Cybrary’s Cyber Security Blog

Cybrary’s official company blog.

You’ll find official announcements and other news and stories from the team and our friends in the cyber security industry. The product is evolving at a rapid pace, check back for product updates.

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATION
Already a Member Login Here
December 14, 2018

How Haaz Skipped the Entry-Level Job and Shattered the “No Experience” Barrier

Author: slwelty
 3509

Haaz is an Insider Pro member who used Cybrary to successfully change career fields. Prior to Cybrary, Haaz encountered many adversities when applying to entry-level jobs with little to no experience. Cybrary’s online learning community gave Haaz ...

December 8, 2018

All •Cybrary LIVE courses are FREE to attend Monday 12/10 and Tuesday 12/11

Author: TREVORH
 873

  Monday and Tuesday, December 10th and 11th, we are offering •Cybrary LIVE courses FREE to all users! For these two days only, you can attend any live course to experience the power of the unlimited access Insider Pro and Enterprise member ...

December 6, 2018

Balancing Network Risk and Cost by Scale

Author: cyberwriter
 664

It is not always an easy task determining which approach and what amount of resources are necessary to secure networks from cyber attacks. Protecting important information is essential when resources are at risk, but there are wasteful approaches ...

December 4, 2018

LAN Turtles and Hardware-Based Network Reconnaissance

Author: Tatianna
 764

There are a countless number of ways to monitor a network, and often times this means gathering target information and using software to perform reconnaissance. The software is used in acquiring a host target within an organization, extracting inf ...

November 28, 2018

Success Series: 20% Pay Raise. 2 Cybersec Masters Programs Offers. 1 Determined IT coordinator.

Author: Sam Pollard
 3368

Nuno Filipe Romão Pereira lives in Portugal and works in Lisbon as a System Administrator and IT department Technical Coordinator. After a few months as a Cybrary Insider Pro, he experienced some amazing results from his career development studies ...

November 28, 2018

IT in the C-Suite, Part 1: What is a CISO?

Author: Tatianna
 983

IT in the C-Suite, Part I: What is a Chief Information Security Officer? Technology equals opportunity for enterprises: The opportunity to attract new customers, increase efficiency and drive greater revenues. The problem? Technology also presents an ...

November 19, 2018

Access Buildings with Social Engineering

Author: Tatianna
 1464

Social engineering has always been a strange topic. If there’s something posted online about it, it’s either boring and no-one wants to read it, or it’s misconstrued as a “here’s how you can perform social engineering” t ...

November 15, 2018

New to Cybrary: Joe Perry

Author: Tatianna
 1629

New to Cybrary: Joseph Perry One of the newest members to the Cybrary team is Joseph Perry. You may have already seen his Python for Security Professionals course, but we want to introduce you to the SME behind the course and why Joe is an important ...

November 11, 2018

Is your cell phone under surveillance?

Author: cyberwriter
 2057

Cellphones have become a ubiquitous influence in many individuals’ lives. And although every cell phone owner walks around with a device in their pocket – or in hand – that is capable of tracking their location and transmitting a wide r ...

November 5, 2018

Career Change From Military Logistician to I.T. Specialist – Success Series

Author: cybergary
 7854

Justin B. is an Insider Pro member who chose to make a change in his career path, and made it happen with his own motivation, determination, and ambition.  Here’s his success story, in his own words: Where to start, it has been a crazy y ...

November 5, 2018

Spoofing: RFID and SMS

Author: Tatianna
 2216

Spoofing, in Simple Terms First, let’s start with a definition – What is Spoofing? According to ForcePoint, “Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing c ...

November 3, 2018

Task Automations on MacOS – AppleScript

Author: cyberwriter
 1300

AppleScript (AS) is not a name frequently used in cybersecurity. This specific language is based on JavaScript and is used exclusively for automation tasks within the Mac OS. AppleScript can be used to move and click a mouse, enter text, resize windo ...

November 1, 2018

New to Cybrary: Ken Underhill, Master Instructor

Author: Tatianna
 1706

New to Cybrary: Ken Underhill, Master Instructor One of the newest members to the Cybrary team is Ken Underhill, CEH, CHFI. You may have already seen his new Ethical Hacking course which launched a few weeks ago, but we want to introduce you to the S ...

October 31, 2018

“I smell a rat!” – AhMyth, not a Myth

Author: Tatianna
 1339

Remote access trojans and remote administration tools were originally developed to access, surveil, and control traditional computing devices like laptops and desktop computers. However, these tools have naturally evolved to work with more modern co ...

October 30, 2018

MCSA or Network+ — Which Offers the Biggest Benefit?

Author: Tatianna
 1128

MCSA or Network+ is on the list of the most asked questions in Cybersecurity. Depending on the path you choose, or job you’re interested in, the answer of which offers the best benefits might surprise you. Let’s dig in, shall we? The IT ...

October 27, 2018

Cyber Security Hardware Tools

Author: Tatianna
 1646

When learning about modern cybersecurity tools and techniques there is often an emphasis placed on software tools and programs used to gather information, compromise devices, and gain access to restricted features and functions. However, there exists ...

October 24, 2018

Certification Showdown: MCSA vs CCNA

Author: Tatianna
 1111

Certification Showdown: MCSA vs CCNA, Who Wins? IT budgets are on the rise as companies look to bolster technology teams and drive business outcomes. As noted by ZDNet, predicted budgets for 2019 are on-track for 10 percent increases over this year ...

October 22, 2018

Successful Security isn’t from Tools – Here’s Why!

Author: cyberwriter
 1229

The Opportunity for Successful Security Lies In Automation And Consolidation, Not More Tools In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision ...

October 18, 2018

Solving Security Problems: Are Hodgepodge Solutions the Answer?

Author: cyberwriter
 1474

Firms Throw a Hodgepodge of Solutions at Security Problems In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results ...

October 16, 2018

Reconnaissance and Surveillance: Keyloggers

Author: cyberwriter
 1358

An important tool for reconnaissance and surveillance, the keylogger is a program that records keystrokes on a device and maps them to a log. By reviewing this log, one can collect a wide range of useful and important information. As users enter thei ...

October 15, 2018

Overconfidence Leaves Firms Exposed to Security Risk

Author: cyberwriter
 1517

In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results as a Forrester Opportunity Snapshot titled “Don’t Just ...

October 9, 2018

Making the Case for Virtualization

Author: Tatianna
 1070

Virtual Value — The Business Case for Virtualization Management The market for virtualization is growing: Recent predictions suggest steady growth in the data virtualization market over the next four years to more than four billion dollars, even as ...

October 1, 2018

Cloud Computing and Virtualization

Author: Tatianna
 1543

Building Blocks: The Virtual Foundation of Effective Cloud Deployments Cloud computing is everywhere. From business networks to social services to the burgeoning IoT market, this former tech outlier is the now the go-to option for companies looking ...

September 27, 2018

Gaining Root Access on Mac OS

Author: Tatianna
 2325

Apple computers are coveted as one of the world’s most valuable brands for a reason. Their computers are stylish, easy to use, and are owned and displayed as status objects across the world. However, one feature Apple computers ar ...

August 22, 2018

CISM Certification: What’s the Benefit, and Why Does it Matter?

Author: Tatianna
 4309

Get CISM Certified: The benefits and meaning There aren’t enough information security professionals to go around. That’s the word from a recent ISACA report, which found that 60 percent of organizations had open security positions which took on ...

August 19, 2018

Notable Malware Attacks and Security Vulnerabilities

Author: jessicapierre
 6421

Computer and Internet technologies have gone through amazing trends and developments that have always made headlines in the news since they’ve been around over the past several decades. With the way that these technologies have made everyday tasks ...

August 19, 2018

What is Firmware?

Author: jessicapierre
 3470

Computer-savvy or not, anybody who has ever touched a computer has heard the terms “software,” “hardware,” “adware,” “spyware,” and “malware,” whether it be from the news, the Internet, or everyday conversation. There’s another ...

August 17, 2018

Done for You: Comprehensive Collection of Pentesting Content

Author: ginasilvertree
 4883

Pentesting students on Cybrary are busy (as are all Cybrarians). Every day, there’s so much to do and learn! So, I took a little time (okay, a lot of time) to search the mysterious corners of the Cybrary site to put together this collection of pent ...

August 14, 2018

CISM Training: Specific Use Cases

Author: Tatianna
 2907

CISM Training: Specific Use Cases Data breaches are getting worse. As noted by The Spectator, recent data suggests more than 140 million records are lost or stolen every month, while worldwide losses due to attacks such as business email compromise ( ...

August 12, 2018

What is Multi-Factor Authentication?

Author: jessicapierre
 3010

Passwords used to be the be-all and end-all of account protection. As long as your password was long enough, unique enough, and complicated enough with a good mix of upper and lower case letters, numbers, and symbols, it was practically crack-proof. ...

August 10, 2018

ITIL Certification: Your Path to High Paying Jobs

Author: cyberwriter
 4396

The Industry & The Problem: In the dynamic and rapidly changing IT industry, if you do not upgrade your skills regularly you would soon become irrelevant to your organization, or even to the industry as a whole. There is a huge demand for many c ...

August 9, 2018

Moving Up: How to Become an Intermediate SOC Analyst

Author: ginasilvertree
 4920

If you’ve worked as an entry-level SOC Analyst, you’ve likely performed many of the following tasks in this jack-of-all-trades cyber position: Provide threat analysis and security logs for security devices Analyze and respond to hardware and s ...

August 8, 2018

Navigating a Security Wasteland: Cloud Security

Author: kathiemiley1
 4775

Vol.3 Navigating a Security Wasteland: Cloud Security Cybersecurity has grown into a never-ending war between cyber thieves and their victims. These cyber thieves exploit network and user vulnerabilities to steal valuable information or cripple organ ...

August 7, 2018

Zero to Employed in 3 Months – Success Series

Author: Tatianna
 61404

This success story takes you on one Cybrary Insider Pro’s journey. She had no experience, decided to change industries, and eventually became a Security Analyst at one of the world’s most prestigious consulting firms. The Journey: Healthc ...

August 2, 2018

Should You Become a Cyber Security Engineer?

Author: ginasilvertree
 4757

These days, many people are asking themselves whether they should become cyber security engineers. As cyber jobs increase exponentially and thousands of cyber positions remain open, it’s a good time to ask this question. In this p ...

July 29, 2018

Modems vs. Routers

Author: jessicapierre
 3354

If you’ve ever had to go through the process of moving into a new house, then you may be familiar with one of the tasks that come with the moving process: setting up Internet service in your new home. Most people just call their internet service pr ...

July 29, 2018

Bluetooth Security Risks

Author: jessicapierre
 3094

If you’re a heavy Bluetooth user, then you’re more than familiar with how much easier it makes everyday life. It’s pretty much a multi-task facilitator. With this technology, you can make hands-free phone calls while driving, allowing you to wa ...

July 22, 2018

Web Designer, Web Developer, UX Designer, and UI Designer: What’s the Difference?

Author: jessicapierre
 892

The Web has done a lot to transform the way we live over the years. It has changed the way that we work and communicate. Although many businesses still work with data in a hard-copy form, much of it is stored in online databases, with employees at va ...

July 22, 2018

What is Bluetooth?

Author: jessicapierre
 1338

Have you ever been on your smartphone, gone to Settings, and seen a setting option that allows you to turn Bluetooth on or off, but you don’t exactly know what Bluetooth is? Maybe you’ve also wondered if it’s similar to Wi-Fi, and if it is, the ...

July 18, 2018

Interview Guide: Network Engineer

Author: Thomas Callahan
 1882

Architecting Success: The Network Engineer Interview Network engineers are in high demand as companies push for faster, more comprehensive digital transformation across all aspects of IT. From the integration of mobile devices to managing the interac ...

July 17, 2018

Pocket-Guide for the Penetration Tester Career Path

Author: ginasilvertree
 3637

In this pocket-guide, we’ll cover the key elements of building a strong Penetration Tester career path. How does penetration testing fit into today’s business security landscape? As hackers’ methods continue to evolve through the use of new, so ...

July 15, 2018

What is the IoT?

Author: jessicapierre
 1673

Have you ever felt so bombarded and overwhelmed by gadgets, devices, and computers that you felt like you wanted to just “unplug” from the world for a moment? Well, nowadays, if you want to do that, it may take more effort than it did in the past ...

July 15, 2018

What is an API?

Author: jessicapierre
 989

While many computer users do not know what an application program interface or API is, all of them indirectly interact with and benefit from them every day in the applications and devices they use. As indicated by its name, an application programming ...

July 13, 2018

Interview Guide: Cyber Security Engineer

Author: Tatianna
 2445

Locking Down the Job: Your Cyber Security Engineer Interview Guide Companies are looking for skilled cyber security professionals. The challenge? These experts are getting harder and harder to find. As noted by data from NC Tech, there are now more t ...

July 11, 2018

Become a Certified Systems Administrator

Author: cyberwriter
 1915

Are you looking for an IT/Cyber Security career? Do you enjoy working with hardware and software? Are you curious about connecting various devices, computers, and controlling the way they communicate with one another physically and on a network? If ...

July 10, 2018

Keeping Score with Digital Resilience

Author: jessicapierre
 1671

What is Digital Resilience, and Why is it a Business Priority? As much as everyone hates to think about this, it is a reality that we all must face: cyberattacks are not going to stop, and everyone is a target. It may even be safe to say that any per ...

July 8, 2018

What is Artificial Intelligence?

Author: jessicapierre
 2428

Artificial intelligence, or AI, has long been portrayed in entertainment like films and television shows as human-like robots that are either serving humans or taking over the world. Those portrayals, however, are actually over-generalizations that f ...

July 6, 2018

Can You Picture Yourself Becoming a Network Engineer?

Author: ginasilvertree
 1317

Can you picture yourself becoming a Network Engineer? If  yes, why is that? Well, it might just feel right (which is awesome), but let’s start by exploring and articulating some data and facts that might support your potential “whys” for pursu ...

July 5, 2018

What Does a Security Engineer Do?

Author: cyberwriter
 1113

What do Security Engineers do? Working in the information security realm comes with a lot of advantages. With nearly everything having a digital component these days, the career opportunities in this industry are plentiful. As we continue to rely on ...

July 1, 2018

Types of DoS and DDoS Attacks

Author: jessicapierre
 3120

Out of all the numerous types of cyberattacks, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are probably among the most vicious. That’s because they can cause an exceptional amount of damage, especially long-term damage, ...

July 1, 2018

Common Types of Cyberattacks

Author: jessicapierre
 1435

Cyberattacks are running rampant today. It’s like an epidemic, with one major attack after another making headlines in national and worldwide news. These threats attack individuals and organizations, with mass attacks on organizations being especia ...

June 29, 2018

Micro Handbook for SOC Analyst Career Path

Author: ginasilvertree
 7659

In this micro handbook, we’ll cover the key elements of building a solid SOC Analyst career path. In a broad sense, security analysts help keep computing safe and work to protect computer users from loss, harm and other sorts of damage. They’re s ...

June 28, 2018

Why Become a Network Engineer?

Author: Tatianna
 1511

Courtesy of Pinterest Technology continues to change and improve, evolving faster and faster as it advances. Along with it, careers in the information technology industry also continue to grow. As a network engineer, you will be in the heart of the t ...

June 24, 2018

What is a Corrupted File?

Author: jessicapierre
 1362

At some point or another, every computer user has tried opening up a file on his device only to see a message that says “The file you are trying to access is unavailable or has been corrupted.” This may understandably alarm some users, as a “co ...

June 24, 2018

What is Open-Source Software?

Author: jessicapierre
 1416

With the never-ending releases of web applications and tools like Internet browsers, browser add-ons, and file-sharing systems, you may have heard the term “open source” get tossed around a lot. But what exactly does open source mean, and how doe ...

June 20, 2018

Is Network Engineering a Good Career?

Author: Tatianna
 5738

Demand for employees in the information technology (IT) industry, including network engineers, is soaring while the supply of candidates is running low. In fact, according to Forbes, in 2015, the job postings in IT went up 74 percent over the previou ...

June 17, 2018

What is Spyware and How Can I Prevent It?

Author: jessicapierre
 1056

There are eyes everywhere. Between the security cameras that businesses set up around their locations and virtually everyone having a camera phone, every person out in the public is on display in some way, shape, or form. Whether it’s in a grocery ...

June 17, 2018

How Credit Card Numbers Get Stolen

Author: jessicapierre
 3575

It seems like most people care for carrying around cash anymore, especially younger people like teenagers. But with the endless conveniences that those little pieces of plastic called credit cards offer, who still wants to bother with physical money ...

June 10, 2018

Are Your Home Security Cameras Safe?

Author: jessicapierre
 2928

You need to have eyes everywhere. With the countless sources of danger that exist everywhere from the grocery store to the park, you have to constantly remain alert and watchful. This is especially true for many when it comes to their homes, the pers ...

June 10, 2018

Which Image File Format Should I Use, and When Should I Use It?

Author: jessicapierre
 963

Whether you’re a website developer or an everyday person who occasionally uploads and shares pictures or makes scrapbook graphics, at some point, you’ve been presented with the task of having to save an image in some type of file format of your c ...

June 7, 2018

Hack Your Way to a Rewarding and Challenging Pentesting Career

Author: StevenE
 2299

What is hacking? Hacking though has negative connotations; it just means understanding the functioning of computer systems, and taking control of them, so they listen and act to your commands as against the original purpose for which they have been c ...

June 5, 2018

Unpacking the Interview – SOC Analyst

Author: Tatianna
 3954

So you’re considering a career as a security operations center (SOC) analyst. You’re not alone — with more than 350,000 unfilled cybersecurity positions in the US and a predicted IT skills gap of more than 3.5 million open jobs by 2021, potenti ...

June 3, 2018

What is Social Engineering?

Author: jessicapierre
 1469

Social engineering (SE) sounds like some kind of futuristic, scientific experiment, but the core of it is very simple to understand. Social engineering is the art and skill of psychologically manipulating people to take a certain course of action or ...

June 3, 2018

Public Wi-Fi: Should We Use It?

Author: jessicapierre
 9028

The Internet is everywhere now. Gone are the days of having to go to a library to do online research. Also gone are the days of having to wait until you got home to get on the Web, which involved unplugging a telephone line to set up your dial-up Int ...

May 30, 2018

Interview Prep: Penetration Tester

Author: Tatianna
 2679

Penetration testers are now a critical part of effective, secure IT. As noted by Info Security Magazine, good pen testers are now few and far between as the cybersecurity skills gap widens and the sheer volume of malicious attacks increase. What’s ...

May 30, 2018

Get Certified for a Red Hot Cyber Security Career

Author: camiragano
 1223

“The global average cost of a data breach is $3.62 million in 2017, “reports the 12th annual data breach study by Ponemon Institute. The increasing number of data breaches resulting in loss of money and reputation question the very existence of c ...

May 27, 2018

Blockchain: Not Just for Digital Currency

Author: jessicapierre
 1851

The word “blockchain” sounds self-explanatory in meaning, but there’s so much more to the term that comes down to one thing: decentralization. Centralized systems have been natural parts of our everyday lives for ages. For any matters involving ...

May 27, 2018

Keep Your Children Safe Online With Parental Control Apps

Author: jessicapierre
 954

Well before the surge of smartphones and mobile apps, and even before the age of the Internet in the nineties, keeping your children safe was a major responsibility, but it was pretty straightforward compared to how it is now. Back in the day, you to ...

May 20, 2018

Ways to Check If You’re Visiting a Safe Site

Author: jessicapierre
 2167

We spend so much time on the Internet today shopping, filling out forms, and paying bills. After a while, all of these sites start to look the same. Since they all look the same, many of us figure that as long as nothing looks out of the ordinary on ...

May 20, 2018

Pros and Cons of USB Flash Drives

Author: jessicapierre
 6670

Data storage has come a long way. Before computers were accessible and affordable to the general public, people would have to travel with bulky books and piles of notes for work and personal projects. When computers became more widely used, data stor ...

May 13, 2018

Protecting Your Online Information with Encryption

Author: jessicapierre
 1762

With the recent rash of online security incidents that include data breaches and ransomware attacks, one thing has become clear: no information online is safe. If major entities like the email provider Yahoo!, the credit bureau Equifax, and software ...

May 13, 2018

Has Your Email Been Hacked?

Author: jessicapierre
 2450

Back in the day, people used to anxiously wait for the mailman to drop off mail in their residential mailboxes. Instead of waiting by the mailbox, people now constantly refresh their email apps to check for new messages in their electronic mailboxes. ...

May 6, 2018

Is Your Information on Mobile Health Apps Safe?

Author: jessicapierre
 1585

Everything you want or need is at your fingertips with mobile devices today. You can buy groceries online and play music with the sound of your voice with smart speakers like Amazon’s Echo. This power has given people more control over their lives, ...

May 6, 2018

How to Keep Your Mobile Device Safe from Online Attacks

Author: jessicapierre
 2269

When most people hear “anti-virus program” and “anti-malware,” they instantly think of desktop and laptop computers. As desktops and laptops have become life-changing mainstays in the office and home over the past 20 years, the need for prot ...

May 3, 2018

Advance Your SOC Career

Author: Tatianna
 1402

The Education/Experience Balancing Act: Advancing Your SOC Career Hard numbers make it clear: The cyber security skills gap is real — and growing. By 2020, estimates suggest an infosec shortfall of almost two million IT professionals as companies l ...

May 2, 2018

How to Secure Small Businesses

Author: Tatianna
 1944

Secure Your Small Business With Affordable and Practical Cyber Security Training “Cyber security education and training should be free for everyone, especially for small businesses,” suggested the witnesses who testified before the Senate small b ...

April 27, 2018

State of the Market: The SOC Analyst Career Track

Author: Tatianna
 2166

So you want to be a security operations center (SOC) analyst. At the very least you’re considering the role — you’ve seen the data about emerging cybersecurity skills gaps, you want to know more about defending networks against cyber attacks an ...

April 24, 2018

Securing Social? Cyber-First Strategies to Protecting Your Privacy

Author: Tatianna
 2468

Cyber Security Strategies to be Social and Secure During his testimony before the Senate Committee, Facebook CEO Mark Zuckerberg faced many tough questions, one particularly difficult question, “Who owns the virtual you?” made not just the CEO, b ...

April 18, 2018

Cybrary’s TLDR on GDPR

Author: Tatianna
 2230

GDPR – Let’s do this… On May 25th, 2018 a new privacy law goes into effect across the European Union (EU). It is called GDPR or General Data Protection Regulation. Any company that does business in the EU is required to adhere to ...

March 22, 2018

Unraveling the Cyber Skills Gap & Talent Shortage

Author: Olivia
 4006

With high profile security breaches like Equifax, the publicity over data security, as well as the cost, has only continued to grow. According to The 2017 Cost of Data Breach Study from the Ponemon Institute, the global average cost of a data breac ...

March 20, 2018

Why is Ethical Hacking Necessary?

Author: Olivia
 4414

For those outside of the cyber security community or those who are just entering it, there is often much debate about ethical hacking. Is it actually ethical? What exactly does ethical hacking entail? And, why is ethical hacking necessary? In this b ...

March 13, 2018

Shattering the Cyber Security Glass Ceiling

Author: Olivia
 2457

In March, the world celebrates Women’s History Month, recognizing the female pioneers who have helped to make strides in every industry, shattering the glass ceiling as they go. Unfortunately, it is during this month that news surfaced regarding t ...

March 6, 2018

How to Secure your Social Media Accounts: 10 Helpful Tips

Author: Olivia
 4094

I’ll admit that was I was very tempted to trick you all into reading this post by making the title ‘How to Hack Facebook,’ but I resisted. Unfortunately, that’s one of the most commonly asked questions in Cybrary support and shows just how i ...

February 27, 2018

Dr. Cyber Security: A Look into the Healthcare Industry

Author: Olivia
 2846

While cyber security breaches continue to top headlines across industries, it seems that hackers have taken a special interest in the healthcare industry. According to Healthcare’s Electronic Protected Health Information (ePHI), patient medical re ...

February 20, 2018

Cryptocurrency Mining: Malicious Money Making

Author: Olivia
 1999

It’s no surprise that cryptocurrency has been in the news lately. Between the rising popularity of Blockchain technology, the fluctuating value of cryptocurrency, and the creation of new currencies almost daily, many individuals (and hackers) have ...

February 13, 2018

Winter Olympics 2018: Hackers Going for Gold

Author: Olivia
 1917

During past Olympic Games in Beijing, London, and Brazil, there were reportedly millions of attempted cyberattacks a day, of which some were successful. As the breadth and depth of technology used in conjunction with the Games expands, everything fr ...

February 8, 2018

Breaking Tech: How I Became a Software Engineer with Zero Experience

Author: ecgreen
 7149

My name is Eric Green, I’m a junior software engineer at Cybrary. I’m a San Diego native who has made Washington, DC my new home. I was inspired to write this blog in large part as a response to Phill Kimpton’s Soldier to Cyber tal ...

February 6, 2018

Tax Hacks: How to Protect Your Data During Tax Season

Author: Olivia
 1616

As if tax season wasn’t enough to give you a headache, this year the risk of being scammed is higher than ever. “Why?” you groan. In the wake of the Equifax breach, in which millions of Americans personally identifiable information (PII) was c ...

January 30, 2018

What Can Football Teach Us About Cyber Security?

Author: Olivia
 1516

“In football if you don’t practice you don’t win and in cybersecurity if you don’t practice you don’t win.” -Critt Golden With the SuperBowl less than a week away, I’ve found myself spending a lot more time thinking about football. It ...

January 25, 2018

Data Privacy Day: Why Privacy Matters

Author: Olivia
 1250

It’s not easy to ignore headlines regarding GDPR and the passing of FISA for another six years of warrantless surveillance. Both of these issues, among many being covered in the industry news, center around data privacy and the various laws that c ...

January 23, 2018

Bitcoin and Cyber Security: Digital Frenemies

Author: Olivia
 2436

It’s no secret that cryptocurrency has been taking the world by storm, with fast food chains leveraging Bitcoin as part of marketing campaigns to attract customers. Just this week, KFC unveiled the ‘Bitcoin Bucket’ in Canada, which sold out al ...

January 16, 2018

AWS: Your Complete Guide

Author: Olivia
 3677

Even those new to IT have probably heard that everyone is “moving to the cloud.” This transition from standard infrastructure is thanks in large part to Amazon Web Services. Currently, AWS offers “over 90 fully featured services for computing, ...

January 9, 2018

A Cybrary Year in Review: 2017

Author: Olivia
 2834

Like many of you, the Cybrary team is excited for the New Year ahead. A new year means new learning goals and a renewed sense of motivation to better yourself and your career. We’ll be the first to say, we’re excited about all the things we can ...

December 27, 2017

The Art of Social Engineering: A Crying Baby and a Phone Call

Author: ginasilvertree
 2843

  The persistent, eternal weakest link in the realm of cybersecurity is: the human being. This has been and will likely remain true; the art of social engineering continues to be a captivating topic for hackers and their targets alike. Accordin ...

December 20, 2017

Knowledge Is Power: Your Journey On Cybrary

Author: ginasilvertree
 2705

You may have heard the expression, “Knowledge is power” and, if not, you’ve heard it now! People around the world come to Cybrary for IT/cybersecurity training and tools that help them gain knowledge and ultimately, power – po ...

December 13, 2017

Equifax and Never Look Back (Wrong!)

Author: Olivia
 1767

One of, if not THE most notable breach of 2017 was revealed by Equifax Inc. (NYSE: EFX), in which their organization was hacked through the exploitation of “a U.S. website application vulnerability to gain access to certain files. Based on the comp ...

December 12, 2017

Best Of…”Hacker Resources”

Author: ginasilvertree
 3959

There are so many great hacker resources on Cybrary, I don’t know where to start! But, I’ll try an organized approach. Here are three top items (author’s choice) from various sections on the site:   OP3N (member-submitted cont ...

December 2, 2017

Have You Seen Cybrary Teams?

Author: ginasilvertree
 1651

Some Cybrarians may not know about Cybrary Teams, so I figured I’d write a post on this service. Teams is “The learning and assessment tool of choice for IT and security teams at today’s top companies.” Ok, what does that mean ...

November 22, 2017

What are Bundles on Cybrary?

Author: ginasilvertree
 1782

Do you buy bundled or bulk items when you shop at traditional or online stores? Buying in bulk (or buying bundles) is most often cheaper – or at least it should be! – than buying single items. Plus, in addition to lower costs, they should ...

November 21, 2017

Certified Ethical Hacking (CEH) — What You Need to Know

Author: Tatianna
 9368

What You Need to Know Malware is evolving. As noted by Tech Republic, new strains such as fileless malware — which as the name suggests don’t use typical payloads but instead leverage trusted process such as PowerShell to gain system access — ...

November 19, 2017

Cyber Security Smoke and Mirrors: An Update on Russian Hacking Group Sandworm

Author: Olivia
 2701

In a time where news media and social media capture so much of our attention and by extension, help to form so many of our opinions, it is not surprising the press coverage given to the hackers who tampered with the elections using those mediums has ...

November 15, 2017

How Do You Turn Your IT or Cybersecurity Hobby into a Career?

Author: ginasilvertree
 5632

I like to write on a variety of topics, so here’s another post to add to the mix. Over the last day or so, I’ve been thinking about how people turn an IT or cyber hobby into a career. It seems that many hobbyists-turned-careerists had te ...

November 7, 2017

4 Planning Steps for Course Building on Cybrary

Author: ginasilvertree
 1912

I decided to submit a course through the Course Builder on Cybrary today (located under the “Teach” menu on the top navigation). I found the submission tool to be very clean, straight-forward and easy to use. It took less than 10 minutes ...

October 30, 2017

Love Linux? You’re Not Alone

Author: ginasilvertree
 2874

If you love Linux, you’re not alone! Your fellow Cybrarians are enjoying lots of cool Linux training, tools, posted content, etc. The links below include training and supplemental study tools. Plus, here are a few interesting thoughts on Linux ...

October 20, 2017

What You May Not Know about Python and a List of Resources on Cybrary

Author: ginasilvertree
 2597

Here’s some info you may not know about Python from the Python.org website. Let’s take a look at a description of Python, how it’s used and why it was created: Description of Python: “Python is an interpreted, interactive, o ...

October 13, 2017

Message of Appreciation Reflects the Mission of Cybrary

Author: ginasilvertree
 2060

Recently, one of the founders of Cybrary received the following message: “Ralph, I just learned that you are [one of the] founder[s] of Cybrary and I want to thank you so much for bringing so much value. I have 0 dollars and I am struggling fi ...

October 4, 2017

Updated Security+ Exam: SY0-501

Author: Olivia
 6892

Today, October 4, 2017, an updated version of the CompTIA Security+ exam was released primarily to partners, courseware developers, and instructors . The new code for this exam is SY0-501. That being said, CompTIA indicates that they will start thei ...

October 4, 2017

Useful Info and Cool Videos about the STORM Mobile Pen-Testing Kit

Author: ginasilvertree
 4667

So, to be upfront, I’m not a pentester. But, I wanted to share this info and these videos about the STORM Mobile Pen-Testing Kit, as I find the tool intriguing.   First, I found the following info on the EC Council website: “The Sto ...

October 3, 2017

Celebrating Women in Cyber Security during the Month of October

Author: Olivia
 2603

As you’ve probably heard, October is National Cyber Security Awareness Month, an annual campaign meant to raise awareness about the importance of cyber security. October is also National Breast Cancer Awareness Month. Understanding the importance ...

October 1, 2017

Celebrating National Cyber Security Awareness Month

Author: Olivia
 3289

  It’s October at last and time to celebrate- not the release of pumpkin spice lattes or the fact that Halloween is around the corner, but National Cyber Security Awareness Month! This annual campaign is meant to raise awareness about the imp ...

September 28, 2017

Earn Your Cybersecurity Certifications Faster

Author: ginasilvertree
 3340

Truth: we all want to achieve our goals quickly and effectively! If you’re working, striving to earn your cybersecurity certs and want to have a life, you might need a little support in accomplishing your certification goals with greater speed ...

September 25, 2017

Understanding the Cyber Kill Chain

Author: Olivia
 4651

What is the Cyber Kill Chain? Originally developed by Lockheed Martin and based of the military’s ‘kill-chain,’ the Cyber Kill Chain framework is a model for identification and prevention of cyber-attacks. It maps what steps adversaries must t ...

September 20, 2017

Exciting News from EC Council

Author: Olivia
 4003

Every infosec professional who has ever argued against the CEH exam may change their minds after this recent announcement from EC Council. The certifying body will be launching a new, fully-proctored ‘Licensed Penetration Tester (LPT)’ Certifica ...

September 19, 2017

No-Cost and Low-Cost Cybersecurity Courses and Tools on Cybrary

Author: ginasilvertree
 3533

Tight on cash? Same here. So, today, I set out to find all the low-cost and no-cost items on Cybrary. After a few searches, I found several posts that highlight free tools, free classes and low-cost study tools. Now, my reading/study lists are set f ...

September 18, 2017

Cyber Pop: Bug Bounty

Author: Olivia
 2600

What is a bug bounty? A bug bounty program is an initiative offered by many companies and websites that rewards individuals for discovering and reporting bugs, specifically exploits and vulnerabilities. Also called a vulnerability rewards program (V ...

September 16, 2017

Your Complete Guide to Raspberry Pi

Author: Olivia
 4505

What is Raspberry Pi? Raspberry Pi is a small computer that costs between $5 and $35, but can function as a desktop computer or be used for additional functions, such as building smart devices. Originally, the Pi was intended for usage in schools as ...

September 14, 2017

Encryption is Everywhere

Author: ginasilvertree
 1770

Encryption is everywhere (well, almost everywhere) around sensitive data in motion and, sometimes, sensitive data at rest. Without it, e-commerce transactions, government secrets and electronic medical records – and many other types of data &# ...

September 8, 2017

5 Things Every Organization Can Learn from the Equifax Breach

Author: Olivia
 5515

By now you’ve most likely heard that the Equifax breach has hit 44% of the population in America, not to mention the consumers effected in the UK and Canada. In a statement released by Equifax Inc. (NYSE: EFX), which provides little detail other t ...

September 8, 2017

“My Cybrary Story” – Ryan W.

Author: ginasilvertree
 1816

Recently, a Cybrary user named “Ryan W.” posted some positive comments about Cybrary on one of our social media sites. I reached out to him and asked if he would share his “Cybrary Story.” Here’s what he wrote (and, no, ...

August 30, 2017

Cyber Fact: Social Engineering

Author: Olivia
 2874

According to Security Magazine, Hackers attack every 39 seconds, with 1 in 3 Americans attacked this past year alone. Additionally, 62% of companies have experienced phishing social engineering attacks, making it one of the top three cyberthreat con ...

August 28, 2017

The Value of IT and Security Certifications in 2017

Author: Olivia
 4775

We’ve been asked many times before whether or not an IT certification is needed to get a job, essentially, what is the value of a certification? Data indicates that certification holders in the IT and security field have greater job opportunit ...

August 24, 2017

Cyber Pop: Biohacking

Author: Olivia
 2432

In the not so distant past, opening doors with a wave of our hand seemed like something you’d see only in a Harry Potter film. Now, with biohacking, this ability has become possible. We are modifying human bodies to meet our technological needs. B ...

August 23, 2017

Your Complete Guide to ITIL

Author: Olivia
 2789

According to Forbes, ITIL was ranked as one of the most valuable IT certifications for 2017, with holders earning an average yearly salary of $103,408. For many, there is a certain sense of mystery that surrounds this certification despite it being t ...

August 21, 2017

Cyber Pop: Holistic Security

Author: Olivia
 1776

It is no surprise that as our global reach extends and information is shared across the world, security risks are increasing with the expansion of the attack surface. For this reason, security professionals can no longer take a siloed approach to sec ...

August 19, 2017

Linux+ 104 Transcender Practice Test Question Preview

Author: Olivia
 1708

Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone, meaning you will find many IT careers in the current mark ...

August 18, 2017

Cyber Fact: Hacktivism

Author: Olivia
 1863

According to Heimdal Security, “Hacktivism accounts for half of the cyberattacks launched in the world.” What is hacktivism? Hacktivism is a politically or socially motivated form of hacking. Deeply rooted in hacker culture and ethics, it is oft ...

August 17, 2017

Linux+ 103 Transcender Practice Test Question Preview

Author: Olivia
 1711

According to CompTIA, the Linux+ certification offers a framework for acquiring working knowledge of Linux for IT professionals working as junior-level system administrators, as well as those working in Web and software development. Successful candi ...

August 16, 2017

Cyber Pop: Pretty Good Privacy

Author: Olivia
 1574

Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption ...

August 15, 2017

Your Complete Guide to Fuzzing

Author: Olivia
 5209

What is fuzzing? A black box software testing technique, fuzzing is a more refined version of trial and error, used to discover coding errors and security vulnerabilities in software. It involves imputing large amounts of random data, known as ‘fu ...

August 15, 2017

A+ 902 Transcender Practice Test Question Preview

Author: Olivia
 1833

CompTIA A+ 220-902 is the second of two exams required to obtain your CompTIA A+ certification. This exam covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fund ...

August 14, 2017

Your Complete Guide to Burp Suite

Author: Olivia
 7722

Since web applications offer data access to customers, employees, and other key groups, they have become a weak link for many organizations. If a hacker gains access, they often have direct access to confidential data, meaning that web application s ...

August 13, 2017

A+ 901 Transcender Practice Test Question Preview

Author: Olivia
 2322

Transcender has been providing CompTIA certification training products for over a decade. Their award-winning suite of test prep solutions includes quality CompTIA certification practice exams and handy flashcards for some of the most popular CompTI ...

August 11, 2017

Project+ Transcender Practice Test Question Preview

Author: Olivia
 1233

Each practice test on our site was designed to prepare you for the version of the certification exam described. So for the Project+ exam, their practice test questions map to the PK0-003 exam, currently offered by CompTIA. According to Transcender, ...

August 10, 2017

Cyber Fact: Passphrases

Author: Olivia
 1519

According to statistics from SecurityIntelligence, “For small and midsized organizations (SMBs), 60% of employees use the exact same password for everything they access. Meanwhile, 63% of confirmed data breaches leverage a weak, default or stolen ...

August 9, 2017

SOC Analyst: Interview Preparation

Author: Olivia
 14820

  A few weeks ago, I was talking with a Cybrarian who had an upcoming interview for a SOC Analyst position and wanted some advice on how to best prepare. Aside from the general ‘interview success’ tips I knew offhand, I couldn’t provide m ...

August 9, 2017

CASP Transcender Practice Test Question Preview

Author: Olivia
 2070

We’ve been asked whether or not courses alone are enough to pass certification exams. While the videos in our courses provide valuable insight into the material covered on the exam, the questions included in the Transcender material (which are the ...

August 8, 2017

Cyber Fact: Malware

Author: Olivia
 1504

According to CSO, “Global ransomware damage costs are predicted to exceed $5 billion in 2017. That’s up from $325 million in 2015, a 15X increase in two years, and expected to worsen. Ransomware attacks on healthcare organizations, the No. 1 ...

August 7, 2017

Capture the Flags: What They Mean for Security

Author: Olivia
 2864

Capture the flags are just one form of valuable cyber security training that inspire productive competition and serve as an educational exercise for participants. In a security CTF, the contestants may be tasked with securing a machine, conducting or ...

August 7, 2017

Oracle: OCAJP 6 and OCPJP 6

Author: Olivia
 1155

I’ve noticed a debate waging across Internet forums regarding the Oracle 1Z0-850: Certified Associate Exam (OCAJP 6) and the Oracle 1Z0-851 Certified Professional Exam (OCPJP 6). Some of the questions raised include ‘What is the different betwee ...

August 3, 2017

SOC Analyst: Career Path Overview

Author: Olivia
 16292

A buzzword in the cyber security world is ‘SOC Analyst.’ While some are familiar with this role and desire to one day hold this title, many are not sure what a SOC analyst does, or what ‘SOC’ even stands for. I’d like to shed some light on ...

August 2, 2017

Software Engineering Learning Path

Author: Olivia
 6786

While Cybrary focuses primarily on cyber security education, we recognize that cyber extends into every aspect of technology, including the growing area of software engineering. Many Cybrarians are especially interested in this area of study, which ...

August 2, 2017

IT Fundamentals: What You Need to Know for Tech Success

Author: Olivia
 2911

Gone are the days when being ‘tech-savvy’ was just a ‘nice to have’ trait. Nowadays, as we all know, being familiar with the basic functions of a computer and certain software is essential for everyone from school-aged children to grandma. A ...

April 18, 2017

Teaching Kids about Cybersecurity: it’s never too early

Author: rcubed
 9805

Children are taught from an early age about the many things in the world that can harm them. Even in a toddler’s narrow world, there are plenty of potential hazards lurking around almost every corner. With growing autonomy, children are then warned ...

April 17, 2017

Cyber Feminist Hacker and New Course Contributor: Magda Lilia CHELLY

Author: Olivia
 5996

Cyber feminism, used to describe the philosophies of a contemporary feminist community whose interests are cyberspace, the Internet and technology, is most likely not a term you’ve heard too often, but it’s gaining traction thanks to women in cyb ...

April 14, 2017

UNM4SK3D: CIA, Dallas, and NASA

Author: Olivia
 3639

#wikileaks (but wait, there’s more). At this point, the leaks have become a flood. And speculation is drowning us. This week, Symantec Security researchers have confirmed that the alleged CIA hacking tools exposed by WikiLeaks have been used ...

April 13, 2017

Hacking for Mischief, Mayhem and Pranking

Author: rcubed
 3383

Last weekend in Dallas the evening calm was shattered by the wail of 156 tornado warning sirens sounding at once. Attempts to turn off individual sirens failed and after 95 minutes of the din, officials mercifully shut down the entire system in a fin ...

April 11, 2017

Quiz: Micro Certification Placement

Author: Olivia
 5937

You won’t pass or fail. You’ll just get some direction. In previous blogs, I offered tips on how to earn specific Micro Certifications, and how to determine which Micro Certifications were best for your career goals. And while making career decis ...

April 11, 2017

Monitoring the Dark Web for Cyber Threat Intel

Author: rcubed
 4878

Last week we discussed the Dark Web. Its scope, its architecture, and what lurks (slithers) within its depths. On the flip side, the Dark Web also presents a useful source to mine for cyber threat intelligence. When bricks and mortar criminal types k ...

April 10, 2017

Hacker, YouTube Star, and Cybrary’s New Course Contributor: Priyank Gada

Author: Olivia
 6123

If you are an avid reader of 0P3N, chances are you’ve seen a post or two from avid contributor Priyank Gada (@groupflexi). Priyank, who has experience as a forensics expert and penetration tester, frequently makes YouTube videos to share his knowle ...

April 7, 2017

UNM4SK3D: CIA, Dark Web, and China

Author: Olivia
 4162

#wikileaks (they just keep coming). You know that feeling you get when your favorite artist continues dropping singles but doesn’t release an album? The same can be felt for Wikileaks, but instead of anticipation, their releases cause anxiet ...

April 6, 2017

Exploring The Dark Web: Don’t Venture In Alone

Author: rcubed
 5347

Cyber Threat Intelligence is a complex topic consisting of a lot of moving parts. It requires a high degree of technical knowledge combined with a healthy dose of paranoia. Staying ahead of the bad guys or simply keeping up with them is a 24/7 job. ...

April 5, 2017

‘Silver Hats’ Off to Chris Greco and Cybrary’s First User- Generated Course

Author: Olivia
 2942

I think it’s safe for me to assume that anyone who’s the least bit familiar with cyber security has heard of Black Hat and White Hat hackers, and even those in between, the Gray Hats. I’d like to expand your cyber lexicon further and introduce ...

April 4, 2017

BYOD MDM MAM MEM and EMM: FTW

Author: rcubed
 1780

IT Acronyms have a tendency to pop up like mushrooms on a suburban lawn after a 3-day rain storm. Even seasoned pros occasionally find themselves stumped by one or two that have slipped past their radar. After learning quite a while back that BYOD di ...

April 3, 2017

Don’t be Nervous Your New Co-Worker Could be a Robot

Author: Olivia
 3636

In the past, I’ve written with a mixture of excitement and hesitation on the topic of Artificial Intelligence (AI). AI is defined as: the theory and development of computer systems able to perform tasks that normally require human intelligence, suc ...

March 31, 2017

UNM4SK3D: FCC, WhatsApp, and GiftGhost

Author: Olivia
 3072

#privacyrules Ladies and gentlemen, start your VPNs. As of March 28th, the House of Representatives and the Senate agreed to repeal the FCC’s recent privacy rules. And while those rules still need President Trump’s likely signature, many ...

March 30, 2017

Overturning FCC Privacy Ruling: A Marketer’s Viewpoint

Author: rcubed
 1610

The United States Senate voted last week to reverse broadband privacy rules put in place last October requiring ISPs to get consent from consumers before selling or sharing their Web browsing data and other private info with third parties. The vote w ...

March 28, 2017

Closing the Cyber Security Skills Gap

Author: Olivia
 2686

Register for the April 18th event. Any search of the term ‘Cyber Security Skills Gap’ will return a laundry list of frightening facts about how far behind the industry is in terms of finding and hiring the needed professionals. Those with the de ...

March 28, 2017

Robocalling for Dollars – a phish by another name

Author: rcubed
 1401

The number of robocalls blasted out to American phones during each month in 2016 is estimated to have been 2.4 billion. That number would be high just for a single year, but when it occurs on a monthly basis, then things become insane. And this isn ...

March 24, 2017

UNM4SK3D: CIA, Apple, and TSA

Author: Olivia
 2237

#wikileaks (again). Dark Matter may sound like a new sci-fi movie, but it’s actually the latest of the WikiLeaks Vault 7 classified documents shared with the public.These new documents, which build off of this month’s previous leak, desc ...

March 23, 2017

History of Phishing: Then and Now

Author: rcubed
 3247

 Last year (2016) turned out to be a banner year for phishing. According to APWG (Anti-Phishing Working Group), the total number of phishing attacks in 2016 was 1,220,523, a 65% increase over 2015. In the fourth quarter of 2016, APWG saw an average ...

March 23, 2017

How to get Nessus Certified and Why Technology Specific Certifications are so Valuable

Author: Olivia
 5286

As the Cybrary site continues to change, and trust me when I say there are many changes coming (good ones!), the Micro Certification catalog will only continue to expand. In my recent post, I mentioned more certifications geared toward specific vulne ...

March 21, 2017

11 Ways to Reduce Ageism Bias in Tech Hiring

Author: Olivia
 2602

The other day, I was reading a ‘Dear Abby’ type blog that focused on ageism in hiring, and I thought that topic specifically geared toward the tech industry would be interesting to explore. Recently, I’ve written a lot about how you can earn sk ...

March 21, 2017

Best Resources for Learning Android Programming or Anything Else

Author: rcubed
 2336

This post is a follow-on to the series I began a few weeks back on mobile app development in general and Android coding in particular. It’s also the concluding post in the series. The previous post on getting started with Android development walked ...

March 17, 2017

UNM4SK3D: Yahoo, IBM, and Twitter

Author: Olivia
 1288

  #indictments In the ongoing saga over Yahoo’s security breaches, one of which affected over 500 million users, a grand jury has indicted four defendants on charges of computer hacking, economic espionage and other criminal offenses in c ...

March 16, 2017

Cybercrime and Punishment: Who’s Actually Paying the Price?

Author: rcubed
 2376

It seems that a week doesn’t go by where there isn’t news of a major data breach or intelligence dump. Yesterday gave us something slightly different, but still a variation on the same theme. On Wednesday March 15, 2017 the Justice Department ind ...

March 15, 2017

How to Showcase your Skills in an Online Portfolio

Author: Olivia
 3902

In the blog, I’ve talked a lot about resume tips and emphasizing skills to help you get hired. I realize in doing so that some skills are more visual and creative than others, with everyone from coders to technical writers needing an ideal place to ...

March 15, 2017

Missing: Women in IT

Author: rcubed
 1507

This post is a follow up on a previous bleak one that examined harassment of women in the IT field. And while sexual harassment is a contributing factor to talented women choosing to leave the field and even possibly deterring others from entering it ...

March 13, 2017

A Man of Many Certs: How One Cybrarian Views Micro Certifications

Author: Olivia
 5103

We’ve been asked by many members how other Cybrarians are using micro certifications to learn new skills and further their careers. It’s a fair question certainly, with this concept being so new. Certifications are imperative to a cyber security ...

March 11, 2017

Technology in Travel

Author: Rachel Laura M
 1593

Gone are the days when frequent travelers for business and/or pleasure were in for a tedious, drawn out process of phone calls and prolonged research to book plane tickets, hotel rooms, and rental cars. Today’s travelers no longer need to make an a ...

March 10, 2017

UNM4SK3D: CIA, Headphones, and Consumer Reports

Author: Olivia
 2534

#wikileaks True or false? That’s the question being asked by millions of Americans after Wikileaks released a series of 8,761 documents titled ‘Vault 7,’ which detail the CIA’s cyber spying techniques and capabilities. Big ne ...

March 9, 2017

The WikiLeaks Just Keep Dripping

Author: rcubed
 1609

Table of Contents: 1. What’s in the vault? 2. Hacking the endpoint is where it’s at. 3. Who done it? 4. Ethical issues.   This past Tuesday (March 7, 2017), the internet’s online library of cool stuff, WikiLeaks, published the ...

March 8, 2017

How to get Secure Coding Certified

Author: Olivia
 4712

Hopefully the answer to the question, “How do I get _________ certified?” is becoming clearer with each post I write. You may or may not have realized that the certification catalog is continuing to grow, with some of the newest certifications, ...

March 8, 2017

Role Technology: Healthcare

Author: Rachel Laura M
 1254

When dealing with a health problem, gone are the days when we had to make many phone calls, ask a lot of questions and then wait for a doctor or other medical professional to follow up with us. Today, when it comes to managing our health, the Interne ...

March 7, 2017

Harassment in IT: Are things any better 40 years later?

Author: rcubed
 1741

Several high-profile sexual harassment cases in recent years serve as a reminder how far the tech industry has yet to advance with regard to the fair treatment of women in the workplace. Truth be told, it’s a pervasive problem in our culture that e ...

March 6, 2017

The Art of First Impressions: How to Stand Out at a Career Fair and Land the Job

Author: Olivia
 2973

For many students, the approaching of spring means one thing: A rush to attend every career fair and hiring event possible to land that job or internship post-graduation. For professionals, the attendance of career fairs may come on more of an ‘as ...

March 4, 2017

Flex-Learning: Exploring the growing world of online learning

Author: Rachel Laura M
 1160

Not so long ago, when you wanted to pursue any kind of educational experience, you had to enroll in a course, pay your tuition and then commit to a specific time and place for a certain amount of time (e.g., a quarter, semester or academic year) to ...

March 3, 2017

UNM4SK3D: AWS, Cloudbleed, and CloudPets

Author: Olivia
 2389

#outage The annoyance when your Internet won’t load is quite possibly the most irritating feeling of the 21st century. So when the Amazon S3 outage occurred on Tuesday, February 28th for almost 5 hours, both consumers and businesses alike were ...

March 2, 2017

Alexa, Call Jeff Bezos

Author: rcubed
 1790

Last Tuesday (2/28/2017) Amazon’s AWS S3 web service was intermittently unavailable. S3 (Simple Storage Service) is one of the many web services hosted on the Amazon Web Services platform, AWS. It’s also the most used service hosting everything ...

February 28, 2017

How to get Malware Certified

Author: Olivia
 3845

I’ve been on a mission to answer the question, “How do I get _________ certified?” In recent posts, I’ve dove into how to earn the TCP/IP certification and how to best utilize your hard earned certifications on your resume. With new micro ce ...

February 28, 2017

Let’s Build an Android App

Author: rcubed
 2310

It’s now time to roll up our sleeves and get our hands dirty with a little mobile app development. This next post in the series on Mobile App Development will focus on putting things in place for developing Android mobile apps. The last time I had ...

February 25, 2017

Coding Theory: The wide world of cryptography

Author: Rachel Laura M
 2662

Coding theory and cryptography are two well-known areas of information security as both are necessary for today’s technology oriented; online-based world. However, many wonder what is the difference between coding theory and cryptography? Essential ...

February 24, 2017

UNM4SK3D: Google, Netflix, and Bill Gates

Author: Olivia
 2103

#SHA-1 Maybe you’ve heard of it, and maybe you haven’t. But Google just impressed the world again by producing the first successful SHA-1 collision attack ever. And that means it’s officially time for services to migrate to safer c ...

February 23, 2017

Seeking Clues to MS’s Strategy in Windows 10 Mobile

Author: rcubed
 1838

Before launching into the remainder of the series on mobile app development, I thought it would be instructive to take a look at what Microsoft has been quietly up to with Windows 10 Mobile. The battle for dominance of the smartphone arena ended long ...

February 22, 2017

Insights and Trends on Micro Certifications

Author: Olivia
 2361

Linux Academy and Cybrary survey 6,000 IT professionals on experiences with micro certification. Results offer insight into learning preferences, certification in the workforce, training costs, and trends. To read the full press release, click h ...

February 21, 2017

Introduction to Mobile Development Platforms

Author: rcubed
 3095

It seems the title of the previous post in this series threw a few people. I suppose it serves me right for flirting with a click baity title. The point I was attempting to make was that though mobile app development has a lot of allure as a road to ...

February 20, 2017

How to Showcase Certifications on Your Resume and 3 Reasons Why You Should

Author: Olivia
 13854

In my recent post, ‘How to get TCP/IP Certified’ I offered some guidance on how you go about obtaining a certification on Cybrary. I first discussed the three general steps and then turned my focus to the TCP/IP Micro Certification specifically. ...

February 17, 2017

UNM4SK3D: IoT, Yahoo!, and Microsoft

Author: Olivia
 1876

#DNS Someone was really craving fish. That’s the only logical explanation for why an unnamed university’s vending machines and other IoT devices were making seafood-related DNS requests every 15 minutes. This case, which comes from Veriz ...

February 16, 2017

3 Simple Steps to Wealth and Fame as a Mobile App Developer

Author: rcubed
 2296

The allure of becoming rich and famous from publishing a viral mobile app can be pretty strong. A lot of people see mobile app development as the fast track to living the life of a Silicon Valley entrepreneur. Not to crush anyone’s dreams, but a he ...

February 16, 2017

A Report on Reports: Briefing on the State of Security

Author: Olivia
 1592

Many of you are probably aware that RSA is currently taking place. Having fomo like me? Twitter is a lifesaver if you are. Still, it’s hard to stay updated on all the juicy things being discussed there. Some of the major topics I’ve come across a ...

February 14, 2017

How to get TCP/IP Certified

Author: Olivia
 5938

Many Cybrarians have been asking the question, “How do I get _________ certified?” There are many resources across the internet that discuss how you can earn various certifications.  I wanted to get specific in a series of blog posts on how you ...

February 14, 2017

So you want to be my CISO?

Author: rcubed
 3220

What would you say about a job where the primary attributes were only accepting workaholics, where your successes received little notice but your slip ups most likely would cost you your job or worse, get worldwide media attention and you could neve ...

February 13, 2017

The Future of Programming – It’s where the Money is!

Author: GWCitroner
 4519

According to a 2015 report from Burning Glass; there were almost 7 million job openings that required coding skills, and programming jobs are growing 12% quicker than average. But, the most important fact we can take away from this report is: fully 5 ...

February 10, 2017

UNM4SK3D: Dark Net, Vizio, and Homeland Security

Author: Olivia
 2412

#hacked “Hello, Freedom Hosting II, you’ve been hacked.” That’s the message visitors to any of the 10,000 affected websites that were a part of a Dark Web hack received recently. So, it seems Anonymous isn’t afraid to p ...

February 9, 2017

Software Development Methodologies: Tumbling down the waterfall

Author: rcubed
 1989

Picking up the thread from a previous post on structured software design and CASE, it’s worth examining some of the major development methodologies and their evolution. Where SA/SD and CASE deal with the process of designing and creating software p ...

February 8, 2017

Privileged Password Security: How to Protect your Organization

Author: Olivia
 2169

You turn on the evening news and a breaking report flashes, “Major Data Breach of Huge Corporation, details at 11” and you immediately begin to question, “could this happen to my organization?” In the wrong hands, privileged accounts represen ...

February 7, 2017

Incytes: Micro Certifications by the Numbers

Author: Olivia
 1730

      *Data as of 2/7/17 Data is a beautiful thing. In many ways, it’s almost artistic because it can help us paint a picture of abstract concepts. You may have questions about Cybrary Micro Certifications, ‘who’s ...

February 7, 2017

Tax Refund Scams: Benefits to filing early and often

Author: rcubed
 1436

The two constants of the universe are death and taxes, however, advancements in life extension and anti-aging research threaten to up end the former. Taxes are eternal and in some cases, literally. Estates and heirs are often hounded by the IRS for t ...

February 6, 2017

5 Ways Virtual Reality is Impacting Your Life

Author: GWCitroner
 1958

Virtual reality has come a long way from the first primitive 3D viewers.  This technology is now poised to change the way we learn, communicate, travel, and receive medical care. Here are 5 big ways virtual reality is enriching our lives. Education ...

February 5, 2017

Android Development – These are the droids you’re looking for …

Author: Rachel Laura M
 1537

Android is the Google platform billions of people use on their smartphones.  The origins of Android began in 2006, around the same time that Apple denied it was creating the now ever-popular iPhone. Compact laptops were the hot new item and the tabl ...

February 4, 2017

This Day in History: Famous Firsts that Impacted the World

Author: Tatianna
 1883

Estimated reading time: 3 minutes Making in impact in one person’s life isn’t difficult, but what about impacting the world? What does it take to have a monumental effect on people? Some may say that kinds words, a new thought/idea, rese ...

February 3, 2017

UNM4SK3D: Executive Order, Take-Two, and Facebook

Author: Olivia
 1725

#cyberpolicy You’ve heard of the 12 days of Christmas, now post- holiday we’re looking at 60 days of cyber. An Executive Order draft reveals the White House will be calling for swift review of “national security systems” within 60 da ...

February 2, 2017

Whatever happened to software that would write itself?

Author: rcubed
 2635

Age does have some benefits, though they are sometimes hard to appreciate among the aches and pains and general tendency for complaining about…well, getting older. In some respects, I was fortunate to begin my career in technology in 1980 just when ...

February 1, 2017

Cash Me Ousside, Or Better Yet Don’t: 7 Tips for Protecting your Money Transfers

Author: Olivia
 1602

First things first, if you haven’t yet seen the video from Dr. Phil where the teenage utters the phrase ‘Cash me ousside, howbow dah’ that’s storming the internet, please look it up. Otherwise this blog title makes no sense. A ...

January 31, 2017

All The News Fit or Unfit to Print

Author: rcubed
 2105

This is the fifth and final post in the series on “How to be an Educated Consumer of Online Information.” I can hear you cheering now. I realize that this series may have seemed like I’ve veered off on a tangent. After all, what does any of thi ...

January 30, 2017

Winter Phishing: Gmail Scams

Author: Rachel Laura M
 2578

Scams! Some hackers are good at them. Hackers who create phishing schemes often create documents that are realistic and convincing enough to look legitimate; causing even some of the most technologically savvy users to fall for them. That is a ̶ ...

January 28, 2017

This Day in History: Communication Methods & Technology

Author: Tatianna
 1777

Evolution of human work silhouettes | designed by Vexels Estimated reading time: 3 minutes This week’s history lesson is about communication methods. Let’s start with something that practically everyone uses, the telephone. Invented and ...

January 27, 2017

Obtaining a Skill Certification is as Easy as Taking a Practice Test

Author: Olivia
 3246

Awhile back, I said that passing a micro certification exam is ‘so easy a caveman could do it.’ And in a sense that still holds true. However, I know many of us have test anxiety, and for some, obtaining a certification is a matter of job securit ...

January 27, 2017

UNM4SK3D: Dropbox, Russia, and Google Play

Author: Olivia
 3068

#filesharing Recently, Dropbox earned itself a new nickname, ‘Dropbug,’ also synonymous with ‘restore files.’ The crowd-favorite file sharing company implemented a bug fix which had corrupted the metadata of their files. Thi ...

January 26, 2017

The Many Faces of Social Media: The Good, Profitable and Ugly

Author: rcubed
 1855

This next to last post in the series begun a few weeks ago on “How to be an Educated Consumer of Online Information” covers the vast topic of social media. It’s so vast in fact, that apart from a general overview of this particular communicatio ...

January 25, 2017

Who, Not What, is the ‘R’ in RSA?

Author: Olivia
 2451

The other day, I took to Cybrary’s search feature in hopes of finding information on an inventor of the RSA public-key cryptosystem, and when nothing turned up, not only was I utterly disappointed, but it made me wonder why we do not dedicate more ...

January 24, 2017

How Data Recovery is Sometimes like a Seinfeld Episode

Author: rcubed
 1605

The Seinfeld comedy series is famously referred to as “a show about nothing.” Though many of its episodes revolved around mundane incidents from the main characters’ lives, there usually was a profound message that resonated with many viewers s ...

January 21, 2017

This Day in History: What makes the world go ’round?

Author: Tatianna
 2240

  Have you ever stopped to think about historic events or “history” as a whole? It can be overwhelming to realize that so much happens every day. If you think harder, there are 24 hours in a day [duh] (that’s 1440 minutes if you ...

January 20, 2017

UNM4SK3D: Anonymous, Apple and the Army

Author: Olivia
 2753

  #threats Today, January 20, 2016 the 45th President of the United States, Donald Trump, will be sworn into office. While many opinions surround the recent election and overall political landscape, none have been more threatening than those fr ...

January 19, 2017

[PODCAST] Minicast Episode 8 The one about ransom and privacy

Author: CyDefe
 1445

Hey hey everyone we’ve published another podcast this month. On this episode we talk about Microsoft’s new privacy dashboard, and a lot of ransom happening in the cyber world. You can listen to our podcast on CyDefe.com, watch our raw vi ...

January 19, 2017

Risk Management: The what, the how, and next steps in advancing your cyber career

Author: Olivia
 1916

When we talk about cybersecurity, for the most part, we are talking about the protection of systems and information from threat vectors such as: cyber espionage, cyber warfare, cyber terrorism, cyber negligence (looking at you Sony). In their most tr ...

January 19, 2017

Software Security Analysis: Manual vs. Automated

Author: rcubed
 2716

A lot of effort goes towards securing networks and the resources they host, but when it comes to the seven layers of the ISO OSI stack, it’s the application layer where a lot of the trouble begins and ends. Gartner places 90% of the blame for secur ...

January 17, 2017

Network Security vs. Endpoint Security is the Boxing Match of the Year: Who Wins?

Author: Olivia
 1858

327 new threats every minute. More than 5 every second. That’s the state of the world’s threat landscape according to Avecto. As you can probably guess, the challenge for organizations and their dedicated cyber security teams lies within the shee ...

January 17, 2017

Become an Expert in any Subject Without Visiting the Library

Author: rcubed
 3064

Back in the old days (pre-internet), writing research papers for school was an arduous task. The process began with badgering my poor mother into dropping me off at the public library and then returning several hours later to retrieve me. My badgerin ...

January 13, 2017

Cybrary Mobile Apps: iOS and Android Now Available

Author: Tatianna
 3426

You heard right! We finally have an app for iOS. Yes, the long awaited and severely overdue iOS app is now more than a dream. And, for those of you who use Android, we didn’t forget about you. We created an all-new app for android to match 1 f ...

January 13, 2017

UNM4SK3D: Ukraine, Altaba, and St. Jude

Author: Olivia
 1944

  #hacked (again). Someone’s flexing their cyber muscles. It appears as though the recent attack on a Ukrainian transmission facility points to a person or group using the country as a trial for refining attacks on critical infrastructure ...

January 12, 2017

Demand for Cybersecurity Pros Will Explode in 2017

Author: rcubed
 3997

A topic we hammer on often and hard here at Cybrary.it is the critical shortage of Cybersecurity professionals and the growing demand for them. Guess what? Things haven’t changed and the shortage and corresponding demand only continue to increase a ...

January 11, 2017

Your Girlfriend Has Already Adopted the Zero Trust Model: Here’s Why you Should Too

Author: Olivia
 3017

“Never trust, always verify” is shifting from the adage of crazy girlfriends everywhere to the motto of cyber security experts across the globe. The Zero Trust Model of cyber security is one that focuses on the belief that both internal and exter ...

January 10, 2017

Call Me, Beep Me if You Wanna Reach Me (And Steal My Data): Malvertising in the Mobile Device Landscape

Author: Olivia
 2079

Awhile back I had made a prediction in the blog ‘Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications’ that mobile applications will become hacker’s target of choice in 2017. I decided based on some further re ...

January 10, 2017

Online Shopping and Review Sites: Getting more bang for your buck

Author: rcubed
 1194

The writing has been on the wall for a while now for brick and mortar retailers. Growing pressure from online shopping sites has been taking big chunks out of their revenue year-over-year. Stalwarts of the department store industry have either gone o ...

January 7, 2017

Today’s History: Microsoft’s Unveiling and Duoscopic TV

Author: Tatianna
 3086

Every day holds significance to someone, but today is special to us because of Microsoft. Founded in 1975, Microsoft is the worldwide leader in software, services and Internet technologies for personal and business computing. The company offers a wi ...

January 6, 2017

UNM4SK3D: Bitcoin, Financial Services, and Smart Meters

Author: Olivia
 2520

  #digitalcurrency While playing the Stock Market may not be for you, you may want to reconsider when it comes to digital currency. The worth of Bicoin is on the rise, with it’s value surpassing $1,000 for the first time since November 20 ...

January 5, 2017

[PODCAST] Update for our fans & monthly puzzle

Author: CyDefe
 1279

Hey hey everyone it’s been some time since our last post on here and since then we’ve had a few new episodes come out. Check out the links below to listen to our latest content. We streamed our last podcast recording live at https://www. ...

January 5, 2017

Tips for using Google like a Ninja

Author: rcubed
 4766

(Google Logo by Google Inc. (google.com) [Public domain], via Wikimedia Commons.) –This is the second in a series of posts on the topic of how to be an educated consumer of online information. Most online information searches begin with Google, ...

January 4, 2017

Don’t Wear your Data on your Sleeve: Why You Should Be Wary of Fitness Trackers from a Security Standpoint

Author: Olivia
 2192

Recently, I was reading a blog post about all the hot Christmas gifts for 2016 and their inherent vulnerabilities. Of course, there were the usual suspects like computers and mobile devices, but more IoT devices crept onto the list, including smart h ...

January 3, 2017

Top Tips for being an Educated Consumer of Online Information

Author: Tatianna
 2610

Part of Cybrary’s personal office library. Updated August 2018 As we enter a brand new year filled with both hope and more than a fair degree of trepidation, As always, there are points in time where it’s worth taking a moment to review ...

January 2, 2017

My Love/Hate Relationship with Amazon: Digital Privacy Concerns Raised by the Power and Products of the Big “A”

Author: Olivia
 2925

How many times have you opened the Amazon app to buy a book and ended up with a slew of products you never intended to purchase in the first place? If you just nodded in agreement, then you, like me, have a love/hate relationship with the ‘magic’ ...

December 30, 2016

UNM4SK3D: PHPMailer, OpenStack, and Amazon

Author: Olivia
 3176

  #criticalvulnerabilities If there was a book of critical vulnerabilities across the Internet, it’d be longer than the Bible. The latest discovered in PHPMailer by Polish researcher David Golunski, is one that affects multiple popular, ...

December 29, 2016

Ransomware: When it’s truly better to be safe than sorry

Author: rcubed
 2114

In general, encryption is a good thing and the stronger the better. Protecting data both at rest and while in transit is a recommended security best practice of which you should be aware. But when you discover that all the files on your computer have ...

