Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 14, 2019
By: Tatianna
212

Is Linux Worth Learning in 2020?
Linux is a popular, open-source operating system originally designed as a cheaper UNIX alternative. With the ability to quickly deploy stable, secure, and agile servers across virtualized environments, it quickly became the OS of choice for many IT professionals. But the rise of more user-friendly alternatives such as Windows has pushed Linux into a largely supporting role. Combined with a greater focus on mobile-friendly app development and the rise of cloud-based enterprise ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 12, 2019
821

By: jasminen
Microsoft remains the desktop OS leader. More than 75 percent of personal and business devices worldwide run some form of Windows, and more than 30 percent now run Windows 10. As a result, Microsoft training and certification remain both popular and profitable; the sheer number of Windows-based business deployments creates a massive pool of j ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 10, 2019
1273

By:
This blog was posted by Thycotic Security. Virtually any time you recommend a technology purchase, like Privileged Access Management software, your boss, executive management, and the finance department want to know the cost. Before you reach for your calculator, it’s important to identify the total cost of PAM ownership as clearly as you c ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 8, 2019
By: SLWelty
1651

How Do I Get into Android Development?
Android applications are everywhere; recent data shows more than 2.4 million apps1 on the Google Play store, and companies worldwide are now adopting Android development strategies to help bolster their brands and deliver mobile-first experiences to consumers. As a result, skilled developers are in demand across both startup first and established enterprises. From coding and testing to design and security, there are massive market opportunities for trained Android developers ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 6, 2019
By: GarrettsG2
2765

What is the Lean Six Sigma Yellow Belt – and is it Worth Earning?
Efficiency matters. As IT projects and deployments become more complex, organizations need strategies to limit overspend and improve ROI – 76 percent of CIOs1 surveyed say that complexity already makes it “impossible” to manage performance. Begin Lean Six Sigma Yellow Belt Course >> And while IT professionals are naturally inclined to streamline processes and practices where applicable, businesses are looking for proof of concept with certifications such as the Lean S ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 2, 2019
3767

By: jasminen
This blog was originally posted on Cisco Security Blog by author Ben Nahorney. Reposted with permission. Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. W ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 22, 2019
6248

By:
For too long, cybercriminals have been raking in billions of dollars from businesses around the globe through the use of crypto-ransomware. This is a specific type of ransomware that uses encryption technology to ‘scramble’ the data of its victims. The victim is then instructed to pay a ransom, by a specific deadline, to have their data d ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 21, 2019
By: SLWelty
6093

Get on Thycotic’s nice list for 12 days of Privileged Access Management Giveaways
This blog was posted by Thycotic Security. It’s time to make sure you’re on your best behavior because Thycotic is coming to town! We’re kicking off our annual 12 Days of Thycotic contest and we want to make sure you’re on the list to receive 12 days of gifts and resources. This year, from Tuesday, December 3rd to Wednesday, December 18th, we’ll be sending out free goodies just for you. Every day, for 12 days, you’ll have a new InfoSec gift to unwrap, designed to ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Is Linux Worth Learning in 2020?
Views: 212 / December 14, 2019
How do I Get MTA Certified?
Views: 821 / December 12, 2019
How much does your PAM software really cost?
Views: 1273 / December 10, 2019
How Do I Get into Android Development?
Views: 1651 / December 8, 2019

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel