0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Secure PII From Threat Actors
By: Nihad Hassan
September 21, 2021

As the world continues its movement to become fully digital, people's dependence on digital technology to conduct all types of work increases. These days, most data is created digitally and never goes into the paper. According to Statista, the total amount of data created, captured, copied, and consumed globally is forecasted to increase rapidly to reach more than 180 zettabytes ...

How Much Does The CISM Exam Cost?
By: Sara Faradji
September 21, 2021

While becoming a Certified Information security Manager requires a substantial investment in time and money, alumni can potentially earn six-figure salaries. Summary: *While eligible candidates will need to pay up to $760 to take a Certified Information Security Manager (CISM) exam, the accreditation requires a significant investment in time to prepare properly. To be eligible for entering the exam, candidates must ...

Certified Ethical Hacker vs. CompTIA PenTest+: Which One Should You Choose?
By: Will Carlson
September 20, 2021

While the CEH and the CompTIA PenTest+ are very similar certifications, there are important differences candidates should be aware of before they decide. Summary: *The Certified Ethical Hacker and CompTIA PenTest+ accreditations have a lot in common, and both are widely recognized. However, there are some important differences that candidates should be aware of before they pursue one or the other. ...

What You Need To Know To Be A Cybersecurity Analyst
By: Shimon Brathwaite
September 20, 2021

Many people are aware of cybersecurity as one of the most profitable career fields in the 21st century. STEM (science, technology, engineering, and mathematics) has a good reputation as a high-paying career field. While they aren't the only way to make money, they are a good place to start, especially cybersecurity. However, they don't understand what cybersecurity is or ...

(Benefits of a CISSP Certification) What Are The Benefits Of Having CISSP-Certified Employees
By: Charles Owen-Jackson
September 17, 2021

With cybersecurity now being a critical enabler of innovation in the modern enterprise, leaders must make sure to have the necessary expertise on their side. Summary: *As cybercrime becomes increasingly widespread and difficult to manage, business leaders must overcome the acute skills shortage in this space. Enrolling employees in CISSP and other training programs boosts the prospects of long-term success and ...

How To Pass CCSP
By: Shelby Welty
September 16, 2021

Becoming a Certified Cloud Security Professional requires proficiency across six key domains that reflect today's security leaders' biggest challenges. Summary: *Certified Cloud Security Professionals are experts in implementing and managing secure cloud-based apps and data systems. Passing the exam requires proficiency across six domains, which reflect the most pertinent issues today's security leaders face. Here is an overview of what candidates ...

Creating A BYOD Policy
By: Nihad Hassan
September 16, 2021

The new trend of remote work is expanding rapidly to include all types of organizations in different industries. The COVID-19 pandemic has boosted remote work; although the pandemic begins to fade slowly, there is no sign that businesses are abandoning the remote work paradigm. BYOD is an acronym for Bring Your Own Device. It is the practice of allowing employees to ...

Difference Between Ethical Hacking And Cybersecurity
By: Jenn Barnabee
September 15, 2021

What is the difference between ethical hacking and cybersecurity? Ethical hackers often work with security teams to help them build proactive defense strategies, but there are important differences between these roles. Summary: *Ethical hacking is a rapidly growing trend at a time when proactive cybersecurity is top of mind for many business leaders. Certified ethical hackers routinely work with security leaders ...

How To Pass The CISM Certification Exam
By: Tatianna Harris
September 15, 2021

The Certified Information Security Manager (CISM) credential from ISACA is one of the most esteemed certifications in cybersecurity today. Achieving the designation demonstrates that an IT professional is qualified to create and manage security systems. The official exam for this high-level certification is challenging, having a 40-50% first-time fail rate. However, it is a certification that is worth working for. ...

How Does Ethical Hacking Work?
By: Prasanna Peshkar
September 14, 2021

It can be exhausting for infosec outsiders to know or understand a lot about ethical hacking: the exact meaning and how it works. This article will explain how ethical hacking works. Let us take a look. What is Ethical Hacking? Ethical hacking is known as the hacking of machines, systems, computer networks, or web applications by the hacking expert ...