December 29, 2016

10 Questions You Need to Ask Yourself Before Deciding if a Technical Project Management Role is Right for You

Author: Olivia
 1483

In light of recent recognition of the Technical Project Management Skill Certification test’s popularity, I decided it may be wise to provide a closer look at how someone in a role such as this functions, and if making a transition into a similar p ...

December 27, 2016

Be a Learn-a-holic: Using Webinars as Supplemental Learning Tools

Author: Olivia
 1646

I’d like to propose an idea. I want the title of ‘Cybrarian’ to become synonymous with the term ‘learn-a-holic.’ What’s a learnaholic? As the name implies, it’s someone addicted to learning. But not just learning in a general sense, rat ...

December 27, 2016

Biometrics: Not the Promised Silver Bullet

Author: rcubed
 2197

Remembering passwords has become a necessary annoyance in the Digital Age. We resort to using birth dates, pets’ and children’s names, and easily-remembered numeric sequences like ‘1234’ or ‘666’ (if you have a Satanic bent). The more cre ...

December 22, 2016

You Say Cyber Security, I Say Cybersecurity

Author: rcubed
 3978

Being it’s the Thursday before Christmas I thought a somewhat less technical post was in order to get us in the Holiday spirit. It would also be a good opportunity to clear up an issue that’s been nagging me for a long time: what is the proper sp ...

December 22, 2016

UNM4SK3D: Ads, Email, and Inflight Entertainment

Author: Olivia
 2186

  #methbot Slow clap for fraud-prevention firm White Ops who discovered the biggest digital ad fraud ever, lovingly dubbed ‘Methbot.’  This may sound like a bad dream, or just another episode of Breaking Bad, but Methbot, a ‘ ...

December 21, 2016

Here’s a Toast to Lists: What Skills, Certifications & Technologies are in Demand for 2017

Author: Olivia
 4265

As the clock ticks down to midnight on December 31st and signals the end of 2016, a year that’s been the center of a slew of ‘worst year ever’ memes and remarks across the internet, it is also a reminder of the predications and resolutions bein ...

December 20, 2016

Like to Break Stuff? You May Have a Career in Software Testing

Author: rcubed
 3861

Were you the kind of kid that loved to take stuff apart to see how it worked? As an adult, are you constantly coming up with suggestions for how things could be better-designed and built? Do you have a pit bull-like tenacity for making sure that prob ...

December 19, 2016

Let’s Get Serious: A Discussion on Cyber Attacks

Author: Olivia
 3509

Being that I’m new to cyber security, I can’t help but gape at the number of ‘hacks’ I hear about on an almost daily basis. The other day I read an article on a KFC rewards program in the UK whose members were hacked. There were a lot of corn ...

December 16, 2016

UNM4SK3D: Europol, the FCC, and China

Author: Olivia
 2173

  #cybercriminals Small victory dance from around the world- an international operation uncovered teens connected to DDoS cyber attacks.  Who says Generation Z is lazy?! Of the 101 watch-listed and 34 arrested suspects, the majority were under ...

December 15, 2016

Sniffing Your Way through Snort NIDS

Author: rcubed
 2789

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are currently hot topics in the cyber security space and for good reason. Threats and exploits aren’t slowing down and the pressure is ramping up on organizations to do a bett ...

December 15, 2016

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

Author: BrBr
 1413

  http://traffic.libsyn.com/brakeingsecurity/2016-049-amanda_berlin_the_art_of_the_sale_decision_making_trees.mp3 “Always Be Closing” is the mantra that Alec Baldwin’s character “Blake” intones in the movie “ ...

December 14, 2016

Here’s How to Get Hired: 7 Resume Must Do’s for the IT Professional

Author: Olivia
 5236

Once upon a time, I worked as a recruiter for a telecommunications company. And I believe that while your interview skills are incredibly important, one’s resume is truly the ‘key to the kingdom’ of sorts. After all, if you can’t get through ...

December 13, 2016

Linux Smackdown: Which Distro Reigns Supreme for Pentesting?

Author: rcubed
 3391

There are some things in life that were simply meant for each other: peanut butter and jelly, snow and Christmas, and Friday night and pizza. In the case of pizza, it goes well with pretty much anything, especially cold beer. When it comes to the art ...

December 12, 2016

9 Ways to Cheat on Behalf of Your Brain

Author: Olivia
 3895

I have a confession to make. I always want people to think I’m smart and trendy. People who are both smart and trendy, typically know what’s going on in the news, their industry, what’s new with pop culture, anddddd they’re well read. But the ...

December 10, 2016

The National Institutes of Standards in Technology (NIST)

Author: Rachel Laura M
 2552

What is NIST? The National Institutes of Standards in Technology (NIST) dates back to 1901. The United States Congress originally founded NIST as means to combat and issue with competition in the US during that time. Back in the day, the infrastruc ...

December 9, 2016

UNM4SK3D: IBM, DailyMotion, and Android

Author: Olivia
 2466

  #deeplearning Fortune 500 Companies have a new secret weapon against cyber crime: IBM’s Watson for Cyber Security.  This overachieving supercomputer uses machine learning and language processing to sift through vast amounts of data, bo ...

December 8, 2016

Dusting for Digital Prints at Cybercrime Scenes

Author: rcubed
 1261

The most enduring principle of detective work is Locard’s exchange principle. Developed by the father of Forensic science, Dr. Edmond Locard (1877-1966), it states that a perpetrator of a crime will both take something from the scene of the crime a ...

December 7, 2016

I Passed My First Skill Certification Test: So Easy a Caveman Could Do It

Author: Olivia
 3594

Do you remember the Geico marketing campaign from a few years ago featuring cavemen with the slogan, “So easy a caveman could do it”? The driving message of this snarky humored campaign was that getting insurance is so, so easy, why wouldn’t yo ...

December 6, 2016

What’s the deal with IPV6?

Author: rcubed
 2667

Not long after the Internet and World Wide Web were unleashed on the public, plans were already underway to increase the potential pool of IP addresses available for allocation. The version of the IP protocol standard most in use today, IPv4, was rel ...

December 2, 2016

A Buzzword to Rattle your Brain

Author: Olivia
 2635

Updated October 2018 I’ve got a buzzword for you. ‘Deep learning.’ Perhaps you’ve heard of it, or maybe not. But if you’ve been following the IoT trend like I have, you’ll hear its praise there. Deep learning is a branch of machine learni ...

December 1, 2016

Why are Russians Such Talented and Determined Hackers?

Author: rcubed
 2413

When we hear about cybercrime and hacking exploits we tend to immediately assign blame to the usual suspects: the Russians or the Chinese. Next in line are hackers from other Eastern European countries formerly part of the Soviet Union such as Romani ...

November 29, 2016

Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications

Author: Olivia
 1814

Today, I’m a psychic. And my prediction for the upcoming year is this: Mobile applications will become hacker’s target of choice. According to Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, a research think tank dedicated to ad ...

November 29, 2016

Big Mac Attack: Is the Apple Macintosh Virus-Proof?

Author: rcubed
 3355

The age-old battle of supremacy between PC and Mac users dates back to the introduction of the first Mac back in 1984. I jumped on the Apple bandwagon back then with a purchase of the original Mac 128k machine. I loved it and the MS DOS machines I wa ...

November 25, 2016

Target Security Breach and the Value of Pentesting

Author: rcubed
 2252

Being that it’s Black Friday, I thought it only fitting to revisit the infamous Target Security Breach of holiday shopping seasons past. For Cybrarians, there’s a lot to take from the case, particularly in the area of pentesting and fundamental n ...

November 24, 2016

The dark side of programming

Author: Rachel Laura M
 2928

Even though the average person might not be aware of it, software is everywhere in our daily lives. Everything from online transactions, buying a smartphone, to driving a car involves software. As consumers, we assume and take for granted that the s ...

November 23, 2016

Data Security Breaches: Superman’s Kryptonite

Author: Olivia
 1348

Dust off your comic books, Superman is back. Imagine this: In the latest issue, Superman sets up a secure perimeter around Metropolis. Or at least, he thinks it’s secure. While he’s leading his other life as Clark Kent, Lex Luther takes advantage ...

November 23, 2016

[podcast] BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails

Author: BrBr
 1375

http://traffic.libsyn.com/brakeingsecurity/2016-046-Black_Nurse_buenoware_IoT_pwnage.mp3   This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popul ...

November 22, 2016

Mobile Malware Now Equals PC Infection Rates

Author: rcubed
 2464

There are currently 2 billion smartphone users in the world. These users have amassed over 268 million downloads. It should then come as little surprise that cybercriminals have turned their attention to attacking mobile devices and the users to whic ...

November 22, 2016

Nerding Out: Top 7 Most Interesting Cyber Crime Books You Should be Reading

Author: Olivia
 4924

My Kindle is my best friend. There I said it. And if you’re like me then chances are you want to soak up every ounce of knowledge you can when it comes to the topics you love. Books are a great source for that, and expanding your interests to the f ...

November 21, 2016

Is a degree in cyber security worth it?

Author: Rachel Laura M
 3943

The following statistics are very sobering and disturbing: More the 80% of US-based companies have been hacked This number includes major companies such as Target, Sony, and Home Depot These incidents caused consumer’s sensitive personal and f ...

November 20, 2016

The Ethical Hacker: How to Certify

Author: Rachel Laura M
 2727

A certified ethical hacker is a computer programmer hired by a business to attempt to break into a computer system with the purpose of discovering vulnerabilities and other things a malicious hacker could potentially exploit, resulting in significant ...

November 20, 2016

Becoming a Software Developer

Author: Rachel Laura M
 1720

According to US News and World Report, software developers enjoy a median salary of $95,510 annually. In addition to this higher than average salary, the unemployment rate is very low (about 2.5%) and people in this field enjoy a nice work-life balan ...

November 18, 2016

TCP/IP: The Next Gateway Drug? Transform Your Tech Addiction into a New Career Path

Author: Olivia
 3483

Updated August 2018 You probably opened this blog because you thought I’d be making a lot of drug references. Sorry, but I’m fresh out of Adderall.  In all seriousness though, I do want to talk to you about addiction, and not as a disappointed p ...

November 18, 2016

Is teleworking creating a greater security risk for companies?

Author: Rachel Laura M
 1312

With today’s modern and sophisticated technology such as slim and fast laptops, smartphones, tablets and programs such as Skype and FaceTime, today’s employees are no longer married to the five day, 40 hours a week of being in the office, workin ...

November 17, 2016

Insider Threat Management

Author: rcubed
 1315

A DOE contractor feeling the pressures of rising debt attempted to sell stolen uranium parts to agents of a foreign government. A government researcher who experienced a hostile work environment accessed a secured facility and intentionally left 4,00 ...

November 17, 2016

Dude, Where’s My Skill Cert? 7 Ways that our CPE Granting Skill Certifications Add Value

Author: Olivia
 1523

Let me start by asking you a question. What is your education worth to you? If your immediate thought was, well, not too much, then let me ask you another question. Would you be willing to spend about 40 minutes to learn a whole heck of a lot and get ...

November 16, 2016

[#podcast] Ben Johnson on company culture shifts, needing better job descriptions, assisting your company’s “cyber self-esteem”

Author: BrBr
 1096

http://traffic.libsyn.com/brakeingsecurity/2016-041-Ben_johnson.mp3     Ben Johnson from Carbon Black has been around the industry for a good while, and has seen a lot of ugly things in our industry. Ben had written a recent blog post (http ...

November 16, 2016

[#podcast] Aamir Lakhani discusses the DarkWeb…is all the content on the Darkweb bad? And becoming a known quantity on the DarkWeb…

Author: BrBr
 1072

http://traffic.libsyn.com/brakeingsecurity/2016-045-aamir_lakhani-the_dark_web-creating_reputation.mp3   Mr. Boettcher and I met Mr. Aamir #Lakhani at DerbyCon this year, and immediately intrigued with his work on the Dark Web. He has assisted w ...

November 15, 2016

Counterfeit Mobile Shopping Apps Steal Christmas 2016

Author: rcubed
 1466

Each holiday shopping season has a must-have gift item. Holidays past had their Cabbage Patch Kids, Mighty Morphin Power Rangers, and Legos as perennial favorites. Holiday 2016 is shaping up to have several contenders, but no clear favorite has yet e ...

November 14, 2016

The role of cyber voting scams in the recent USA Election

Author: Rachel Laura M
 1643

The US Presidential Election, which took place on November 8th, 2016 was unprecedented and will likely go down in history as the biggest political upset of all time. Former Secretary of State and First Lady Hilary Rodham Clinton ran against billionai ...

November 10, 2016

When Lithium Ion Batteries Explode

Author: rcubed
 1374

Exploding lithium ion (Li-ion) batteries in hoverboards made in China last holiday season and more recently, exploding batteries in Samsung’s Galaxy Note 7 phones has raised awareness – and paranoia – over this battery technology. It’s a tech ...

November 8, 2016

AI and Automating Incident Response

Author: rcubed
 2064

Artificial Intelligence and Automating Incident Response Updated August 2018 Managing the sheer number of alerts that get raised by incident response systems on a monthly basis has reached the point of overwhelm in many organizations. For the most pa ...

November 3, 2016

Computer Forensics and the Hillary Clinton Email Case

Author: rcubed
 3608

I thought it might be both interesting and challenging to examine the recent revelation about the newly discovered emails on Anthony Weiner’s laptop. Emails that the FBI feels may be pertinent to the Hillary Clinton Email case. It should be an Inte ...

November 1, 2016

Top Skills for Getting Hired in 2016

Author: rcubed
 3107

LinkedIn.com recently reported a spike in job applications for October 2016. At the same time, they revealed their Top Skills of 2016, an annual list of skills employers need most. If that weren’t enough, LinkedIn.com broke things down on a global ...

October 28, 2016

[Product Update] Notecards and New Lesson Pages

Author: TREVORH
 1445

Introduction Learning is a tricky thing. Research suggests 3 primary learning styles: auditory, visual, and tactile. Each person is different in the way they learn, and each technique offers various suggestions and strategies to optimize the learnin ...

October 28, 2016

Anatomy of a DDoS Attack

Author: rcubed
 3188

Friday morning October 21, 2016 didn’t get off to a good start for me. Shortly before 9 am EDT I was attempting to make an online purchase using PayPal as my payment processor of choice. When I clicked the “Submit” link (the button graphic wasn ...

October 27, 2016

Self-driving Cars: An Introduction

Author: rcubed
 1974

Elon Musk, CEO of Tesla Motors, recently announced that all the electric cars coming off Tesla’s assembly line will now be equipped to be full-on autonomous. It appears that the quest for truly self-driving cars – ones where you don’t have to s ...

October 26, 2016

Top In-Demand Cyber Security Certifications

Author: rcubed
 4787

When it comes to IT certifications most would agree that the “Big-3” essentials are CompTIA A+, CompTIA Network+, and CompTIA Security+. From there, a few specialized certs along the lines of Cisco CCNA, Linux and Microsoft certifications as well ...

October 18, 2016

Power Grid Attack – Doomsday Scenario

Author: rcubed
 2226

We’ve all heard the scare stories about how hackers will one day successfully launch a power grid attack in the US. You may have even tried to imagine it by comparing it to something you can recall from recent history such as the infamous Northeast ...

October 17, 2016

Your Incident Response Refresher

Author: Tatianna
 3245

  To get you prepared for our newest addition, the “Incident Response and Advanced Forensics” course, we’ve put together this little list of Incident Response topics just for you! Let’s dig in, shall we? Intro to Incident R ...

October 13, 2016

Cybercrime and the Gaming Industry

Author: rcubed
 3043

Groups with ominous-sounding names such as Lizard Squad, Team Poison, and the Armada Collective are making a virtual killing from cybercrime. But the attack surfaces they target aren’t what you may have come to expect. Rather than going after finan ...

October 11, 2016

Cybersecurity Excellence Awards 2017

Author: rcubed
 1952

Cast your vote for the 2017 Cybersecurity Excellence Awards, here! The need to increase awareness around the importance of cybersecurity is being championed by an increasing number of organizations and among them is the Department of Homeland Securit ...

October 7, 2016

ITT Tech Closing and Impact on Students

Author: rcubed
 2062

The ITT Technical Institute (ITT Tech for short) announced on September 6, 2016 that it was immediately ceasing operations and closing all of its campuses. Less than two weeks later, on September 16, 2016, ITT Tech filed for bankruptcy protection and ...

October 5, 2016

Women in Tech – Smashing Myths and Prejudice

Author: rcubed
 1597

What if I were to tell you that during the stone age of computing (1940s) women dominated the programming profession? You might have a difficult time believing me if you were to look around and observe the gender imbalance of women in tech today, bu ...

October 3, 2016

National Cybersecurity Awareness Month 2016

Author: rcubed
 3250

The National Cybersecurity Awareness Month 2016 is entering its 13th year this October. Founded in 2004, it is co-sponsored by the United States Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) to put the focus o ...

September 20, 2016

OWASP’s 13th Annual AppSecUSA Conference

Author: Tatianna
 1313

We’d like to invite you to OWASP’s 13th Annual AppSecUSA Conference taking place in Washington, DC, October 11-14. The event is comprised of two days of training sessions followed by a two-day conference where software security leaders, research ...

