0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

(Benefits of a CISSP Certification) What Are The Benefits Of Having CISSP-Certified Employees
By: Charles Owen-Jackson
September 17, 2021

With cybersecurity now being a critical enabler of innovation in the modern enterprise, leaders must make sure to have the necessary expertise on their side. Summary: *As cybercrime becomes increasingly widespread and difficult to manage, business leaders must overcome the acute skills shortage in this space. Enrolling employees in CISSP and other training programs boosts the prospects of long-term success and ...

How To Pass CCSP
By: Shelby Welty
September 16, 2021

Becoming a Certified Cloud Security Professional requires proficiency across six key domains that reflect today's security leaders' biggest challenges. Summary: *Certified Cloud Security Professionals are experts in implementing and managing secure cloud-based apps and data systems. Passing the exam requires proficiency across six domains, which reflect the most pertinent issues today's security leaders face. Here is an overview of what candidates ...

Creating A BYOD Policy
By: Nihad Hassan
September 16, 2021

The new trend of remote work is expanding rapidly to include all types of organizations in different industries. The COVID-19 pandemic has boosted remote work; although the pandemic begins to fade slowly, there is no sign that businesses are abandoning the remote work paradigm. BYOD is an acronym for Bring Your Own Device. It is the practice of allowing employees to ...

Difference Between Ethical Hacking And Cybersecurity
By: Jenn Barnabee
September 15, 2021

What is the difference between ethical hacking and cybersecurity? Ethical hackers often work with security teams to help them build proactive defense strategies, but there are important differences between these roles. Summary: *Ethical hacking is a rapidly growing trend at a time when proactive cybersecurity is top of mind for many business leaders. Certified ethical hackers routinely work with security leaders ...

How To Pass The CISM Certification Exam
By: Tatianna Harris
September 15, 2021

The Certified Information Security Manager (CISM) credential from ISACA is one of the most esteemed certifications in cybersecurity today. Achieving the designation demonstrates that an IT professional is qualified to create and manage security systems. The official exam for this high-level certification is challenging, having a 40-50% first-time fail rate. However, it is a certification that is worth working for. ...

How Does Ethical Hacking Work?
By: Prasanna Peshkar
September 14, 2021

It can be exhausting for infosec outsiders to know or understand a lot about ethical hacking: the exact meaning and how it works. This article will explain how ethical hacking works. Let us take a look. What is Ethical Hacking? Ethical hacking is known as the hacking of machines, systems, computer networks, or web applications by the hacking expert ...

How To Write Computer Viruses
By: Shimon Brathwaite
September 14, 2021

Computer viruses have risen in popularity as the main nuisance or security risk for a computer. One of the reasons cybersecurity has increased in demand is the growth in the number of computer viruses and other malware developed over the last several years. While getting caught up, it is easy to forget what a computer virus is made of; it ...

How To Earn A CCSP Certification
By: Will Carlson
September 13, 2021

Becoming a certified cloud security professional requires a minimum of five years’ experience in IT and proficiency across six cloud security domains. Summary: *The CCSP certification is the global gold standard for demonstrating cloud security expertise. Earning the certification requires at least five years of experience in the IT sector, including three in information security. The exam itself covers six domains ...

What Are The CEH Exam Requirements?
By: Sara Faradji
September 13, 2021

While there are no educational prerequisites for the CEH certification, successful candidates usually have a strong background in IT security. Summary: Although there are no formal educational requirements for taking the CEH exam, successful candidates typically have a strong background in software engineering, computer programming, or computer science. This blog examines what it takes to become a certified ethical hacker. Certified ...

Everything You Need To Know About OAuth 2.0
By: Nihad Hassan
September 10, 2021

Digital technologies have become integrated into all aspects of society; nowadays, people have become more dependent on technology than ever to conduct most of their daily tasks. According to dashlane, the average American internet user has 150 online accounts which require a password to secure them. This statistic was conducted in 2017; in 2022, the same study predicted the number ...