Profile Image

Joe Perry

Instructor

I am a cybersecurity researcher, software engineer, security analyst, and general jack-of-all trades. I’ve worked in Cybersecurity for most of a decade, fulfilling roles throughout the US Federal Government; primarily in the Department of Defense and Intelligence community.

See More

Joe Perry's Courses

Cover Img
Intro to Python
This is an introductory course on Python, giving students the ability to understand the language…
Certificate of Completion Offered
Course
Beginner
Cover Img
How to Use ExploitDB (BSWJ)
Maintained by Offensive Security (the organization behind Kali Linux), the ExploitDB is the most…
Certificate of Completion Offered
Course
Intermediate
Cover Img
Intermediate Python
Intermediate Python uses and builds upon the materials from Intro to Python, using the Python…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use TOR (BSWJ)
In this course we review some of the most powerful cybersecurity tools available for use ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use OllyDBG (BSWJ)
Welcome to Breaking Stuff with Joe, where we review some of the most essential cybersecurity ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use hping3 (BSWJ)
Ping is one of the oldest utilities in computing history. Nearly as old as the ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use binwalk (BSWJ)
In this course, you will learn the fundamentals of Binwalk, which is a popular analysis ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Automater (BSWJ)
In this course, you will hear an overview of Automater, which is an OSINT tool ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
Introduction to IT & Cybersecurity
In this free IT and cybersecurity introduction online course, you will learn about the four ...
Certificate of Completion Offered
Course
Beginner
Cover Img
How to Use Threat Connect (BSWJ)
In this video, we'll take a tour of the UI for the Threat Connect platform, ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use IDA (BSWJ)
The IDA is used throughout the IT and cybersecurity industries by exploit developers, vulnerability…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use John the Ripper (BSWJ)
John the Ripper is quite possibly the most famous password-cracking tool in the world. It's ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use tcpdump (BSWJ)
TCPDump is one of the best light-weight utilities for performing network traffic capture. It's…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use OpenVAS (BSWJ)
In this video, we examine one of the most popular open-source vulnerability scanning tools in ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use DNSMap (BSWJ)
DNS Map is a reconnaissance and evaluation tool used to identify all subdomains of a ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Crackle (BSWJ)
Crackle is a tool for breaking into ostensibly secure bluetooth communications, allowing the…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How To Use Cain & Abel (BSWJ)
Cain and Abel is specifically designed to target Windows systems and is capable of gathering ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use GDB (BSWJ)
The GNU Debugger (GDB) is one of the most commonly-used debugging tools in the world. ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use WinDBG (BSWJ)
The Windows Debugger (WinDBG, often pronounced 'Windbag') is an incredibly powerful tool for…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use NGrep (BSWJ)
Network Grep (NGREP) is a useful network analysis tool which performs operations based upon the ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Amap (BSWJ)
The application mapper (AMAP) is an information-gathering tool which allows the user to identify the…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Arp-Scan (BSWJ)
Arp-scan is a low-level network discovery tool used to associate physical (MAC) addresses to logical…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use APT2 (BSWJ)
The Automated Pentration Testing Toolkit (APT2), is an offensive program used to perform scans…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Armitage - Host Management (BSWJ)
Learn to use the hacking tool Armitage in order to perform network scans, import existing ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Armitage - Exploitation (BSWJ)
In this video, you'll learn to make use of the hacking platform Armitage in order ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Cisco-OCS (BSWJ)
In the world of networking, few names are so ubiquitous as Cisco. Cisco devices are ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to use SSLCaudit (BSWJ)
Enter SSLCaudit. SSLCaudit is an automated tool for testing SSL/TLS connections' vulnerability to…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use BeEF (BSWJ)
The Browser Exploitation Framework (BeEF) is a pentesting utility focused upon exploitation of and…
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Braa (BSWJ)
Braa is a mass SNMP-scanning tool used to identify and list all devices on the ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use CAT (BSWJ)
The Cisco Auditing Tool is a Kali utility used for scanning Cisco devices to identify ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use theHarvester (BSWJ)
Welcome to Breaking Stuff with Joe, where we explain some of the most useful cybersecurity ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
How to Use Armitage - Overview (BSWJ)
Armitage is best known as the world-renowned GUI frontend for Metasploit, but it's actually so ...
Certificate of Completion Offered
Course
Intermediate
Cover Img
Post Exploitation Hacking
In this self-paced online training course, you will cover three main topics: Information Gathering…
Certificate of Completion Offered
Course
Advanced

See More

About Joe Perry

I’m a graduate of the Joint Cyber Analysis Course, the Advanced Cyber Training Program, and the Computer Network Operations Development Program. I’ve offered consultation to organizations of sizes from 10 employees to tens of thousands of employees, and I’ve contributed to dozens of security curricula and training programs.

In my rare free time, I write tabletop and live action games, and manage events and gaming conventions. In the even more rare downtime between those events, I enjoy reading and rowing. In 2019 I’m working on a personal project to read 100 new books by the end of the year.

Join Cybrary's growing community of industry leaders!

The Cybrary Community is an integral part of our organization. Our platform is filled with instructors, industry professionals, mentors, published authors, and much more. By becoming part of the community, you not only have access to these resources, but can also learn and contribute to become the next leader in the industry. Become part of the team today!