September 14, 2016

What is happening with technology?

Author: Tatianna
 2012

In a day and age where everything is online, it makes sense to use email; but why is it “a dying media”? Before I answer this question, have you ever wondered why people don’t use email? Well, one reason is all the junk or “spam” as people ...

September 14, 2016

CyDefe Cyber Security Podcast Mini Episode 5

Author: CyDefe
 1510

On this episode we discuss password leaks from Last.FM and Opera browser. You can check it out on our website www.cydefe.com or on youtube We are also doing a Qwertycards giveaway which can be found here http://www.cydefe.com/giveaway/

August 28, 2016

CyDefe Cyber Security Podcast Mini Episode 4

Author: CyDefe
 2284

On this episode Micheal and i talk about CVE-2016-5696 better known as the off path attack. You can listen to our podcast on our website cydefe.com or via our youtube channel below. If you enjoy our podcast please subscribe to our channel and follow ...

August 16, 2016

Tradecraft Tuesday – Mobile Exploitation

Author: kylehanslovan
 2326

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

August 3, 2016

CyDefe Cyber Security Podcast Episode 23

Author: CyDefe
 2001

On this weeks episode we are joined by Ben0xA who works for https://www.trustedsec.com you can follow him on twitter @Ben0xA. This week we discuss Macs and iPhones have a Stagefright-style bug, Android banking malware blocks victims’ outgoing call ...

July 30, 2016

CyDefe podcast update.

Author: CyDefe
 2378

Hey hey everyone, It’s been a little while since we’ve last posted but we figured we should pop on here and give everyone an update on our podcast. Since we’ve last posted we’ve had a few awesome episodes come out. Minicast: 1 ...

July 27, 2016

[podcast] Cheryl Biswas discusses TiaraCon, Women in Infosec, and SCADA vendor headaches

Author: BrBr
 2205

http://traffic.libsyn.com/brakeingsecurity/2016-028-Cheryl_Biswas_Tiaracon_ICSSCADA_headaches.mp3   Long time listeners will remember Ms. Cheryl #Biswas as one of the triumvirate we had on to discuss #mainframes and mainframe #security. (http:// ...

July 27, 2016

[podcast] Steps when scheduling a pentest, and the questions you forgot to ask… with Jarrod Frates

Author: BrBr
 1862

http://traffic.libsyn.com/brakeingsecurity/2016-029-Jarrod_Frates-What_to_do_before_a_pentest_starts.mp3 Jarrod Frates (@jarrodfrates on Twitter) has been doing pentests as a red-team member for a long time. His recent position at #InGuardians sees h ...

July 27, 2016

[Product Update] Introducing Cybrary Teams

Author: TREVORH
 2449

Cybrary has been working hard to release our newest platform for individuals, allowing them to learn and develop their cyber security skills on Cybrary together. Drum-roll, please…Introducing Cybrary Teams! With Cybrary eclipsing the 500,000 Re ...

July 26, 2016

Tradecraft Tuesday – Fuzzing for Vulnerabilities

Author: kylehanslovan
 2231

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

July 24, 2016

CyberPop – What’s a Proxy Server

Author: ginasilvertree
 2238

CyberPop gets your brain going! Today’s Question: What’s a Proxy Server? Answer: A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A proxy server is associated with or ...

July 24, 2016

Sunday’s Cyber Security Fact – Collaboration is Key (July 24, 2016)

Author: ginasilvertree
 1334

According to a 2016 survey by PwC: 65% of businesses surveyed are “embracing a more collaborative approach to cybersecurity, one in which intelligence on threats and response techniques is shared with external partners. Internally, organizatio ...

July 22, 2016

Report: Healthcare Under Attack – Cybercriminals Target Medical Institutions

Author: ginasilvertree
 2005

InfoArmor has identified a group of bad actors performing targeted cyberattacks on healthcare institutions and their IT infrastructure, including connected medical devices such as Magnetic Resonance Imaging systems (MRI), X-ray machines and mobile c ...

July 21, 2016

“Done for You” – Complete List of DNS Training Videos

Author: ginasilvertree
 6922

Here’s a complete list of DNS Training Videos on Cybrary (in alphabetical order by first letter). Explore additional classes and modules here… Configuring DNS Zone Transfers Length: 12:12 Configuring DNS Zones Length: 21:27 DNS Enumerati ...

July 19, 2016

Tradecraft Tuesday – AWS Cloud Hijacking

Author: kylehanslovan
 1007

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

July 17, 2016

Sunday’s Cyber Security Fact: Apple iOS Users Face More Risk (July 17, 2016)

Author: ginasilvertree
 2270

“Thanks to Apple’s tight control over its app store and operating system, threats to iPhones and iPads have been infrequent and limited in scale. This changed in 2015. In 2015, [Symantec] identified nine new iOS threat families,compared t ...

July 15, 2016

CyberPop – What is SIEM?

Author: ginasilvertree
 2187

CyberPop is a quick way to learn definitions and facts about cyber security.   Today’s Question: What’s SIEM Answer: The combined process of incident detection and incident response (pronounced “sim”). Includes features such as ale ...

July 14, 2016

[podcast] DFIR conference, DFIR policy controls, and a bit of news

Author: BrBr
 1359

  http://traffic.libsyn.com/brakeingsecurity/2016-027-DFIR_policy_controls.mp3 Mr. Boettcher is back!  We talked about his experiences with the #DFIR conference, and we get into a discussion about the gap between when incident response is and w ...

July 13, 2016

See How “My Notes” Continues to Grow on Cybrary

Author: ginasilvertree
 2487

Recently, Cybrary released the “My Notes” feature, which members use to their personal record notes while take free cyber security training class. Since its inception, many users have leveraged this tool to capture critical information, t ...

July 10, 2016

Sunday’s Cyber Security Fact: Unique Pieces of Malware (July 10, 2016)

Author: ginasilvertree
 1488

“Symantec discovered more than 430 million new unique pieces of malware in 2015, up 36 percent from the year before. Perhaps what is most remarkable is that these numbers no longer surprise us. As real life and online become indistinguishable ...

July 8, 2016

CyberPop – What’s Remediation?

Author: ginasilvertree
 1392

CyberPop is a quick way to learn more definitions and facts about cyber security. Today’s Question: What’s Remediation Answer: What an organization does to limit or stop an attack once it’s detected, as part of incident response. Includes ...

July 6, 2016

“Done for You” – The Complete List of Python Training Classes (Plus a Bonus)

Author: ginasilvertree
 8935

Advanced Activities in Python Length: 39:47 Basic Python Commands and Functions Length: 29:47 Ctypes in Python Length: 31:32 Data Structures in Python Length: 31:36 Exceptions and Classes in Python Length: 28:05 Exploit Development (part 5) Python L ...

July 6, 2016

Cyber Workforce Solution: Hire More Veterans

Author: ginasilvertree
 2631

By Kathleen Smith For the last several years, cyber security leaders and business owners have been lamenting the worldwide hiring crisis for cyber security professionals[1]. From building new educational programs, to discussing the relaxation of immi ...

July 3, 2016

Sunday’s Cyber Security Fact: Cyber Security Standards (July 3, 2016)

Author: ginasilvertree
 1535

What are Cyber Security Standards?   “Cyber security standards are various forms of security standards which enable entities and organizations to practice security techniques to help minimize the number of cyber security attacks. In essenc ...

July 2, 2016

“Done for You” – Collection of Content on How to Prevent Ransomware

Author: ginasilvertree
 3146

Today, most companies are deeply concerned about how to prevent ransomware. News stories abound and Infosec professionals are scrambling to keep themselves and their users out of the fire. Below, you’ll find a compilation of content to underst ...

July 1, 2016

CyberPop – What’s Penetration Testing or Pentesting?

Author: ginasilvertree
 2131

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What’s Penetration Testing or Pentesting?   Answer: “Penetration Testing or Pentesting refers to techniques for actively testi ...

June 30, 2016

[podcast] Windows Registry, Runkeys, and where malware likes to hide

Author: BrBr
 1718

http://traffic.libsyn.com/brakeingsecurity/2016-025-Windows_Registry-RunKey_artifacts-finding_where_malware_hides.mp3 The Windows Registry has come a long way from it’s humble beginnings in #Windows 3.11 (Windows for Workgroups).  This week, w ...

June 30, 2016

[podcast] Kim Green, on CISO-aaS, the Redskins Laptop, and HIPAA

Author: BrBr
 1357

http://traffic.libsyn.com/brakeingsecurity/2016-025-Windows_Registry-RunKey_artifacts-finding_where_malware_hides.mp3   We are pleased to introduce Ms. Kim Green (Twitter: @kim1green). She is the CEO of KAZO Security, as well as the CISO / CPO o ...

June 29, 2016

Got Burgeoning Hacking Skills? Consider a Degree in Cyber Security

Author: ginasilvertree
 2394

Got burgeoning hacking skills? Growing cyber security talents? A compelling mission to join or continue working in the cyber security industry? A cyber security degree is something to seriously consider: Cybercrime continues to grow into more of a ...

June 28, 2016

[Product Update] New Cybrary Certificate of Completion

Author: TREVORH
 4560

We love feedback from our Userbase. We have thousands of Users taking Cybrary classes on a daily basis and wanted to ensure that a Cybrary Certificate of Completion is a valuable measure of achievement. It should be something you’re proud to s ...

June 28, 2016

Tradecraft Tuesday – Mastering Cyber Attribution

Author: kylehanslovan
 1905

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

June 26, 2016

Sunday’s Cyber Security Fact – Operation “Get Rich or Die Trying” (June 26, 2016)

Author: ginasilvertree
 1633

Operation “Get Rich or Die Trying” — Beginning in 2005 and for a more than a three year period, American hacker Albert Gonzalez, along with accomplices in Russia and the Ukraine, pulled off what has been called the largest cyber crime of all t ...

June 24, 2016

CyberPop – What Does ‘Kill Chain’ Mean?

Author: ginasilvertree
 1906

CyberPop is a quick way to learn definitions, terms and facts about cyber security.   Today’s Question: What does ‘Kill Chain’ mean? Kill Chain is a “military-inspired term encompassing the various stages of a cyber atta ...

June 21, 2016

Tradecraft Tuesday – $60M Heist: The DAO Hack

Author: kylehanslovan
 2295

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

June 21, 2016

“Done for You” List of Exploit/Exploitation Videos

Author: ginasilvertree
 5282

According to the pentest-standard.org website, “The purpose of the Post-Exploitation phase is to determine the value of the machine compromised and to maintain control of the machine for later use. The value of the machine is determined by the ...

June 19, 2016

Sunday’s Cyber Security Fact: The Angler Exploit Kit’s Rate of Infection (June 19, 2016)

Author: ginasilvertree
 1580

Angler Manages to Infect more than One Million Workstations a Year “There is a common misconception that a user explicitly needs to download a malicious file in order to get his PC infected. Exploit kits use a technique called drive-by-downloa ...

June 17, 2016

CyberPop – What are Exploit Kits?

Author: ginasilvertree
 1802

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What are Exploit Kits? According to Wikipedia, “an exploit kit is a software kit designed to run on web servers, with the purpose of ...

June 14, 2016

“Done for You” – The Complete List of Information Security Governance and Risk Management Training Videos

Author: ginasilvertree
 3430

  Information Security Governance and Risk Management professionals maintain and enforce policies to ensure the preservation of information security and build plans to account for applicable risks. Watch these videos to learn more!   Infor ...

June 14, 2016

Tradecraft Tuesday – HDRoot Bootkit

Author: kylehanslovan
 3450

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

June 13, 2016

[Product Update] Introducing My Notes

Author: TREVORH
 20494

We’re very excited to launch My Notes on Cybrary. My Notes was developed after spending a good deal of time speaking with Users and learning what we could provide to help improve the experience on the site. Researchers found that if important ...

June 12, 2016

Sunday’s Cyber Security Fact: Vulnerability of Web Apps (June 12th, 2016)

Author: ginasilvertree
 1929

” A staggering 98% of tested web applications were vulnerable to attack. Web apps are everywhere now, and it’s essential that updates and patches are installed so known vulnerabilities are addressed.” – 2015 Trustwave Global Secur ...

June 11, 2016

CyberPop – What was Heartbleed?

Author: ginasilvertree
 2127

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What was Heartbleed? A widespread vulnerability discovered in April 2014 that put user passwords (and other sensitive information) on popul ...

June 8, 2016

“Done for You” – The Complete List of Kali Linux and Linux Training Videos on Cybrary

Author: ginasilvertree
 11594

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers. (from Wikipedia ...

June 7, 2016

[podcast] Earl Carter dissects the Angler Exploit Kit

Author: BrBr
 1614

Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the #Angler EK. He starts us off wit ...

June 6, 2016

[Product Update] Introducing the New Course Catalog

Author: TREVORH
 1773

Today, we’re introducing the new course catalog on Cybrary. To date, Users have had limited flexibility when it comes to sorting through our course catalog. Taking into account some great User feedback, we’ve included the ability to filte ...

June 5, 2016

Sunday’s Cyber Security Fact: Breach Detection (June 5th, 2016)

Author: ginasilvertree
 1530

“The majority of data breach victims surveyed, 81 percent, report they had neither a system nor a managed security service in place to ensure they could self-detect data breaches, relying instead on notification from an external party. This was ...

June 4, 2016

CyberPop – What’s “Dwell Time?”

Author: ginasilvertree
 2208

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What’s “Dwell Time?”   Answer: “Duration, usually in days, that a vulnerability or infection remains undete ...

June 1, 2016

[podcast] Carbon Black’s Ben Johnson: EDR and threat intel

Author: BrBr
 2027

  Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client’s endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security stra ...

June 1, 2016

“Done for You” – List of Malware Training Videos

Author: ginasilvertree
 4702

Here’s a “done for you” list of Cybrary’s Malware Training Videos. Enjoy!   Incident responders (or Malware Analysts) perform appropriate malware analysis in order to fix the current infections and prevent future ones. M ...

May 31, 2016

Tradecraft Tuesday – RUAG Breach Breakdown

Author: kylehanslovan
 6037

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

May 29, 2016

Sunday’s Cyber Security Fact: Startling Belief (May 29, 2016)

Author: ginasilvertree
 1257

Despite almost daily reports revealing the contrary, 44% of organizations still believe they can keep attackers off their network entirely. – CyberArk’s 2015 Global Advanced Threat Landscape Survey

May 27, 2016

CyberPop – Define Code Injection

Author: ginasilvertree
 1649

CyberPop tests your knowledge and builds your strength as an Infosec pro. Today’s Question: Define Code Injection Answer: An attack or pentest that introduces malicious code into a software application, which executes the code when the applicati ...

May 25, 2016

“Done for You” – List of TCP/IP Training Videos

Author: ginasilvertree
 4531

Let’s begin…   TCP .IP Internet Protocol Length: 15:48   TCP/IP Configurations (part 1) Length: 07:30   TCP/IP Configurations (part 2) Length: 11:33   TCP/IP Configurations (part 3) Length: 13:14   TCP/IP Configu ...

May 24, 2016

[podcast] Software Restriction Policies and Applocker

Author: BrBr
 1226

http://traffic.libsyn.com/brakeingsecurity/2016-018-software_restriction_policy-applocker.mp3 Windows has all the tools you need to secure an OS, but we rarely use them.  One example of this is ‘Software restriction policies’ or the use ...

May 20, 2016

“Done for You” – List of Hacker Training Videos

Author: ginasilvertree
 5885

Here’s a concise list of offensive Hacker Training Videos on Cybrary (in alphabetical order by first letter). Enjoy!   Google Hacking Length: 3:24 Google Hacking Lab Length: 25:40 Hacking Web Servers (Whiteboard) Length: 19:36 Info Gat ...

May 20, 2016

CyberPop – Name the 7 Stages of an APT Attack

Author: ginasilvertree
 2873

CyberPop from Cybrary aims adds to your knowledge as an Infosec pro.   Today’s Question: Name the 7 Stages of an APT Attack   According to Wired.com, the 7 stages are: 1. Reconnaissance 2. Intrusion into the network 3. Establishing a ...

May 18, 2016

S3SS10N Wednesday – Hashing Algorithms For Data Integrity

Author: Tatianna
 1847

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Kelly Handerhan Skilled ...

May 17, 2016

Tradecraft Tuesday – IoT Worm Casestudy

Author: kylehanslovan
 1993

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

May 15, 2016

Sunday’s Cyber Security Fact: Education and Awareness (May 15, 2016)

Author: ginasilvertree
 926

According to a recent survey, some 42% of survey respondents said security education and awareness for new employees played a role in deterring a potential [cyber] criminal. — “US cybercrime: Rising risks, reduced readiness; Key findings from th ...

May 11, 2016

S3SS10N Wednesday – How to Break into a Company from the Internet (part 1)

Author: Tatianna
 2820

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Andrew McNicol Andrew (@ ...

May 10, 2016

Tradecraft Tuesday – Verizon Breach Report Overview

Author: kylehanslovan
 1532

#content-block-background-1542 { background-image: url(); background-position: center top; background-repeat: no-repeat; background-color: #fff; background-attachment: scroll; background-size: auto; } # ...

