0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

More and more businesses are moving their work online. There’s no better example of this need than 2020 and the massive shift in working from home during a worldwide pandemic. Workers across the planet are using cloud-based technologies to download and work remotely. Businesses can solve their unique market challenges using cloud technologies, but they need developers to create ...

"Azure Functions" Course Review

By: Makeia Jackson
July 3, 2020
Are you new to the Microsoft Azure cloud and need to know about Azure Functions? Maybe you have heard of Azure but work with AWS, GCP, or some other cloud computing service? Whichever one it may be, Cybrary has you covered. In their one-hour course, you will learn how to develop Azure Functions. Cybrary's instructor Toddy Mladenov will cover ...
This blog was originally authored by Dr. Gee Rittenhouse and reposted with permission. For some time, we have been talking about how the digital transformation would be an accelerant that would cause companies to rethink old models, customer experiences and the workplace. It was always thought to be a milestone in the future that businesses would take incremental steps towards. ...
The number of certified cybersecurity professionals is not growing to meet demands, as an estimated three and a half million cybersecurity positions will go unfilled by 2022. The lack of talent to hire is not the only threat companies face when staffing for cybersecurity. Retaining cybersecurity talent is a new challenge, and traditional retention strategies often do not work ...

Managing Team Dynamics in Cybersecurity

By: Dr. Edward Amoroso
July 1, 2020
How winning at team dynamics facilitates stronger cybersecurity leadership > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Among the most pervasive misconceptions about cybersecurity is that it’s purely the domain ...

The Path to Cyber Security

By: Tahir Ibrahim
July 1, 2020
Do you want to get into Cyber Security, but not quite sure where to start? What routes to take? What help is out there to venture on to this path? Well, read on as this blog will outline just that. It can be a confusing time to choose the right training providers, which courses to start from, and who to use, ...

"Azure Policies" Course Review

By: Makeia Jackson
July 1, 2020
Companies hosting their hardware, software, and servers are slowly but surely becoming something of the past. Businesses are increasingly relocating their mission-critical infrastructure into the cloud. With this move, they transfer some of their security, risk, and compliance responsibilities to cloud service providers like Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Salesforce, to name a few. Azure ...
Could you go back years ago to a time where you could not send emails and text messages, or post online? It feels strange to imagine one's life without all these things, most importantly, without the internet that makes it possible. So, what is the Internet? The Internet is a worldwide system of connected computer networks, "a network of networks, ...
False promises It all started when high tech became cool. When it suddenly was possible to brag with one’s computer in “normal” social circles. Similar to the late seventies and early eighties, when showing a pair of Macintosh mono amplifiers, coupled with Nestorovic Labs New Yorker speaker boxes (that together cost as much as a Porsche), to one’s friends was ...
Overview: Cybrary’s course on Privileged Access Management (PAM) Fundamentals is a solution that helps any organization to use an existing Active Directory environment to restrict privileged access. It is a Beginner level course with no prerequisites required. This course covers all phases of the PAM in detail and shows how they’re applied in real-world situations. In this course, you will ...