepts taught in this career path form the backbone of any security professional’s knowledge base. Become ready to move onto topics in penetration testing, incident response, and many more while learning about the main job roles in the security industry.

Recommended Prerequisites

  • There are no specific prerequsites for this, but it is recommended that students have a basic knowledge of computers.
  • This is built for people breaking into Cybersecurity or transitioning from IT.

Once Completed You Are Ready To:

Claim Skills

  • Fundamentals of IT
  • Fundamentals of Cybersecurity

  • Basic Computer Networking
  • Basic Password Cracking
  • Network fundamentals

BEGINNER LEVEL

Entry level career

APPROX 1 MONTH

Study 3 hrs/week and complete in 1 month

PROGRAM STARTS SOON

Gain access to materials immediately

Learn about Cybrary's Career Paths

"The interviewer said the certifications and training I had completed on my own time showed that I was a quick learner, and they gave me a job offer"
- Justin B.
IT Specialist
"All of the knowledge, skills, and abilities gained through the program were essential to me impressing the employer during the interview"
- Gabby H.
Senior Security Analyst
"I got a job as a cybersecurity analyst at Radware with a salary I've never even dreamed about AND with no prior experience"
- Alexei Z.
Cybersecurity Analyst

Ignite Your Career with Cybrary

Learn Through Courses

A Career Path contains a series of courses taught by Cybrary's community of instructors. Our instructors are subject matter experts, thought leaders, and inddustry veterans that deliver relevant, high-quality content.

Practice Your Skills

Every Career Path includes guided virtual labs chosen to give you real world experience in key topics you are learning. With unlimited access to the labs, you can practice until you're confident in your abilities, all in a safe environment that is accessible from anywhere, at anytime.

Ignite Your Career Today!

Assess Your Knowledge

Practice Tests give you confidence that you really know the material through standard questions and advanced virtual labs to test your skills.

Earn a Certificate

When you finish every course and complete the hands-on project, you'll earn a Certificate that you can share with prospective employers and your professional network.

Feel confident you are learning with the best

After having helped grow the careers of 2.5 million cybersecurity professionals around the world and individuals from thousands of companies, be rest assured you are choosing the right program from a provider with the track-record to show for it.

video cyb icon

Work through a structured career path curated by experts and tied directly to popular industry job roles

virtual lab icon cyb

Use virtualized, hands-on experiences to learn by doing gaining practical, real-world skills

resume prep cyb icon

Track your progress as you move closer to your goal with each learning session

chat icon cyb

Be confident you’re ready for the next step of your career journey upon completion

We take a high-level overview of topics, like risk management, security policies, basic networking, password cracking, cryptography, malware, mobile security, and more. Students will start by learning fundamental topics in networking such as common network devices, TCP/UDP, Firewalls, and the Network Topology. From there, the student will be able to understand the importance of protecting data, as well as common practices and policies used by information security practitioners. Afterwards, students will receive an overview on various offensive security topics including malware, password cracking, sniffing, and more! This is a great for students transitioning from an IT role or students pursuing a full career change. This will expose the student to both offensive and defensive topics to help the student identify areas of interest. By the end, the student should have a high level understanding of the fundamental concepts and practices used by information security practitioners.