May 6, 2016

A Missing Piece That’s Hurting Your Company’s Cyber Security Efforts

Author: ginasilvertree
 1268

Take a moment to consider your company’s cybersecurity efforts. Do you picture your IT and security teams devising proactive technical solutions and dealing with threats? If so, that’s a typical and valid response.   Yet, there’s another k ...

May 6, 2016

Next Generation Mobile Hacking Techniques

Author: StevenE
 10502

What is Mobile Hacking? With the alarming rate of advances in technology and affordability, a New Wave of Hackers has reached the shores of the infosec world. And the preferred choice of platform for these next generation hackers? The Mobile Phone. T ...

May 4, 2016

S3SS10N Wednesday – IP Security (part 2)

Author: Tatianna
 1937

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Kelly Handerhan Skilled ...

May 3, 2016

Tradecraft Tuesday – COM Scriptlets & the Squiblydoo Attack

Author: kylehanslovan
 1977

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

April 27, 2016

S3SS10N Wednesday – IP Security (part 1)

Author: Tatianna
 2304

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Kelly Handerhan Skilled ...

April 21, 2016

[PODCAST] Episode 22 The one after the long break

Author: CyDefe
 989

On this weeks episode we discuss checking for malware in your firmware with Google’s VirusTotal, Getting pwned by hearthstone hacking tools, Fake Flash Update Serves OS X Scareware, and the FBI trying to scrub its employees data off of the web ...

April 20, 2016

S3SS10N Wednesday – Ransomware, Where It Fits In Your Budget

Author: Tatianna
 2066

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

April 19, 2016

A Big Thank You to Joe Taylor!

Author: ryan
 996

I just wanted to take a minute to thank Joe Taylor @jbtaylor051 for making a substantial donation today. Joe purchased a huge amount of Cybytes, and the team here at Cybrary would like to say thank you!

April 18, 2016

Tradecraft Tuesday – Hacking Team Breach Overview

Author: kylehanslovan
 2519

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

April 13, 2016

S3SS10N Wednesday – Malware Persistence 101

Author: Tatianna
 1640

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

April 6, 2016

[podcast] Michael Gough, the ISSM model, and the 5 P’s

Author: BrBr
 1306

http://traffic.libsyn.com/brakeingsecurity/2016-013-michael_gough-the_5_Ps.mp3 Direct Link: http://traffic.libsyn.com/brakeingsecurity/2016-013-michael_gough-the_5_Ps.mp3 iTunes: https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id79 ...

April 6, 2016

[podcast] Ben Caudill on App Logic Flaws, and Responsible Disclosure”

Author: BrBr
 1226

http://traffic.libsyn.com/brakeingsecurity/2016-012-Ben_Caudill-Application_Logic_Flaws.mp3 Ever bought “-1” of an item on a retail site? Or was able to bypass key areas of an application and get it bypass authentication, or you were able ...

April 6, 2016

S3SS10N Wednesday – These 4 Steps Will Prevent You From Ransomware Destruction

Author: Tatianna
 2596

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

April 5, 2016

Tradecraft Tuesday – Malvertising (Malicious Advertising)

Author: kylehanslovan
 1787

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

April 4, 2016

Cyber Resilience [A Primer]

Author: ginasilvertree
 1533

In 1903, “Magician and inventor Nevil Maskelyne disrupted John Ambrose Fleming’s public demonstration of Guglielmo Marconi’s purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditoriu ...

March 30, 2016

S3SS10N Wednesday – What It Means to Be a Cyber Professional

Author: Tatianna
 1952

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and Subject Matter Experts’s. They are designed to provide you with a quick dose of cyber security learning. New episodes from v ...

March 25, 2016

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section

Author: ginasilvertree
 1031

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section Relevance to the Readership: Potentially high. A Google search on “cybersecurity news sites,” returned this site as the second listing on the SERP. This site may likely have ...

March 23, 2016

S3SS10N Wednesday – Aggregation, Inference, and Polyinstantiation

Author: Tatianna
 2785

You must be a Cybrary member to view this S3SS10N Wednesday Video .. Login or Join for Free Now

March 15, 2016

S3SS10N Wednesday – How to Sell Compliance to Management

Author: Tatianna
 2627

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

March 14, 2016

Hector Monsegur, on being a reformed “Black Hat”

Author: BrBr
 2024

Hector Monsegur has had a colorful history. A reformed black hat who went by the name ‘Sabu’ when he was involved in the hacker collectives “Lulzsec” and “Anonymous”, he turned state’s evidence for the FBI, w ...

March 9, 2016

[podcast] R-CISC Exec. Dir. Brian Engle, on threat intel

Author: BrBr
 1239

http://traffic.libsyn.com/brakeingsecurity/2016-009-brian_engle_rcisc_information_sharing.mp3 We’ve reached peak “Br[i|y]an” this week when we invited our friend Brian Engle on to discuss what his organization does. Brian is the Exe ...

March 8, 2016

S3SS10N Wednesday – History of Cyber Security Intelligence

Author: Tatianna
 2526

What is S3SS10N Wednesday? S3SS10N Wednesdays are our weekly 15 minute (or less) lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will ...

March 7, 2016

[podcast] History of DNS, DNS reconnaissance in pentests, and protecting your DNS infrastructure

Author: BrBr
 1093

http://traffic.libsyn.com/brakeingsecurity/2016-010-DNS_Reconnaissance.mp3   DNS… we take it for granted… it’s just there. And we only know it’s broken when your boss can’t get to Facebook. This week, we discuss the ...

March 3, 2016

Cyber Security Degrees Remain Critical, Though Certs Drive the Industry

Author: ryan
 4612

Diving a little deeper Previously, I’ve written about the value of cyber security degrees and wanted to dive a little deeper into this topic. Lately, I have had a series of conversations on this topic. The opinion I’ve formed on the sub ...

March 2, 2016

S3SS10N Wednesday – Build Your Own Pen Testing Lab

Author: Tatianna
 5725

What is S3SS10N Wednesday? S3SS10N Wednesdays are our weekly 15 minute lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will be availab ...

March 1, 2016

[PODCAST] Episode 21 The 2015 Wrap Up

Author: CyDefe
 802

Hey hey everyone after a very long break due to work, education, and family circumstances we are finally back. On this weeks episode we are joined by Ben Miller and Jayson Street. We discuss three stories from 2015 and talk about our predicitons for ...

February 24, 2016

[podcast] Pentesting and Defending a Mainframe and Mainframe Security

Author: BrBr
 1661

http://traffic.libsyn.com/brakeingsecurity/2016-008-mainframe_secruity.mp3 This week’s super-sized episode is brought to us thanks to previous guest Cheryl Biswas. You might remember her from our “Shadow IT” (http:/brakeingsecurity ...

February 24, 2016

S3SS10N Wednesday – Initialization Vectors

Author: Tatianna
 1244

You must be a Cybrary member to view this S3SS10N. Don’t worry, membership is completely free! Join Now Login

February 17, 2016

[podcast] Application Profiling with FingerprinTLS!

Author: BrBr
 933

We first heard about FingerprinTLS from our friend Lee Brotherston at DerbyCon last September. Very intrigued by how he was able to fingerprint client applications being used, we finally were able to get him on to discuss this. We do a bit of history ...

February 11, 2016

[podcast] “Moxie vs Mechanisms”: The Over-Dependence on Tools and Automation

Author: BrBr
 924

This week starts with an apology to Michael Gough about comments I (Bryan) mangled on the “Anti-Virus… What is it good for?” podcast. Then we get into the meat of our topic… a person’s “Moxie” vs. a mechanism ...

February 10, 2016

S3SS10N Wednesday – Cellphone Search and Seizure Laws

Author: Tatianna
 1589

You must be a Cybrary member to view this S3SS10NS. Membership is free! Register Now Login Whiteboard Notes (Click the picture below to open in a new tab)   The Supreme Court Decisions of Riley v. California and U.S. v. Wurie (seizure of cell ...

February 3, 2016

S3SS10N Wednesday – Kerberos in Depth

Author: Tatianna
 2301

What is S3SS10N Wednesday? S3SS10N Wednesdays are our weekly 15 minute lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will be availab ...

February 1, 2016

[podcast] Dropbox Chief of Trust and Security Patrick Heim!

Author: BrBr
 1007

Patrick Heim, Chief of Security and Trust at Dropbox Brakeing Down #Security had the pleasure of having Patrick Heim join us to discuss a number of topics.   What stops many traditional #companies from moving into #cloud based operations? What h ...

February 1, 2016

February is #SecureCodingMonth at Cybrary!

Author: ryan
 1201

The team at Cybrary has officially named February: #SecureCodingMonth Given that secure coding principles are often so overlooked in most CS programs and coding classes, we feel the obligation to fill the coding security void. There are many courses ...

January 24, 2016

[podcast] Infosec Author Bill Gardner

Author: BrBr
 966

BrakeSec Podcast welcomes Bill Gardner this week! #Author, #InfoSec Convention Speaker, and fellow podcaster… We break a bit from our usual rigid methods, and have a good ol’ jam session with Bill this week. We talk about #vulnerability # ...

January 17, 2016

[podcast] Anti-virus (…what is it good for… absolutely nothing?)

Author: BrBr
 1297

http://traffic.libsyn.com/brakeingsecurity/2016-003-AntiVirus_what_is_it_good_for.mp3 #Anti-virus products… they have been around for as long as many of us have been alive. The first anti-virus program, “The Reaper” was designed to ...

January 14, 2016

Building Threat Analyst Centaurs Using Artificial Intelligence

Author: klowe
 1170

When you think of a centaur, thoughts of a mythical creature that can perform threat analysis doesn’t exactly come to mind, does it? Enter Recorded Future’s artificial intelligence system – poised to provide both intelligence and s ...

January 13, 2016

It’s 2016…and Recorded Future is Naming the 3 Hottest Security Trends for the New Year

Author: klowe
 1042

  As every security professional knows, for every ‘Happy New Year!’ shout, hoot and holler, there’s a heck of a lot additional commotion going on surrounding another issue—a new year of new security threats. And while it ...

January 11, 2016

[podcast] Cryptonite – or how to not have your apps turn to crap

Author: BrBr
 1152

This week, we find ourselves understanding the #Cryptonite that can weaken devs and software creators when dealing with #cryptographic #algorithms and #passwords. Lack of proper crypto controls and hardcoded passwords can quickly turn your app into c ...

January 7, 2016

[#podcast]: Jay Schulmann explains how to use BSIMM to enhance your security program

Author: BrBr
 942

#Jay #Schulman is a consultant with 15+ years of experience in helping organizations implementing #BSIMM and other compliance frameworks.  For our first #podcast of 2016, we invited him on to further discuss BSIMMv6 and how he has found is the best ...

January 4, 2016

Android Authority features the previously banned Cybrary App

Author: ryan
 1099

The good folks over at Android Authority featured our Android App, which of course was previously banned in the Google Play Store. Again, thanks to all of you who caused an uproar, which ultimately got the app reinstated by Google Play. Here is the ...

December 30, 2015

Cybrary is Seeking a WordPress Web Developer, Full-Time in Maryland

Author: ryan
 1110

ATTENTION: Web Developers in the Washington DC / Baltimore, MD area!! Here is a chance to come work for us!! We are seeking a talented WordPress developer to join our team, and work with us to continue to build our rapidly growing community and learn ...

December 28, 2015

[podcast] Interview with ISC2 Board member Dave Kennedy

Author: BrBr
 989

Dave Kennedy does a lot for the infosec community. As owner/operator of 2 companies (Binary Defense Systems and Trusted Security), he also is an organizer of #DerbyCon as well as creator and active contributor to the Social Engineering ToolKit (#SET) ...

December 17, 2015

[podcast] Interview with ISC2 board member Wim Remes…

Author: BrBr
 1068

I got a hold of Mr. Wim Remes, because he was elected to the ISC board in November 2015.  Recent changes to the CISSP included changing the long-standing 10 domains down to 8 domains, plus a major revamp to all of them. I wanted to know what Mr. Rem ...

December 16, 2015

Cybrary’s 2016 Cyber Security Job Trends Report [Infographic]

Author: ryan
 12226

Recently, we surveyed 435 senior-level cyber security professionals on topics surrounding the cyber security job market, and discussed the directions the market may be heading. As we’ve discussed many times, cyber security’s skills gap is ...

December 14, 2015

Tell us what you think about the new course pages!

Author: Tatianna
 2447

We’ve realized that it might have been confusing for some people on where to start a class since all of the “good stuff” was buried under hundreds of page scrolls. Well now we’ve re-arranged the main course pages. The informa ...

December 10, 2015

[podcast] MITRE’s ATT&CK Matrix:

Author: BrBr
 1811

#MITRE has a matrix that classifies the various ways that your network can be . It shows all the post-exploitation categories from ‘Persistence’ to ‘Privilege Escalation’. It’s a nice way to organize all the information ...

December 7, 2015

[podcast] Can you achieve Security Through Obscurity?

Author: BrBr
 1285

That’s the question many think is an automatic ‘yes’.  Whether your httpd is running on port 82, or maybe your fancy #wordpress #module needs some cover because the code quality is just a little lower than where it should be, and y ...

December 3, 2015

Around the World with Cybrary

Author: TREVORH
 1025

Globally, cyber security shortages are expected to reach upward of 1.5 million by the year 2020. As the Cybrary community reaches the 300,000 registered users mark; we found this a great opportunity to thank everyone that has contributed and continu ...

December 1, 2015

Google Hears Cybrarian’s Appeal, Lifts Ban on Free Cyber Security Training App

Author: ryan
 1478

This post is an update to my previous post about Cybrary’s Android app being banned from the Google Play store: https://www.cybrary.it/2015/11/google-play-against-cybersecurity-education-and-for-censorship-you-decide/ Thank you Cybrarians, for your ...

November 29, 2015

[PODCAST] Episode 20 Another giveaway episode

Author: CyDefe
 1135

On this week’s episode we discuss Microsoft’s operations center to fight cyber threats, Dell added Cylance, a bug in Gmail app for Android allows anyone to send spoofed emails, and Siri’s lockscreen bypass. This weeks episode also has a codewor ...

November 25, 2015

Google Play – Against Cybersecurity Education and for Censorship? You Decide

Author: ryan
 4061

What we are about to present are facts regarding why the Google Play Support team decided to remove our app from their app marketplace, and how this position by Google Play reflects a negative stance against the free flow of cyber security education, ...

November 25, 2015

A Career in Cyber Security

Author: TREVORH
 6928

Cybersecurity – Choosing a Career As computer systems store more and more confidential personal, financial, medical, and top secret data, protecting that data is becoming more and more important to governments and businesses, worldwide. Enterpris ...

November 17, 2015

Please Help! The November Invite Campaign

Author: ryan
 1182

Hello Fellow Cybrarians, As you know, our promise to you at Cybrary is that we will continue to provide new, cutting edge cyber security classes for free, forever. We will never ask you to pay for our classes. We are working hard to continue to buil ...

November 10, 2015

Cybersecurity Industry Certifications: What You Need to Know

Author: TREVORH
 8287

Cybersecurity certifications are very often required for employment in cybersecurity jobs. Certifications benefit employers by identifying prospective employees with specific skill sets, and certifications help prospective employees stand out when a ...

November 9, 2015

Think a Cybersecurity Job is All Technical? Think again.

Author: TREVORH
 4253

Struggling to get that promotion or land that cybersecurity job? Have all the right skills/certifications/years of experience but things just don’t seem to work out? You’ve read about the demand for cyber professionals, seems like a no brainer th ...

November 6, 2015

Increasing Millennials’ Interest in Cyber Security Careers

Author: TREVORH
 2250

Cyber security is a booming field with many positions available, but Millennials seem to be largely ignorant of these opportunities. In order to stay on top of the demand for cyber security specialists, both current professionals and educational ...

November 5, 2015

5 Reasons Cyber Professionals Don’t Worry About Job Security

Author: TREVORH
 5336

Updated August 2018 Job security in the field of Cyber Security: Cyber security, as much as it seems to be just a buzzword as of late, is very much part of our present and future lives. Today’s cyber industry is more than just “generic I ...

November 4, 2015

Top 5 Highest Paying Cyber Security Jobs

Author: TREVORH
 11185

Cyber security jobs offer lucrative financial rewards for protecting the nation’s computer networks and data from attack or unauthorized use. These top five highest paying positions command six-figure salaries: 1. Chief Information Security Officer ...

November 4, 2015

Remember Remember the Fifth of November – #RememberRemember

Author: ryan
 1047

In honor of November 5th, we will be issuing double Cybytes on all Cybyte based activity (not on purchases, these ones you have to earn). Cybytes activities can be found here: https://www.cybrary.it/cybytes/ So, any time on 11/5/2015, login and acc ...

November 3, 2015

Choosing A Career in Cybersecurity: Public Sector or Private Sector?

Author: TREVORH
 4662

With the proliferation of hack attacks and cybersecurity breaches, there is a growing need for cybersecurity experts and, therefore, there are an increasing number of opportunities in cybersecurity for those entering the work place or wanting to chan ...

November 3, 2015

Big Cybersecurity Budget Means Big Business for Defense Contractors

Author: TREVORH
 966

Following last month’s $1billion contract awarded to Raytheon from the Homeland Security Department, the Pentagon is now taking bids from defense contractors to help protect against the digital future. Big industry names such as Raytheon Co., Lockh ...

November 3, 2015

Looking for a Security Clearance? You Better Pay Attention to Cybrary!

Author: ryan
 990

Finding a job that will sponsor you for a US Security Clearance is pretty tough to do. Many jobs out there in the US Cyber Security jobs market require that you already have a clearance. People know all to well, that in the USA, a Security Clearance ...

November 2, 2015

RECONSTRUCTING THE CYBER TALENT PIPELINE

Author: TREVORH
 889

A “Cyber Talent Pipeline” refers to an organization’s creation of an going, readily available, talent pool to fill various cyber security jobs, as they become available. The effects of a poorly maintained pipeline is hitting the cyber secu ...

October 29, 2015

CyDefe podcast episode 19

Author: CyDefe
 892

Episode 19 of our podcast is up at CyDefe.com/podcast. On this weeks episode we are joined by Shannon Morse. We discuss hacking chip and pin cards, malware that replaces your browser, a FitBit danger, and the rise of OS X malware. Have a listen and ...

October 28, 2015

Take the Cybrary Cyber Security Survey – Win an iPad!

Author: klowe
 1116

Did you know that the demand for skilled cyber security professionals is growing four times faster the overall IT job market, and 12 times faster than the total labor market? Currently there are more than a million open job postings for cyber se ...

October 26, 2015

[podcast] WMI, WBEM, and enterprise asset management

Author: BrBr
 944

WMI (Windows Management Instrumentation) has been a part of the Windows Operating system since Windows 95. With it, you can make queries about information on hosts, locally and even remotely. Why are we talking about it? Its use in the enterprise and ...

October 26, 2015

Help Our Android App!!

Author: ryan
 1003

Hello Cybrarians, I hope you all had a great weekend! Many of you know that Two weeks ago, we launched our Android Application, which is available here https://play.google.com/store/apps/details?id=com.cybrary.app I would like to ask for your help i ...

October 20, 2015

Help Name the Cybrary Community

Author: Tatianna
 2778

We’ve toiled and wracked our brains trying to figure out what to call our members, but nothing ever seemed good enough.   Trying to explain who our global community is in just a name is trickier than it seems. Now you get the chance to voice you ...

October 16, 2015

How to Get a Cyber Security Job on Cybrary

Author: klowe
 1240

Getting hired has never been an easy process. Between revamping your resume and spending hours on LinkedIn searching for ‘networking opportunities’, looking for a new job can be both time-consuming and frustrating. Enter Cybrary’s ...

October 15, 2015

Traversing the Cyber Corridor

Author: TREVORH
 1023

Washington D.C., Virginia, and Maryland are being called the hub for cyber security jobs. Driven by an exorbitant federal budget and an influx of venture capital, demand for cyber security professionals is not only high, but, as basic economics tells ...

October 13, 2015

We’ve Gone Mobile

Author: Tatianna
 2360

Get even more convenient access to Cybrary through our Android mobile app so you can learn how to hack, crack and exploit nearly anything. Our developer @akhaliq92 has worked diligently over the past several months to make your mobile experience bett ...

October 13, 2015

Cyber Security from a College Student’s Perspective

Author: Maddie
 996

Typically, October equals Halloween. The month of October is also national cyber security awareness month. Sure it’s all about the haunted houses, frightening decorations, and scary costumes. Do you know what else is scary? Viruses and malware. The ...

October 12, 2015

[podcast] Guardrails vs. Speedbumps

Author: BrBr
 848

When we wanted to have Martin Fisher on, it was to discuss ‘Security Mandate vs. Security Influence’. We wanted to discuss why companies treat compliance as more important, and if it’s only because business requires it to be done. A ...

October 8, 2015

CyDefe Podcast Episode 18

Author: CyDefe
 978

Hey hey everyone. We at CyDefe have released another awesome episode of our cyber security podcast. On this week’s episode we discuss fake blue screen of death, ad blocking, a critcal WinRAR vulnerability, and a shortage of cyber professionals. Yo ...

October 6, 2015

The Twisted Security Honey Pot Network

Author: klowe
 994

Sure, maybe you’d like to think you possess the manpower to monitor your computer networks 24/7, but we all know that’s simply impossible.  Thus, threats come as they may, and you might be sleeping when one attempts to overthrow your da ...

October 6, 2015

Java Programmers Competition IPPC: Show Me Your Speed

Author: ryan
 1029

Cybrary would like to announce a really cool Java programming competition by our friends at NextHacker. Check it out:  Java Programmers Competition IPPC: SHOW ME YOUR SPEED!  We are already convinced that there are many gifted programmers and inge ...

October 5, 2015

Jobs are coming!

Author: Tatianna
 1043

Employers Want YOU!   If you are searching for a job or looking to change to a career in IT or Cyber Security, our developer has created something special for you. Cybrary’s job platform was created for employers, recruiters – and yes – Y ...

September 18, 2015

Hacked Through Phishing: An Ugly Security Awareness Lesson Learned

Author: ryan
 2528

Given we’re a cyber security education company, we like to preach (maybe too much at times) about how darn important security awareness training for employees really is. So, we thought we’d share the hideously ugly lesson that internet ...

September 16, 2015

Why Using Study Guides Make a Big Difference

Author: klowe
 1743

You know those times where you took an exam without studying, and still did well? We hate to break it to you, but those times don’t exist in the Infosec world.  Sure, you may have one or two baby Einsteins who can sit through a five-day bootc ...

September 3, 2015

Why Hundreds of Thousands of People are Learning Hacking, for Free

Author: ryan
 1293

Perhaps it is somewhat shocking that hundreds of thousands of people are learning hacking, for free on Cybrary. However, there are several very good reasons for this free cyber security learning revolution. A fundamental change in the way cyber secur ...

August 19, 2015

CyDefe Podcast Has a Cool Tee Shirt, Help Support Their Kickoff!

Author: ryan
 992

There is a cyber defense podcast that launched a couple of months ago called CyDefe, and they have been doing some really cool things. Their focus, and tagline, is “Making cyber defense simple”. I had the pleasure of joining this podcast ...

August 7, 2015

A Synopsis of Personally Identifiable Information (PII) for End-User Security

Author: ryan
 2166

Updated October 2018 Regarding, end-user security, the term PII is commonly referenced. PII, or Personally Identifiable Information, consists of data that can allow an individual to trace and/or contact another person. This type of information may ...

August 4, 2015

Security Awareness – How to Spot Spoofed Emails and URLs

Author: ryan
 3646

Security Awareness Training has migrated from a “nice to have” security function within an organization, to now, a “must have.” In fact, more quickly than ever, companies of all sizes and industries are integrating security aw ...

July 9, 2015

Security Awareness, Now Available at Cybrary!

Author: ryan
 970

Great news! Our End User Security Awareness training course, is now available from Cybrary. No matter how well trained the cyber security staff is within your organization, the greatest vulnerability remains just that, a huge vulnerability, if it re ...

July 3, 2015

Minimize Vulnerability to VMEscape

Author: ryan
 1209

Are you familiar with the process of a virtual machine’s OS separating from its parent’s hypervisor, which is known as VMEscape? Are you familiar with the key vulnerabilities that exist within the VMEscape process? Here is how you mitig ...

June 29, 2015

Security+ Certification Success by Cybrary Member @aer9480

Author: ryan
 3257

Below is an email we received from Cybrary Member @aer9480. He wrote to tell us about the success he had in passing the exam after taking our Security+ Course. If you have a similar success story, we’d love to share it. Send an email telling u ...

June 23, 2015

Why Isn’t That Course Live Yet?!

Author: klowe
 2451

We get it. We truly do. We’re JUST as excited about our new classes as you. We understand the anticipation, the anxiousness and the frustration. You joined Cybrary just for Malware Analysis. You refresh the Metasploit course page daily.  We ge ...

June 23, 2015

CompTIA Security+ Certification, Evolution and Innovation for Sustained Relevancy

Author: ryan
 1263

Many companies, throughout the years, have failed because they failed to innovate and change. Many great market leaders, like Kodak, even held in their hands the future of their industry, and still refused to embrace it. Change is always difficult fo ...

June 22, 2015

The Role of Information Security Governance and Risk Management in the CISSP certification

Author: Rachel Laura M
 2203

The Certified Information Systems Security Professional (CISSP) certification is a strong credential to have for professionals who have a mix of both technical and managerial experience as well as competence in designing, engineering and the overall ...

June 16, 2015

Education: the first line of defense in wireless network security

Author: Rachel Laura M
 1299

Wireless networks are fast and convenient and allow for many devices to be connected on a network and communicate with each other. However, this technology presents a new set of issues that weren’t present in the wired world. Mainly, threats to sec ...

June 16, 2015

The Limitations of Modern Cryptography

Author: Rachel Laura M
 2435

Individuals now own multiple electronic devices – from Smartphones, to tablets, to laptops and more. They often bring these items into the workplace, or use them to work from a remote location. Increased threats to a company’s important and c ...

June 13, 2015

A Good Plan is Crucial in the Fight against Cyber Crime

Author: Rachel Laura M
 894

In a physical crime scene, say a home has been burned down as a result of an arsonist or maybe a home has been burglarized, the role of first responders on the scene is very important. These skilled individuals must be able to avoid contaminating the ...

June 11, 2015

Cybrary is Going Global!

Author: klowe
 1196

Calling all Spanish, French and German Speakers Cybrary’s mission is to provide free cyber security and IT training to people across the globe. However, as an English-only website, we have been limited in our ability to reach people who do no ...

June 11, 2015

Learning from Home: How to succeed at Cybrary’s Online Learning

Author: Tatianna
 1476

Updated August 10, 2018 When taking classes to prepare for exams, there are important factors to consider. With Cybrary’s courses, much of the class material is based on watching videos. While this may be great for some people, for others it is not ...

June 9, 2015

What is the CIA Triad? Confidentiality, Integrity and Availability

Author: ryan
 7084

The CIA triad is becoming the standard model for conceptualizing challenges to information security in the 21st century. CIA stands for confidentiality, integrity and availability, which are said to be the three most important elements of reliable se ...

June 8, 2015

Ethical Hacking: It’s not an oxymoron.

Author: Rachel Laura M
 3189

When most people think of a hacker, they think of a dishonest individual who uses techniques to bypass a system’s defenses and steal confidential and sensitive information. Security breaches, data as well as identify theft are all incidents which c ...

June 8, 2015

The Growing Field of Digital Investigation

Author: Rachel Laura M
 1036

Computer related crime is very prevalent in this day of global communication, people bringing their personal electronic items to work as well as many companies having people who do not work in house but instead opt to work remotely. For this reason, ...

June 4, 2015

Vulnerability Assessment & Penetration Testing, An Analysis

Author: ryan
 2932

The following is a re-post of the excellent PowerPoint presentation created by Cybrary SME @ethicalmjpen regarding Vulnerability Assessment and Penetration Testing and how the two differ, and overlap. We wanted to share this on the blog because the c ...

June 3, 2015

The Importance of the CompTIA Network+ Course for a Cyber Security Career

Author: ryan
 2890

Many of the Members that join Cybrary, join because they are looking to begin a career in cyber security. This is obviously a great idea given that the amount of unfilled jobs in cyber security, globally, is estimated to be over 1 million. The questi ...

June 3, 2015

The Key Notes of Cryptography

Author: Rachel Laura M
 1804

Public key cryptography has been around for a long time. Whitfield Diffie and Martin Hellman invented it in 1976. It sometimes goes by the name Diffie-Hellman encryption as well as symmetric encryption as it uses to keys instead of one (this is calle ...

June 2, 2015

The Emerging and Growing field of E-Discovery

Author: Rachel Laura M
 958

Electronic discovery, also known as e-discovery refers to a process of how information is obtained, located and secured to be used as evidence in a civil or criminal legal case. E-discovery can be carried out in the following ways: Offline On a part ...

June 2, 2015

All You Needed to Know about the CompTIA CASP Certification

Author: Rachel Laura M
 2186

The CompTIA Advanced Security Practitioner (CASP) certification is a credential that designates professionals IT industry with advanced-level security skills and knowledge. The CASP certification is approved by the United States Department of Defense ...

June 2, 2015

Is Security Awareness Training a Worthy Investment?

Author: ryan
 848

Over the past few years, the news has been full of stories detailing how large corporations put the security information of tens of thousands of their clients at risk. More times than not, these risks came as the result of low-level employees doing t ...

May 28, 2015

Useful Tools for Security Professionals

Author: klowe
 2052

Threat intelligence company Recorded Future has just released a daily email service that will deliver up-to-date information on the latest threat indicators for IT and cyber security professionals. The service, called the Cyber Daily, is a free news ...

May 22, 2015

What Enterprise End User Security Awareness Effectiveness Requires

Author: klowe
 1021

The end user security awareness industry has taken off substantially in the last several years. As more and more organizations are breached and embarrassed publicly due to end user negligence or malevolence, the mass adoption of “we need to do ...

May 15, 2015

Create a Culture of Cyber Security Learning in Your Organization

Author: ryan
 886

Cybrary’s initiative is to make cyber security learning free and open for everyone, everywhere. This basically means, we want to provide the opportunity to learn to those who either want to begin a career in the field, or for those who want to ...

May 6, 2015

Summarizing The Five Phases of Penetration Testing

Author: ryan
 69885

In the ethical hacker class on our website, the course begins by recapping the five phases of penetration testing. Essentially, the five phases of pen testing is a module that summarizes what the rest of the ethical hacker class is going to look like ...

April 24, 2015

Add some swagger to your Profile

Author: CybrarySupport
 1445

Show off Your Achievements Use Cybrary often? Completed several courses? Show off what you’ve worked so hard for! Now that you have earned the cred make sure to share your achievement! Our L337 Emblem is available below along with a code snippe ...

April 21, 2015

Coding and Cyber Security, Hand-in-Hand, Yet Different

Author: ryan
 1796

We often get asked by our Members, if we plan on offering coding classes. The short answer is no, and typically, what we do, is refer people to sites like Codecademy and Code Fellows. Those companies specialize in coding / programming training, and h ...

April 20, 2015

Password Cracking: How to Do It

Author: klowe
 3802

  In order to get into a secured system, you’ll have to first break in—and a lot of times, the first step in doing so requires cracking a password. Contrary to popular belief, password cracking doesn’t actually require a lot o ...

April 20, 2015

The Starting Point of all Major Public Hacks: Footprinting

Author: ryan
 1763

Want to Know How and Where All Major Data Breaches Begin? With all of the publicity major corporate data breaches receive, we often get caught up in the outcomes. What happened, how many people were impacted and in what ways, who was responsible, et ...

April 16, 2015

Start Learning Mobile Penetration Testing and the Smartphone Pentest Framework

Author: ryan
 9869

The Smartphone Pentest Framework (SPF) in Kali Linux is an increasingly useful tool, initially developed by Georgia Weidman. The 5 part tutorial for how to use the SPF is part of the Advanced Penetration Testing class, which of course is free, just l ...

March 12, 2015

Classes That Help You Build a Cyber Security Career

Author: ryan
 2097

This post will begin by assuming you have a baseline skill set in information technology. Generally, in order to begin your career in Cyber Security, you would need some fundamental skills. Often, in the IT training industry, baseline skills include ...

March 6, 2015

Please Help Cybrary’s Kickstarter Campaign

Author: ryan
 944

The first month and a half here at Cybrary have been really fun. So far, we are hearing from our Members that they appreciate what we are doing. I have spoken on this blog before about why we believe so firmly, that the opportunity to learn should be ...

February 10, 2015

Red Team Vs Blue Team Review

Author: Admin Anthony
 13417

What is Red Team & Blue Team? At its core, there are two main players in any cybersecurity or penetration testing event. While the terminologies for the two sides vary (Hackers vs. Defenders, ‘Bad Guys’ vs ‘Good Guys’, etc.) one of the mo ...

February 6, 2015

Education is Too Limited, but Change is On Its Way

Author: ryan
 1053

Hopefully, with the support of our Members, Cybrary can be successful. Why? Because the education system both domestically here in the USA, and internationally, is flawed, badly. Education is far too limited. If one is not born into a family that hig ...

January 27, 2015

Everyone Deserves the Opportunity to Learn

Author: ryan
 1151

“Education is the most powerful weapon which you can use to change the world.” -Nelson Mandela For too long IT & Cyber Security education has been reserved for those who have the money to pay highly inflated prices. In the growing technologic ...

January 15, 2015

 The Liberation of IT & Cyber Security Training Begins

Author: CybrarySupport
 1349

My Fellow Cybrary Members, We sincerely want to thank you for joining the revolution to liberate IT and cyber security training, for everyone, everywhere. The support you are providing will change the very landscape of the industry forever. I am post ...

January 5, 2015

Thank You for Joining the IT Learning Revolution

Author: ryan
 1623

Hello Cybrary Members, First, we are appreciative that you have decided to join our community. We cannot survive without members, and we are working very hard to make your learning experience here as excellent as possible. The training on Cybrary is ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel