Cybrary’s Cyber Security Blog

Cybrary’s official company blog.

You’ll find official announcements and other news and stories from the team and our friends in the cyber security industry. The product is evolving at a rapid pace, check back for product updates.

Begin Learning Cyber Security for FREE Now!

Already a Member Login Here
July 24, 2019

Botnet Structures and Attacks

Author: lpark

Botnets are a powerful tool for hackers and cybersecurity professionals. Composed of many connected and “infected” devices, botnets are used to carry out user actions on a grand scale. This article explores popular examples of botnets, their str ...

July 22, 2019

VoIPhreaking: Phone Phreaking for the 21st Century

Author: lpark

Voice over IP, or VoIP, is an internet technology that relies on online infrastructure to make phone calls. Techniques developed during the frontier days of hacking, phone phreaking, are becoming relevant through VoIP networks. Mobile devices, smart ...

July 21, 2019

Understanding and Preventing Advanced Persistent Threats (APTs)

Author: Tatianna

Advanced Persistent Threats (APT) are a new type of threat that developed out of standard hacking techniques. APTs are composed of multiple attacks, infiltration, and malware installations through one or many organizations. They are often large in s ...

July 19, 2019

Most Frequently Used Mobile Hacking Techniques

Author: lpark

Mobile hacking is a versatile field that is on the rise, but how do malicious hackers and cybersecurity professionals approach the subject? This section explores the main techniques for the exfiltration of personally identifying information from mob ...

July 17, 2019

The Development of Infrastructure Attacks

Author: lpark

Hacking and cybersecurity incidents can take on a character of great variation. Anything from a simple prank to a widespread shutdown of essential services is considered “hacking”. The field of cybersecurity can cover a very broad spectrum of ac ...

July 16, 2019

Symlink Attacks

Author: lpark

Every year, new techniques and exploits are developed to compromise websites. Often times, these exploits are used in vulnerability assessments to improve the security of websites and web hosting services. Because of this, major hacks and exploits c ...

July 13, 2019

Mobile Deauthentication Attacks

Author: angelawood

TL;DR: Deauthentication attacks have been around for a long time, and new techniques for altering wireless network connections have developed around new technologies. Mobile apps with working de-authentication protocols are easily accessible on the ...

July 11, 2019

Pricing a Vulnerability Assessment

Author: thorlacher2322

Penetration testing and vulnerability assessment are an essential step in securing an organization’s communications networks. In some cases, such as hospitals and other public facilities, vulnerability assessments are required by law. How much can ...

July 9, 2019

Notorious Hacking Groups of the 21st Century

Author: lpark

TL;DR: Coordinated hacking groups carry out some of the most visible attacks in the cybersecurity industry. No matter their motivations, hacking groups can gain notoriety and exposure from their works. This section looks at some of the most notoriou ...

July 9, 2019

Get to Know Your Instructor: Kitt Parker

Author: lpark

Fun Facts About Kitt! What course do you teach? Introduction to SQL What is an interesting fact about you? I enjoy building personal computers and servers with hardware pieces. I then overclock them to push their limits. Your favorite food ...

July 7, 2019

Current Threats in Ransomware

Author: Mike G.

Ransomware “Growth” Ransomware attacks have gained prominence in recent times, and industries and governments across the world have implemented policies and advisories to counter the threat. The attack involves a malicious program that holds use ...

July 5, 2019


Author: lpark

Clickjacking techniques involve convincing the user to click on something that they did not intend to click. This approach is often used to spread malware or gain unauthorized control of devices. This section explains the history of clickjacking, its ...

July 2, 2019

Get to Know Your Instructor: Abdulrahman Alnaim

Author: slwelty

Fun Facts About Abdulrahman! What course do you teach? Cybersecurity Kill Chain™ What is an interesting fact about you? I love and enjoy the marine life and stay close to it as much as I can. For that reason I picked scubadiving to be a ho ...

July 2, 2019

Securing Your Network against Passive Reconnaissance

Author: kenunderhill

Passive reconnaissance is an important tool for penetration testing and the beginning point of many data breaches. The process involves gathering available public information that could be used to compromise the organization. This section explores pa ...

July 1, 2019

Hitting Revenue Goals: The ROI for Your Team’s Training

Author: lpark

Updated October 2019 It is important to provide training for organization members to help achieve revenue goals, with a positive return on investment (ROI) for the team’s training. The revenue goals are important for an organization because it dri ...

June 29, 2019

Why Training is Important for Every Organization

Author: lpark

Updated October 2019 Training your employees is extremely important for any type of organization. It does cost time and money – however, it can cost an organization up to three times an employee’s salary to lose them in the first year due to ...

June 28, 2019

Creative Wardriving

Author: Ki

With wardriving being around for some time, so there has been opportunities for new, innovative approaches of wardriving to develop. With the ultimate purpose of creating an accurate map of wireless networks, wardriving techniques have developed alon ...

June 26, 2019

Top Cyber Security Threats for 2019: Shadow IT

Author: lpark

Shadow IT is a cybersecurity innovation and a natural product of cloud computing services. While shadow IT networks can pose a serious security risk, they can also provide benefits in organizational efficiency. This section explores the concepts and ...

June 23, 2019

Top Cyber Security Threats for 2019: Cryptojacking

Author: lpark

Cryptojacking is an attack used to illicitly generate cryptocurrency. Coin mining clients are installed covertly on target devices and run as a hidden background process. Preventing cryptojacking means securing network communications and performing ...

June 22, 2019

IT Certifications for Cybersecurity Professionals: Part 2

Author: mketner1

TL;DR: IT certifications are absolutely necessary for many positions in the cybersecurity industry. This section further explores some of the most valuable IT certifications for cybersecurity professionals. The certifications detailed below can be fo ...

June 21, 2019

IT Certifications for Cybersecurity Professionals: PMP, CCDA, CEH & CRISC

Author: lpark

There are many IT certifications that can be applied in a direct or general way towards positions in cybersecurity. General certifications like Project Management Professional certification can qualify candidates for a wide variety of positions and s ...

June 18, 2019

IoT Botnets

Author: lpark

The Internet of Things is a new, popular trend in commercial and consumer technology, and this trend is creating new vectors of attack for malicious hackers. A new type of botnet, the IoT botnet, has emerged in the wake of the Internet of Things. Thi ...

May 31, 2019

Get to Know Your Instructor: Steve Dance

Author: slwelty

Fun Facts About Steve! What course do you teach? Creating effective User Awareness Training What is an interesting fact about you? PADI qualified open water diver Your favorite food? Most of it! Can we connect with you on social? Twitter ...

May 21, 2019

Get to Know Your Instructor: Gabrielle Hempel

Author: slwelty

Fun Facts About Gabrielle! What course do you teach? Introduction to SIEM Tools What is an interesting fact about you? I’m 6’0” and the shortest in my family! Your favorite food? Sushi, donuts, poutine. Is coffee a food? &nbs ...

May 10, 2019

Google Hacking Techniques for 2019

Author: Tatianna

Google has been a powerful tool in the cybersecurity industry for a long time. Specialized searches can be used to gather information that is publicly available, but searches can also be used to compromise security systems. Many technologies, inclu ...

May 9, 2019

Finance and Cyber: How Spending and Growth Work in Cybersecurity

Author: Tatianna

Cybersecurity solutions are an alluring product for many organizations with important digital assets and controls to protect. For many organizations both public and private, cybersecurity spending is required by standards laws. This drives the dema ...

May 8, 2019

Understanding SkyGoFree

Author: cybergary

Remote Access Trojans, or RATs, have been a key part of the cybersecurity landscape for many years. These remote tools are covertly deployed on target devices. Once installed, the program allows extensive control and surveillance through the device ...

April 29, 2019

Wireless Access Points – Info Gathering and Impersonation

Author: kenunderhill

PII Gathering A false access point, or fake WAP, is a passive information-gathering technique used by malicious hackers and cybersecurity professionals. The basic idea is a wireless access point that is designed to lure users and collect data or ...

April 22, 2019

Get to Know Your Instructor: Natasha Staples

Author: slwelty

Fun Facts About Natasha: What courses do you teach? Introduction to Splunk What is an interesting fact about you? I have two spice cupboards. Your favorite food? Stuffed grape leaves Can we connect with you on social? Twitter: @purplehype ...

April 15, 2019

Cybrary and CSFI Announce Strategic Alliance to Expand Training and Career Guidance Offerings to Cyber Warfare Professionals

Author: slwelty

The DC-based non-profit’s strategic alliance will provide CSFI members access to the web’s largest cybersecurity training and career development platform College Park, MD – April 15, 2019 – The Cybersecurity Forum Initiative (CSFI) ...

April 12, 2019

Get to Know Your Instructor: Ian Loe

Author: ebiettchert11

Fun Facts About Ian: What course do you teach? Fundamentals of Cybersecurity Architecture What is an interesting fact about you? I love to cook and also create cooking videos on youtube. I am also an active scuba instructor. Your favorite ...

April 4, 2019

Get to Know Your Instructor: Trent Darrow

Author: slwelty

Fun Facts About Trent: What courses do you teach? GNS3 and CCNA ICND1 What is an interesting fact about you? I enjoy rocking out to metal music and driving my Focus ST around (not fast…) Your favorite food? Bacon-wrapped Venison backst ...

March 29, 2019

Get to Know Your Instructor: Kathryn Mclver

Author: slwelty

Fun Facts About Kathryn: What course do you teach? Lean Six Sigma Yellow Belt What is an interesting fact about you? When I am not reading volumes of studies and trying to make my subjects fun, I am a ballroom dancer- sequins and princess dr ...

March 26, 2019

Get To Know Your Instructor: Tim Stover

Author: slwelty

Fun Facts About Tim: What course do you teach? Guide to the Tor Browser What is an interesting fact about you? Along with cybersecurity, I have experience and love for film production, Batman, and Spawn! Your favorite food? I am not a picky ...

March 26, 2019

Get To Know Your Instructors: Cristi Vlad

Author: slwelty

Fun Facts About Cristi: What course do you teach? Ethical Hacking Tools with Python What is an interesting fact about you? I like to play multiple sports: soccer, swimming, kick-boxing, weight-lifting, crossfit, jogging and sprinting are only ...

March 25, 2019

Get To Know Your Instructors: Timothy McLaurin

Author: slwelty

Fun Facts About Timothy: What course do you teach? PCI DSS What is an interesting fact about you? I spent 3 years living in Japan! Your favorite food? Thai Can we connect with you on social? Twitter: @BlueMcLaurin   The Q & ...

March 23, 2019

Self Development in Cybersecurity

Author: Tatianna

Seeking Work in Cybersecurity Self-development is a crucial component of the careers of many cybersecurity professionals. For many, self-development is the beginning and foundation of their careers. Certification courses provide opportunities for ...

March 21, 2019

Top Cyber Security Threats for 2019

Author: camiragano

Phishing Attacks Phishing, as in “phishing for phools”, is a cybersecurity approach that has been around for a long time. However, new defenses and security techniques have forced phishing to evolve. The proliferation of information provides a ...

March 20, 2019

The ITIL Effect: Is this certification still worth it?

Author: Tatianna

Is This Service Certification Still Worth It? Certifications offer a dual benefit for IT professionals with improved career opportunities and increased compensation. Organizations also come out ahead since highly-skilled, well-trained technology staf ...

March 19, 2019

Software Subversion

Author: Tatianna

Applications and Software Software subversion is a cybersecurity technique that directly targets the inner workings of an application. Anti-subversion software is designed to prevent software subversion attacks, but it’s essential to understand ...

March 17, 2019

Today’s Top Career Options for Cyber Professionals

Author: Tatianna

Cybersecurity professionals have many unique career opportunities, and the positions and terminology change as the industry evolves. Let’s take a look at some of the career options available today to professionals in cybersecurity. Information S ...

March 15, 2019

Cybersecurity Insurance

Author: Gunner Kerr

What’s the point of cybersecurity insurance? Cybersecurity insurance is crucial to the function of many organizations that rely on digital assets, but it is not widely understood. Unlike other types of insurance, cybersecurity insurance policies ...

March 14, 2019

Workforce Development: How Companies Train Their Employees

Author: Tatianna

Put the “Work” in Workforce How does a company train its employees? Current employees and new hires often undergo a training process to give them the skills needed to fulfill their role. The landscape of cybersecurity is growing increasingly c ...

March 13, 2019

Preparing Against Social Engineering

Author: Tatianna

Security Awareness is Cybersecurity Social engineering is a cybersecurity approach that affects individuals and organizations both public and private. Bypassing the technical aspect of hacking, social engineering relies on convincing an individual ...

March 11, 2019

PMP Certifications, Are They Worth It?

Author: filr

What Other Jobs/Industries Use PMPs? Project management professional (PMP) certification is an invaluable asset for many project managers in virtually any field. The Project Management Institute (PMI) is a nonprofit that handles PMP certification a ...

March 9, 2019

Get To Know Your Instructors: Victor Pearson

Author: slwelty

Fun Facts About Victor: What course do you teach? Guide to Passing PMI/PMP Certification Exam What is an interesting fact about you? I am a general aviation pilot and if you watch my courses, you may see pictures of me flying. Your favorite f ...

March 9, 2019

Kali Linux Around the World

Author: kenunderhill

What is Kali Linux? As we explored in previous sections, Kali Linux is an open source operating system based on Debian Linux. The operating system is designed specifically for penetration testing and other cybersecurity tasks, and it comes equippe ...

March 8, 2019

Understanding Data Integrity

Author: ryankstewart

What is data integrity and why is it so important? Data integrity is about protecting your data against manipulation, harmful maintenance practices, or unwanted modifications. It is crucial for applications and services that require accurate, prote ...

March 7, 2019

Get to Know Your Instructors: Howard Pincham

Author: slwelty

Fun Facts About Howard What course are you teaching? Installing and Configuring Windows 10 What’s your favorite food? Tater Tots (don’t tell my wife) An interesting fact about you: I used to drive trucks during my college years. I kep ...

March 4, 2019

Retaining IT Talent

Author: Tatianna

Tackling Cybersecurity Turnover: Best Practices to Retain Top Talent The cybersecurity workforce gap is growing: Recent research shows a shortfall of nearly three million skilled professionals worldwide. More worrisome? Almost 60 percent of compani ...

March 1, 2019

Creating a Cybersecurity Team

Author: Tatianna

Experts, Assemble! Creating Your IT “Dream Team” Cybersecurity is a team sport. Even the best infosec experts can’t manage network, cloud computing, and mobile device security on their own — but attempting to tackle complex cybersecurity is ...

February 27, 2019

Get to Know Your Instructors: Rob Thurston

Author: slwelty

Fun Facts About Rob What course are you teaching? NMAP What’s your favorite food? Mexican and Texas Barbeque, sometimes together What is your favorite hobby? I love running and golf (oops, that’s two) Social media handles?http ...

February 23, 2019

I’m PMP Certified. What’s Next?

Author: ebiettchert11

So, you are PMP certified. What’s the next step? Aside from applying to a PMP certified position, you will need to periodically renew your credentials and attend professional development units. As it turns out, there are some recurring costs and te ...

February 21, 2019

Getting Certified? Why PMP Training is Good for Everyone

Author: Tatianna

The Cost of PMP Training Project management professional (PMP) certification is one of the most sought-after designations across industries and geographies. Why? Because companies recognize the need for project management leaders capable of handlin ...

February 20, 2019

The Cost of CISSP Training for Practitioners and Businesses

Author: Tatianna

The Cost of CISSP Training Certifications offer value for IT professionals. The industry is running short on highly-skilled technology staff, forcing companies to reconsider their priorities and ensure they’re hiring the best fit for long-term RO ...

February 18, 2019

Learning Kali Linux: Courses, Practice, and Other Resources

Author: Tatianna

The Cost to Learn Kali Linux Information security professionals are in demand. As noted by Forbes, companies are struggling to fill 40,000 infosec jobs every year — so it’s no surprise that average salaries have been steadily climbing and compa ...

February 15, 2019

The Cost to Learn Computer Forensics

Author: Tatianna

The Cost to Learn Computer Forensics (CHFI) Digital risks are on the rise. Companies face multiple challenges across IT environments including malicious outside attacks, insider threats and the emergence of new software and hardware vulnerabilities ...

February 14, 2019

The Cybersecurity Workforce Gap: Growth Challenges and Solutions

Author: Tatianna

Many businesses and organizations have been adapting to the rapid pace of information technology and cybersecurity. These advancements create new opportunities as well as security risks for the organizations that use them. As a result of these chan ...

February 12, 2019

“Ok Google. What is Forensic Analysis?”

Author: Tatianna

Yep, we’ve all been there, whether it’s Alexa, Google, Siri, or some other ambiguous AI that helps answer our questions; I often find myself starting my morning with “Alexa, what’s the weather?” or “Alexa, how ...

February 7, 2019

Free Kali Linux Training & Tools

Author: Tatianna

Kali Linux is a free and open source Debian-based operating system. The operating system comes equipped with many powerful cybersecurity tools, many of which are free and open source as well. Many cybersecurity professionals rely on Kali Linux for ...

February 4, 2019

Cybersecurity Degrees: The Pros + Cons Explained

Author: Tatianna

As with nearly everything in life, there are pros and cons (advantages and disadvantages, positives and negatives, etc.), but what side is more effective in helping someone make a decision? The facts There are many degree programs and educational ...

January 31, 2019

Network Attacks: Entrenchment & Exfiltration

Author: cyberwriter

SSH, Telnet, Exfiltration, and Whoami? For many cybersecurity professionals, simply compromising a network may only be the first step in an attack. It may require a great technical effort to gain undetected access to a network, but entrenchment in ...

January 29, 2019

Computer Forensics Jobs: How to get a job, and what you should know

Author: Tatianna

How does one find work in computer forensics? What types of organizations offer work in the field? What certifications and qualifications do they require? In this section, explore the necessary steps towards acquiring a job in computer forensics. ...

January 26, 2019

Computer Forensics Jobs: Is it really that difficult to enter the field?

Author: Tatianna

Finding work and getting certified in computer forensics is not as difficult as one might think. Even without a background in programming or cybersecurity, it is still possible to acquire the skills necessary to carry out computer forensics. It’ ...

January 23, 2019

Data Privacy Day 2019: How to Stay #PrivacyAware

Author: Tatianna

You know all about privacy settings; from personal settings on your social media accounts to how to keep your passwords [you know, the ones you’ve written down and stuck to the bottom of your keyboard] hidden. But do you know the importance of ...

January 23, 2019

Securing Critical Data with Traditional Media

Author: cyberwriter

Advancements in information technology have greatly accelerated the pace of communications and by extension, the way people interact with each other. Outside of the digital divide, virtually anyone can be reached through some system of digital co ...

January 18, 2019

Computer Forensics Jobs: Are there jobs available?

Author: Tatianna

Long story short, there is work available in computer forensics for a variety of different cybersecurity roles. But you want more info than that, right? Get ready… It’s all in the Science Forensic science is constantly developing and c ...

January 16, 2019

New to Cybrary: Katie Wandtke

Author: Tatianna

New to Cybrary: Katie Wandtke One of the newest members to the Cybrary team is Katie. The Cybrary Team wants to introduce you to the newest woman on-board and why she is a vital part of Cybrary’s future. “Erin, HR is a Joke” – ...

January 15, 2019

Building Botnets with VPS and Virtualization

Author: Tatianna

A botnet is a network of devices running automated tasks as “bots”. Bots can carry out any type of complex task at high speeds indefinitely. Often times a botnet is used to carry out many tasks at once or simulate the activity of network user ...

December 27, 2018

IT in the C-Suite, Part 2: Becoming a CISO

Author: Tatianna

C-suites are making room for chief information security officers. This security-focused executive position is gaining ground as enterprises look for ways to safeguard networks and services without compromising their bottom line. As noted by CBR, the ...

December 14, 2018

How Haaz Skipped the Entry-Level Job and Shattered the “No Experience” Barrier

Author: slwelty

Haaz is an Insider Pro member who used Cybrary to successfully change career fields. Prior to Cybrary, Haaz encountered many adversities when applying to entry-level jobs with little to no experience. Cybrary’s online learning community gave Haaz ...

December 8, 2018

All •Cybrary LIVE courses are FREE to attend Monday 12/10 and Tuesday 12/11


  Monday and Tuesday, December 10th and 11th, we are offering •Cybrary LIVE courses FREE to all users! For these two days only, you can attend any live course to experience the power of the unlimited access Insider Pro and Enterprise member ...

December 6, 2018

Balancing Network Risk and Cost by Scale

Author: cyberwriter

It is not always an easy task determining which approach and what amount of resources are necessary to secure networks from cyber attacks. Protecting important information is essential when resources are at risk, but there are wasteful approaches ...

December 4, 2018

LAN Turtles and Hardware-Based Network Reconnaissance

Author: Tatianna

There are a countless number of ways to monitor a network, and often times this means gathering target information and using software to perform reconnaissance. The software is used in acquiring a host target within an organization, extracting inf ...

November 28, 2018

Success Series: 20% Pay Raise. 2 Cybersec Masters Programs Offers. 1 Determined IT coordinator.

Author: Admin View

Nuno Filipe Romão Pereira lives in Portugal and works in Lisbon as a System Administrator and IT department Technical Coordinator. After a few months as a Cybrary Insider Pro, he experienced some amazing results from his career development studies ...

November 28, 2018

IT in the C-Suite, Part 1: What is a CISO?

Author: Tatianna

IT in the C-Suite, Part I: What is a Chief Information Security Officer? Technology equals opportunity for enterprises: The opportunity to attract new customers, increase efficiency and drive greater revenues. The problem? Technology also presents an ...

November 19, 2018

Access Buildings with Social Engineering

Author: Tatianna

Social engineering has always been a strange topic. If there’s something posted online about it, it’s either boring and no-one wants to read it, or it’s misconstrued as a “here’s how you can perform social engineering” t ...

November 15, 2018

New to Cybrary: Joe Perry

Author: Tatianna

New to Cybrary: Joseph Perry One of the newest members to the Cybrary team is Joseph Perry. You may have already seen his Python for Security Professionals course, but we want to introduce you to the SME behind the course and why Joe is an important ...

November 11, 2018

Is your cell phone under surveillance?

Author: cyberwriter

Cellphones have become a ubiquitous influence in many individuals’ lives. And although every cell phone owner walks around with a device in their pocket – or in hand – that is capable of tracking their location and transmitting a wide r ...

November 5, 2018

Career Change From Military Logistician to I.T. Specialist – Success Series

Author: cybergary

Justin B. is an Insider Pro member who chose to make a change in his career path, and made it happen with his own motivation, determination, and ambition.  Here’s his success story, in his own words: Where to start, it has been a crazy y ...

November 5, 2018

Spoofing: RFID and SMS

Author: Tatianna

Spoofing, in Simple Terms First, let’s start with a definition – What is Spoofing? According to ForcePoint, “Spoofing is the act of disguising a communication from an unknown source as being from a known, trusted source. Spoofing c ...

November 3, 2018

Task Automations on MacOS – AppleScript

Author: cyberwriter

AppleScript (AS) is not a name frequently used in cybersecurity. This specific language is based on JavaScript and is used exclusively for automation tasks within the Mac OS. AppleScript can be used to move and click a mouse, enter text, resize windo ...

November 1, 2018

New to Cybrary: Ken Underhill, Master Instructor

Author: Tatianna

New to Cybrary: Ken Underhill, Master Instructor One of the newest members to the Cybrary team is Ken Underhill, CEH, CHFI. You may have already seen his new Ethical Hacking course which launched a few weeks ago, but we want to introduce you to the S ...

October 31, 2018

“I smell a rat!” – AhMyth, not a Myth

Author: Tatianna

Remote access trojans and remote administration tools were originally developed to access, surveil, and control traditional computing devices like laptops and desktop computers. However, these tools have naturally evolved to work with more modern co ...

October 30, 2018

MCSA or Network+ — Which Offers the Biggest Benefit?

Author: Tatianna

MCSA or Network+ is on the list of the most asked questions in Cybersecurity. Depending on the path you choose, or job you’re interested in, the answer of which offers the best benefits might surprise you. Let’s dig in, shall we? The IT ...

October 27, 2018

Cyber Security Hardware Tools

Author: Tatianna

When learning about modern cybersecurity tools and techniques there is often an emphasis placed on software tools and programs used to gather information, compromise devices, and gain access to restricted features and functions. However, there exists ...

October 24, 2018

Certification Showdown: MCSA vs CCNA

Author: Tatianna

Certification Showdown: MCSA vs CCNA, Who Wins? IT budgets are on the rise as companies look to bolster technology teams and drive business outcomes. As noted by ZDNet, predicted budgets for 2019 are on-track for 10 percent increases over this year ...

October 22, 2018

Successful Security isn’t from Tools – Here’s Why!

Author: cyberwriter

The Opportunity for Successful Security Lies In Automation And Consolidation, Not More Tools In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision ...

October 18, 2018

Solving Security Problems: Are Hodgepodge Solutions the Answer?

Author: cyberwriter

Firms Throw a Hodgepodge of Solutions at Security Problems In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results ...

October 16, 2018

Reconnaissance and Surveillance: Keyloggers

Author: cyberwriter

An important tool for reconnaissance and surveillance, the keylogger is a program that records keystrokes on a device and maps them to a log. By reviewing this log, one can collect a wide range of useful and important information. As users enter thei ...

October 15, 2018

Overconfidence Leaves Firms Exposed to Security Risk

Author: cyberwriter

In July 2018, Cisco commissioned Forrester Consulting to carry out a study on endpoint and network security strategies. Forrester spoke with 115 IT decision makers, and published the results as a Forrester Opportunity Snapshot titled “Don’t Just ...

October 9, 2018

Making the Case for Virtualization

Author: Tatianna

Virtual Value — The Business Case for Virtualization Management The market for virtualization is growing: Recent predictions suggest steady growth in the data virtualization market over the next four years to more than four billion dollars, even as ...

October 1, 2018

Cloud Computing and Virtualization

Author: Tatianna

Building Blocks: The Virtual Foundation of Effective Cloud Deployments Cloud computing is everywhere. From business networks to social services to the burgeoning IoT market, this former tech outlier is the now the go-to option for companies looking ...

September 27, 2018

Gaining Root Access on Mac OS

Author: Tatianna

Apple computers are coveted as one of the world’s most valuable brands for a reason. Their computers are stylish, easy to use, and are owned and displayed as status objects across the world. However, one feature Apple computers ar ...

August 22, 2018

CISM Certification: What’s the Benefit, and Why Does it Matter?

Author: Tatianna

Get CISM Certified: The benefits and meaning There aren’t enough information security professionals to go around. That’s the word from a recent ISACA report, which found that 60 percent of organizations had open security positions which took on ...

August 19, 2018

Notable Malware Attacks and Security Vulnerabilities

Author: jessicapierre

Computer and Internet technologies have gone through amazing trends and developments that have always made headlines in the news since they’ve been around over the past several decades. With the way that these technologies have made everyday tasks ...

August 19, 2018

What is Firmware?

Author: jessicapierre

Computer-savvy or not, anybody who has ever touched a computer has heard the terms “software,” “hardware,” “adware,” “spyware,” and “malware,” whether it be from the news, the Internet, or everyday conversation. There’s another ...

August 17, 2018

Done for You: Comprehensive Collection of Pentesting Content

Author: ginasilvertree

Pentesting students on Cybrary are busy (as are all Cybrarians). Every day, there’s so much to do and learn! So, I took a little time (okay, a lot of time) to search the mysterious corners of the Cybrary site to put together this collection of pent ...

August 14, 2018

CISM Training: Specific Use Cases

Author: Tatianna

CISM Training: Specific Use Cases Data breaches are getting worse. As noted by The Spectator, recent data suggests more than 140 million records are lost or stolen every month, while worldwide losses due to attacks such as business email compromise ( ...

August 12, 2018

What is Multi-Factor Authentication?

Author: jessicapierre

Passwords used to be the be-all and end-all of account protection. As long as your password was long enough, unique enough, and complicated enough with a good mix of upper and lower case letters, numbers, and symbols, it was practically crack-proof. ...

August 10, 2018

ITIL Certification: Your Path to High Paying Jobs

Author: cyberwriter

The Industry & The Problem: In the dynamic and rapidly changing IT industry, if you do not upgrade your skills regularly you would soon become irrelevant to your organization, or even to the industry as a whole. There is a huge demand for many c ...

August 9, 2018

Moving Up: How to Become an Intermediate SOC Analyst

Author: ginasilvertree

If you’ve worked as an entry-level SOC Analyst, you’ve likely performed many of the following tasks in this jack-of-all-trades cyber position: Provide threat analysis and security logs for security devices Analyze and respond to hardware and s ...

August 8, 2018

Navigating a Security Wasteland: Cloud Security

Author: kathiemiley1

Vol.3 Navigating a Security Wasteland: Cloud Security Cybersecurity has grown into a never-ending war between cyber thieves and their victims. These cyber thieves exploit network and user vulnerabilities to steal valuable information or cripple organ ...

August 7, 2018

Zero to Employed in 3 Months – Success Series

Author: Tatianna

This success story takes you on Gabrielle’s Cybrary Insider Pro’s journey. She had no experience, decided to change industries, and eventually became a Security Analyst at one of the world’s most prestigious consulting firms. The Jo ...

August 2, 2018

Should You Become a Cyber Security Engineer?

Author: ginasilvertree

These days, many people are asking themselves whether they should become cyber security engineers. As cyber jobs increase exponentially and thousands of cyber positions remain open, it’s a good time to ask this question. In this p ...

July 29, 2018

Modems vs. Routers

Author: jessicapierre

If you’ve ever had to go through the process of moving into a new house, then you may be familiar with one of the tasks that come with the moving process: setting up Internet service in your new home. Most people just call their internet service pr ...

July 29, 2018

Bluetooth Security Risks

Author: jessicapierre

If you’re a heavy Bluetooth user, then you’re more than familiar with how much easier it makes everyday life. It’s pretty much a multi-task facilitator. With this technology, you can make hands-free phone calls while driving, allowing you to wa ...

July 22, 2018

Web Designer, Web Developer, UX Designer, and UI Designer: What’s the Difference?

Author: jessicapierre

The Web has done a lot to transform the way we live over the years. It has changed the way that we work and communicate. Although many businesses still work with data in a hard-copy form, much of it is stored in online databases, with employees at va ...

July 22, 2018

What is Bluetooth?

Author: jessicapierre

Have you ever been on your smartphone, gone to Settings, and seen a setting option that allows you to turn Bluetooth on or off, but you don’t exactly know what Bluetooth is? Maybe you’ve also wondered if it’s similar to Wi-Fi, and if it is, the ...

July 18, 2018

Interview Guide: Network Engineer

Author: Thomas Callahan

Architecting Success: The Network Engineer Interview Network engineers are in high demand as companies push for faster, more comprehensive digital transformation across all aspects of IT. From the integration of mobile devices to managing the interac ...

July 17, 2018

Pocket-Guide for the Penetration Tester Career Path

Author: ginasilvertree

In this pocket-guide, we’ll cover the key elements of building a strong Penetration Tester career path. How does penetration testing fit into today’s business security landscape? As hackers’ methods continue to evolve through the use of new, so ...

July 15, 2018

What is the IoT?

Author: jessicapierre

Have you ever felt so bombarded and overwhelmed by gadgets, devices, and computers that you felt like you wanted to just “unplug” from the world for a moment? Well, nowadays, if you want to do that, it may take more effort than it did in the past ...

July 15, 2018

What is an API?

Author: jessicapierre

While many computer users do not know what an application program interface or API is, all of them indirectly interact with and benefit from them every day in the applications and devices they use. As indicated by its name, an application programming ...

July 13, 2018

Interview Guide: Cyber Security Engineer

Author: Tatianna

Locking Down the Job: Your Cyber Security Engineer Interview Guide Companies are looking for skilled cyber security professionals. The challenge? These experts are getting harder and harder to find. As noted by data from NC Tech, there are now more t ...

July 11, 2018

Become a Certified Systems Administrator

Author: cyberwriter

Are you looking for an IT/Cyber Security career? Do you enjoy working with hardware and software? Are you curious about connecting various devices, computers, and controlling the way they communicate with one another physically and on a network? If ...

July 10, 2018

Keeping Score with Digital Resilience

Author: jessicapierre

What is Digital Resilience, and Why is it a Business Priority? As much as everyone hates to think about this, it is a reality that we all must face: cyberattacks are not going to stop, and everyone is a target. It may even be safe to say that any per ...

July 8, 2018

What is Artificial Intelligence?

Author: jessicapierre

Artificial intelligence, or AI, has long been portrayed in entertainment like films and television shows as human-like robots that are either serving humans or taking over the world. Those portrayals, however, are actually over-generalizations that f ...

July 6, 2018

Can You Picture Yourself Becoming a Network Engineer?

Author: ginasilvertree

Can you picture yourself becoming a Network Engineer? If  yes, why is that? Well, it might just feel right (which is awesome), but let’s start by exploring and articulating some data and facts that might support your potential “whys” for pursu ...

July 5, 2018

What Does a Security Engineer Do?

Author: cyberwriter

What do Security Engineers do? Working in the information security realm comes with a lot of advantages. With nearly everything having a digital component these days, the career opportunities in this industry are plentiful. As we continue to rely on ...

July 1, 2018

Types of DoS and DDoS Attacks

Author: jessicapierre

Out of all the numerous types of cyberattacks, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks are probably among the most vicious. That’s because they can cause an exceptional amount of damage, especially long-term damage, ...

July 1, 2018

Common Types of Cyberattacks

Author: jessicapierre

Cyberattacks are running rampant today. It’s like an epidemic, with one major attack after another making headlines in national and worldwide news. These threats attack individuals and organizations, with mass attacks on organizations being especia ...

June 29, 2018

Micro Handbook for SOC Analyst Career Path

Author: ginasilvertree

In this micro handbook, we’ll cover the key elements of building a solid SOC Analyst career path. In a broad sense, security analysts help keep computing safe and work to protect computer users from loss, harm and other sorts of damage. They’re s ...

June 28, 2018

Why Become a Network Engineer?

Author: Tatianna

Courtesy of Pinterest Technology continues to change and improve, evolving faster and faster as it advances. Along with it, careers in the information technology industry also continue to grow. As a network engineer, you will be in the heart of the t ...

June 24, 2018

What is a Corrupted File?

Author: jessicapierre

At some point or another, every computer user has tried opening up a file on his device only to see a message that says “The file you are trying to access is unavailable or has been corrupted.” This may understandably alarm some users, as a “co ...

June 24, 2018

What is Open-Source Software?

Author: jessicapierre

With the never-ending releases of web applications and tools like Internet browsers, browser add-ons, and file-sharing systems, you may have heard the term “open source” get tossed around a lot. But what exactly does open source mean, and how doe ...

June 20, 2018

Is Network Engineering a Good Career?

Author: Tatianna

Demand for employees in the information technology (IT) industry, including network engineers, is soaring while the supply of candidates is running low. In fact, according to Forbes1, in 2015, the job postings in IT went up 74 percent over the previo ...

June 17, 2018

What is Spyware and How Can I Prevent It?

Author: jessicapierre

There are eyes everywhere. Between the security cameras that businesses set up around their locations and virtually everyone having a camera phone, every person out in the public is on display in some way, shape, or form. Whether it’s in a grocery ...

June 17, 2018

How Credit Card Numbers Get Stolen

Author: jessicapierre

It seems like most people care for carrying around cash anymore, especially younger people like teenagers. But with the endless conveniences that those little pieces of plastic called credit cards offer, who still wants to bother with physical money ...

June 10, 2018

Are Your Home Security Cameras Safe?

Author: jessicapierre

You need to have eyes everywhere. With the countless sources of danger that exist everywhere from the grocery store to the park, you have to constantly remain alert and watchful. This is especially true for many when it comes to their homes, the pers ...

June 10, 2018

Which Image File Format Should I Use, and When Should I Use It?

Author: jessicapierre

Whether you’re a website developer or an everyday person who occasionally uploads and shares pictures or makes scrapbook graphics, at some point, you’ve been presented with the task of having to save an image in some type of file format of your c ...

June 7, 2018

Hack Your Way to a Rewarding and Challenging Pentesting Career

Author: StevenE

What is hacking? Hacking though has negative connotations; it just means understanding the functioning of computer systems, and taking control of them, so they listen and act to your commands as against the original purpose for which they have been c ...

June 5, 2018

Unpacking the Interview – SOC Analyst

Author: Tatianna

So you’re considering a career as a security operations center (SOC) analyst. You’re not alone — with more than 350,000 unfilled cybersecurity positions in the US and a predicted IT skills gap of more than 3.5 million open jobs by 2021, potenti ...

June 3, 2018

What is Social Engineering?

Author: jessicapierre

Social engineering (SE) sounds like some kind of futuristic, scientific experiment, but the core of it is very simple to understand. Social engineering is the art and skill of psychologically manipulating people to take a certain course of action or ...

June 3, 2018

Public Wi-Fi: Should We Use It?

Author: jessicapierre

The Internet is everywhere now. Gone are the days of having to go to a library to do online research. Also gone are the days of having to wait until you got home to get on the Web, which involved unplugging a telephone line to set up your dial-up Int ...

May 30, 2018

Interview Prep: Penetration Tester

Author: Tatianna

Penetration testers are now a critical part of effective, secure IT. As noted by Info Security Magazine, good pen testers are now few and far between as the cybersecurity skills gap widens and the sheer volume of malicious attacks increase. What’s ...

May 30, 2018

Get Certified for a Red Hot Cyber Security Career

Author: camiragano

“The global average cost of a data breach is $3.62 million in 2017, “reports the 12th annual data breach study by Ponemon Institute. The increasing number of data breaches resulting in loss of money and reputation question the very existence of c ...

May 27, 2018

Blockchain: Not Just for Digital Currency

Author: jessicapierre

The word “blockchain” sounds self-explanatory in meaning, but there’s so much more to the term that comes down to one thing: decentralization. Centralized systems have been natural parts of our everyday lives for ages. For any matters involving ...

May 27, 2018

Keep Your Children Safe Online With Parental Control Apps

Author: jessicapierre

Well before the surge of smartphones and mobile apps, and even before the age of the Internet in the nineties, keeping your children safe was a major responsibility, but it was pretty straightforward compared to how it is now. Back in the day, you to ...

May 20, 2018

Ways to Check If You’re Visiting a Safe Site

Author: jessicapierre

We spend so much time on the Internet today shopping, filling out forms, and paying bills. After a while, all of these sites start to look the same. Since they all look the same, many of us figure that as long as nothing looks out of the ordinary on ...

May 20, 2018

Pros and Cons of USB Flash Drives

Author: jessicapierre

Data storage has come a long way. Before computers were accessible and affordable to the general public, people would have to travel with bulky books and piles of notes for work and personal projects. When computers became more widely used, data stor ...

May 13, 2018

Protecting Your Online Information with Encryption

Author: jessicapierre

With the recent rash of online security incidents that include data breaches and ransomware attacks, one thing has become clear: no information online is safe. If major entities like the email provider Yahoo!, the credit bureau Equifax, and software ...

May 13, 2018

Has Your Email Been Hacked?

Author: jessicapierre

Back in the day, people used to anxiously wait for the mailman to drop off mail in their residential mailboxes. Instead of waiting by the mailbox, people now constantly refresh their email apps to check for new messages in their electronic mailboxes. ...

May 6, 2018

Is Your Information on Mobile Health Apps Safe?

Author: jessicapierre

Everything you want or need is at your fingertips with mobile devices today. You can buy groceries online and play music with the sound of your voice with smart speakers like Amazon’s Echo. This power has given people more control over their lives, ...

May 6, 2018

How to Keep Your Mobile Device Safe from Online Attacks

Author: jessicapierre

When most people hear “anti-virus program” and “anti-malware,” they instantly think of desktop and laptop computers. As desktops and laptops have become life-changing mainstays in the office and home over the past 20 years, the need for prot ...

May 3, 2018

Advance Your SOC Career

Author: Tatianna

The Education/Experience Balancing Act: Advancing Your SOC Career Hard numbers make it clear: The cyber security skills gap is real — and growing. By 2020, estimates suggest an infosec shortfall of almost two million IT professionals as companies l ...

May 2, 2018

How to Secure Small Businesses

Author: Tatianna

Secure Your Small Business With Affordable and Practical Cyber Security Training “Cyber security education and training should be free for everyone, especially for small businesses,” suggested the witnesses who testified before the Senate small b ...

April 27, 2018

State of the Market: The SOC Analyst Career Track

Author: Tatianna

So you want to be a security operations center (SOC) analyst. At the very least you’re considering the role — you’ve seen the data about emerging cybersecurity skills gaps, you want to know more about defending networks against cyber attacks an ...

April 24, 2018

Securing Social? Cyber-First Strategies to Protecting Your Privacy

Author: Tatianna

Cyber Security Strategies to be Social and Secure During his testimony before the Senate Committee, Facebook CEO Mark Zuckerberg faced many tough questions, one particularly difficult question, “Who owns the virtual you?” made not just the CEO, b ...

April 18, 2018

Cybrary’s TLDR on GDPR

Author: Tatianna

GDPR – Let’s do this… On May 25th, 2018 a new privacy law goes into effect across the European Union (EU). It is called GDPR or General Data Protection Regulation. Any company that does business in the EU is required to adhere to ...

March 22, 2018

Unraveling the Cyber Skills Gap & Talent Shortage

Author: Olivia

With high profile security breaches like Equifax, the publicity over data security, as well as the cost, has only continued to grow. According to The 2017 Cost of Data Breach Study from the Ponemon Institute, the global average cost of a data breac ...

March 20, 2018

Why is Ethical Hacking Necessary?

Author: Olivia

For those outside of the cyber security community or those who are just entering it, there is often much debate about ethical hacking. Is it actually ethical? What exactly does ethical hacking entail? And, why is ethical hacking necessary? In this b ...

March 13, 2018

Shattering the Cyber Security Glass Ceiling

Author: Olivia

In March, the world celebrates Women’s History Month, recognizing the female pioneers who have helped to make strides in every industry, shattering the glass ceiling as they go. Unfortunately, it is during this month that news surfaced regarding t ...

March 6, 2018

How to Secure your Social Media Accounts: 10 Helpful Tips

Author: Olivia

I’ll admit that was I was very tempted to trick you all into reading this post by making the title ‘How to Hack Facebook,’ but I resisted. Unfortunately, that’s one of the most commonly asked questions in Cybrary support and shows just how i ...

February 27, 2018

Dr. Cyber Security: A Look into the Healthcare Industry

Author: Olivia

While cyber security breaches continue to top headlines across industries, it seems that hackers have taken a special interest in the healthcare industry. According to Healthcare’s Electronic Protected Health Information (ePHI), patient medical re ...

February 20, 2018

Cryptocurrency Mining: Malicious Money Making

Author: Olivia

It’s no surprise that cryptocurrency has been in the news lately. Between the rising popularity of Blockchain technology, the fluctuating value of cryptocurrency, and the creation of new currencies almost daily, many individuals (and hackers) have ...

February 13, 2018

Winter Olympics 2018: Hackers Going for Gold

Author: Olivia

During past Olympic Games in Beijing, London, and Brazil, there were reportedly millions of attempted cyberattacks a day, of which some were successful. As the breadth and depth of technology used in conjunction with the Games expands, everything fr ...

February 8, 2018

Breaking Tech: How I Became a Software Engineer with Zero Experience

Author: Cybrary User

My name is Eric Green, I’m a junior software engineer at Cybrary. I’m a San Diego native who has made Washington, DC my new home. I was inspired to write this blog in large part as a response to Phill Kimpton’s Soldier to Cyber tal ...

February 6, 2018

Tax Hacks: How to Protect Your Data During Tax Season

Author: Olivia

As if tax season wasn’t enough to give you a headache, this year the risk of being scammed is higher than ever. “Why?” you groan. In the wake of the Equifax breach, in which millions of Americans personally identifiable information (PII) was c ...

January 30, 2018

What Can Football Teach Us About Cyber Security?

Author: Olivia

“In football if you don’t practice you don’t win and in cybersecurity if you don’t practice you don’t win.” -Critt Golden With the SuperBowl less than a week away, I’ve found myself spending a lot more time thinking about football. It ...

January 25, 2018

Data Privacy Day: Why Privacy Matters

Author: Olivia

It’s not easy to ignore headlines regarding GDPR and the passing of FISA for another six years of warrantless surveillance. Both of these issues, among many being covered in the industry news, center around data privacy and the various laws that c ...

January 23, 2018

Bitcoin and Cyber Security: Digital Frenemies

Author: Olivia

It’s no secret that cryptocurrency has been taking the world by storm, with fast food chains leveraging Bitcoin as part of marketing campaigns to attract customers. Just this week, KFC unveiled the ‘Bitcoin Bucket’ in Canada, which sold out al ...

January 16, 2018

AWS: Your Complete Guide

Author: Olivia

Even those new to IT have probably heard that everyone is “moving to the cloud.” This transition from standard infrastructure is thanks in large part to Amazon Web Services. Currently, AWS offers “over 90 fully featured services for computing, ...

January 9, 2018

A Cybrary Year in Review: 2017

Author: Olivia

Like many of you, the Cybrary team is excited for the New Year ahead. A new year means new learning goals and a renewed sense of motivation to better yourself and your career. We’ll be the first to say, we’re excited about all the things we can ...

December 27, 2017

The Art of Social Engineering: A Crying Baby and a Phone Call

Author: ginasilvertree

  The persistent, eternal weakest link in the realm of cybersecurity is: the human being. This has been and will likely remain true; the art of social engineering continues to be a captivating topic for hackers and their targets alike. Accordin ...

December 20, 2017

Knowledge Is Power: Your Journey On Cybrary

Author: ginasilvertree

You may have heard the expression, “Knowledge is power” and, if not, you’ve heard it now! People around the world come to Cybrary for IT/cybersecurity training and tools that help them gain knowledge and ultimately, power – po ...

December 13, 2017

Equifax and Never Look Back (Wrong!)

Author: Olivia

One of, if not THE most notable breach of 2017 was revealed by Equifax Inc. (NYSE: EFX), in which their organization was hacked through the exploitation of “a U.S. website application vulnerability to gain access to certain files. Based on the comp ...

December 12, 2017

Best Of…”Hacker Resources”

Author: ginasilvertree

There are so many great hacker resources on Cybrary, I don’t know where to start! But, I’ll try an organized approach. Here are three top items (author’s choice) from various sections on the site:   OP3N (member-submitted cont ...

December 2, 2017

Have You Seen Cybrary Teams?

Author: ginasilvertree

Some Cybrarians may not know about Cybrary Teams, so I figured I’d write a post on this service. Teams is “The learning and assessment tool of choice for IT and security teams at today’s top companies.” Ok, what does that mean ...

November 22, 2017

What are Bundles on Cybrary?

Author: ginasilvertree

Do you buy bundled or bulk items when you shop at traditional or online stores? Buying in bulk (or buying bundles) is most often cheaper – or at least it should be! – than buying single items. Plus, in addition to lower costs, they should ...

November 21, 2017

Certified Ethical Hacking (CEH) — What You Need to Know

Author: Tatianna

What You Need to Know Malware is evolving. As noted by Tech Republic, new strains such as fileless malware — which as the name suggests don’t use typical payloads but instead leverage trusted process such as PowerShell to gain system access — ...

November 19, 2017

Cyber Security Smoke and Mirrors: An Update on Russian Hacking Group Sandworm

Author: Olivia

In a time where news media and social media capture so much of our attention and by extension, help to form so many of our opinions, it is not surprising the press coverage given to the hackers who tampered with the elections using those mediums has ...

November 15, 2017

How Do You Turn Your IT or Cybersecurity Hobby into a Career?

Author: ginasilvertree

I like to write on a variety of topics, so here’s another post to add to the mix. Over the last day or so, I’ve been thinking about how people turn an IT or cyber hobby into a career. It seems that many hobbyists-turned-careerists had te ...

November 7, 2017

4 Planning Steps for Course Building on Cybrary

Author: ginasilvertree

I decided to submit a course through the Course Builder on Cybrary today (located under the “Teach” menu on the top navigation). I found the submission tool to be very clean, straight-forward and easy to use. It took less than 10 minutes ...

October 30, 2017

Love Linux? You’re Not Alone

Author: ginasilvertree

If you love Linux, you’re not alone! Your fellow Cybrarians are enjoying lots of cool Linux training, tools, posted content, etc. The links below include training and supplemental study tools. Plus, here are a few interesting thoughts on Linux ...

October 20, 2017

What You May Not Know about Python and a List of Resources on Cybrary

Author: ginasilvertree

Here’s some info you may not know about Python from the website. Let’s take a look at a description of Python, how it’s used and why it was created: Description of Python: “Python is an interpreted, interactive, o ...

October 13, 2017

Message of Appreciation Reflects the Mission of Cybrary

Author: ginasilvertree

Recently, one of the founders of Cybrary received the following message: “Ralph, I just learned that you are [one of the] founder[s] of Cybrary and I want to thank you so much for bringing so much value. I have 0 dollars and I am struggling fi ...

October 4, 2017

Updated Security+ Exam: SY0-501

Author: Olivia

This post was reviewed/updated February 2019. Today, October 4, 2017, an updated version of the CompTIA Security+ exam was released primarily to partners, courseware developers, and instructors. The new code for this exam is SY0-501. That being said ...

October 4, 2017

Useful Info and Cool Videos about the STORM Mobile Pen-Testing Kit

Author: ginasilvertree

So, to be upfront, I’m not a pentester. But, I wanted to share this info and these videos about the STORM Mobile Pen-Testing Kit, as I find the tool intriguing.   First, I found the following info on the EC Council website: “The Sto ...

October 3, 2017

Celebrating Women in Cyber Security during the Month of October

Author: Olivia

As you’ve probably heard, October is National Cyber Security Awareness Month, an annual campaign meant to raise awareness about the importance of cyber security. October is also National Breast Cancer Awareness Month. Understanding the importance ...

October 1, 2017

Celebrating National Cyber Security Awareness Month

Author: Olivia

  It’s October at last and time to celebrate- not the release of pumpkin spice lattes or the fact that Halloween is around the corner, but National Cyber Security Awareness Month! This annual campaign is meant to raise awareness about the imp ...

September 28, 2017

Earn Your Cybersecurity Certifications Faster

Author: ginasilvertree

Truth: we all want to achieve our goals quickly and effectively! If you’re working, striving to earn your cybersecurity certs and want to have a life, you might need a little support in accomplishing your certification goals with greater speed ...

September 25, 2017

Understanding the Cyber Kill Chain

Author: Olivia

What is the Cyber Kill Chain? Originally developed by Lockheed Martin and based of the military’s ‘kill-chain,’ the Cyber Kill Chain framework is a model for identification and prevention of cyber-attacks. It maps what steps adversaries must t ...

September 20, 2017

Exciting News from EC Council

Author: Olivia

Every infosec professional who has ever argued against the CEH exam may change their minds after this recent announcement from EC Council. The certifying body will be launching a new, fully-proctored ‘Licensed Penetration Tester (LPT)’ Certifica ...

September 19, 2017

No-Cost and Low-Cost Cybersecurity Courses and Tools on Cybrary

Author: ginasilvertree

Tight on cash? Same here. So, today, I set out to find all the low-cost and no-cost items on Cybrary. After a few searches, I found several posts that highlight free tools, free classes and low-cost study tools. Now, my reading/study lists are set f ...

September 18, 2017

Cyber Pop: Bug Bounty

Author: Olivia

What is a bug bounty? A bug bounty program is an initiative offered by many companies and websites that rewards individuals for discovering and reporting bugs, specifically exploits and vulnerabilities. Also called a vulnerability rewards program (V ...

September 16, 2017

Your Complete Guide to Raspberry Pi

Author: Olivia

What is Raspberry Pi? Raspberry Pi is a small computer that costs between $5 and $35, but can function as a desktop computer or be used for additional functions, such as building smart devices. Originally, the Pi was intended for usage in schools as ...

September 14, 2017

Encryption is Everywhere

Author: ginasilvertree

Encryption is everywhere (well, almost everywhere) around sensitive data in motion and, sometimes, sensitive data at rest. Without it, e-commerce transactions, government secrets and electronic medical records – and many other types of data &# ...

September 8, 2017

5 Things Every Organization Can Learn from the Equifax Breach

Author: Olivia

By now you’ve most likely heard that the Equifax breach has hit 44% of the population in America, not to mention the consumers effected in the UK and Canada. In a statement released by Equifax Inc. (NYSE: EFX), which provides little detail other t ...

September 8, 2017

“My Cybrary Story” – Ryan W.

Author: ginasilvertree

Recently, a Cybrary user named “Ryan W.” posted some positive comments about Cybrary on one of our social media sites. I reached out to him and asked if he would share his “Cybrary Story.” Here’s what he wrote (and, no, ...

August 30, 2017

Cyber Fact: Social Engineering

Author: Olivia

According to Security Magazine, Hackers attack every 39 seconds, with 1 in 3 Americans attacked this past year alone. Additionally, 62% of companies have experienced phishing social engineering attacks, making it one of the top three cyberthreat con ...

August 28, 2017

The Value of IT and Security Certifications in 2017

Author: Olivia

We’ve been asked many times before whether or not an IT certification is needed to get a job, essentially, what is the value of a certification? Data indicates that certification holders in the IT and security field have greater job opportunit ...

August 24, 2017

Cyber Pop: Biohacking

Author: Olivia

In the not so distant past, opening doors with a wave of our hand seemed like something you’d see only in a Harry Potter film. Now, with biohacking, this ability has become possible. We are modifying human bodies to meet our technological needs. B ...

August 23, 2017

Your Complete Guide to ITIL

Author: Olivia

According to Forbes, ITIL was ranked as one of the most valuable IT certifications for 2017, with holders earning an average yearly salary of $103,408. For many, there is a certain sense of mystery that surrounds this certification despite it being t ...

August 21, 2017

Cyber Pop: Holistic Security

Author: Olivia

It is no surprise that as our global reach extends and information is shared across the world, security risks are increasing with the expansion of the attack surface. For this reason, security professionals can no longer take a siloed approach to sec ...

August 19, 2017

Linux+ 104 Transcender Practice Test Question Preview

Author: Olivia

Linux has grown into an industry-leading software and service delivery platform that is used for everything from super computers and Web servers to virtualized systems and your Android phone, meaning you will find many IT careers in the current mark ...

August 18, 2017

Cyber Fact: Hacktivism

Author: Olivia

According to Heimdal Security, “Hacktivism accounts for half of the cyberattacks launched in the world.” What is hacktivism? Hacktivism is a politically or socially motivated form of hacking. Deeply rooted in hacker culture and ethics, it is oft ...

August 17, 2017

Linux+ 103 Transcender Practice Test Question Preview

Author: Olivia

According to CompTIA, the Linux+ certification offers a framework for acquiring working knowledge of Linux for IT professionals working as junior-level system administrators, as well as those working in Web and software development. Successful candi ...

August 16, 2017

Cyber Pop: Pretty Good Privacy

Author: Olivia

Privacy is a topic that the security community can never give too much attention. To. For those with an online presence, it is especially important to consider who has access to your information. One common method for doing so through an encryption ...

August 15, 2017

Your Complete Guide to Fuzzing

Author: Olivia

What is fuzzing? A black box software testing technique, fuzzing is a more refined version of trial and error, used to discover coding errors and security vulnerabilities in software. It involves imputing large amounts of random data, known as ‘fu ...

August 15, 2017

A+ 902 Transcender Practice Test Question Preview

Author: Olivia

CompTIA A+ 220-902 is the second of two exams required to obtain your CompTIA A+ certification. This exam covers installing and configuring operating systems including Windows, iOS, Android, Apple OS X and Linux. It also addresses security, the fund ...

August 14, 2017

Your Complete Guide to Burp Suite

Author: Olivia

Since web applications offer data access to customers, employees, and other key groups, they have become a weak link for many organizations. If a hacker gains access, they often have direct access to confidential data, meaning that web application s ...

August 13, 2017

A+ 901 Transcender Practice Test Question Preview

Author: Olivia

Transcender has been providing CompTIA certification training products for over a decade. Their award-winning suite of test prep solutions includes quality CompTIA certification practice exams and handy flashcards for some of the most popular CompTI ...

August 11, 2017

Project+ Transcender Practice Test Question Preview

Author: Olivia

Each practice test on our site was designed to prepare you for the version of the certification exam described. So for the Project+ exam, their practice test questions map to the PK0-003 exam, currently offered by CompTIA. According to Transcender, ...

August 10, 2017

Cyber Fact: Passphrases

Author: Olivia

According to statistics from SecurityIntelligence, “For small and midsized organizations (SMBs), 60% of employees use the exact same password for everything they access. Meanwhile, 63% of confirmed data breaches leverage a weak, default or stolen ...

August 9, 2017

SOC Analyst: Interview Preparation

Author: Olivia

  A few weeks ago, I was talking with a Cybrarian who had an upcoming interview for a SOC Analyst position and wanted some advice on how to best prepare. Aside from the general ‘interview success’ tips I knew offhand, I couldn’t provide m ...

August 9, 2017

CASP Transcender Practice Test Question Preview

Author: Olivia

We’ve been asked whether or not courses alone are enough to pass certification exams. While the videos in our courses provide valuable insight into the material covered on the exam, the questions included in the Transcender material (which are the ...

August 8, 2017

Cyber Fact: Malware

Author: Olivia

According to CSO, “Global ransomware damage costs are predicted to exceed $5 billion in 2017. That’s up from $325 million in 2015, a 15X increase in two years, and expected to worsen. Ransomware attacks on healthcare organizations, the No. 1 ...

August 7, 2017

Capture the Flags: What They Mean for Security

Author: Olivia

Capture the flags are just one form of valuable cyber security training that inspire productive competition and serve as an educational exercise for participants. In a security CTF, the contestants may be tasked with securing a machine, conducting or ...

August 7, 2017

Oracle: OCAJP 6 and OCPJP 6

Author: Olivia

I’ve noticed a debate waging across Internet forums regarding the Oracle 1Z0-850: Certified Associate Exam (OCAJP 6) and the Oracle 1Z0-851 Certified Professional Exam (OCPJP 6). Some of the questions raised include ‘What is the different betwee ...

August 3, 2017

SOC Analyst: Career Path Overview

Author: Olivia

A buzzword in the cyber security world is ‘SOC Analyst.’ While some are familiar with this role and desire to one day hold this title, many are not sure what a SOC analyst does, or what ‘SOC’ even stands for. I’d like to shed some light on ...

August 2, 2017

Software Engineering Learning Path

Author: Olivia

While Cybrary focuses primarily on cyber security education, we recognize that cyber extends into every aspect of technology, including the growing area of software engineering. Many Cybrarians are especially interested in this area of study, which ...

August 2, 2017

IT Fundamentals: What You Need to Know for Tech Success

Author: Olivia

Gone are the days when being ‘tech-savvy’ was just a ‘nice to have’ trait. Nowadays, as we all know, being familiar with the basic functions of a computer and certain software is essential for everyone from school-aged children to grandma. A ...

April 18, 2017

Teaching Kids about Cybersecurity: it’s never too early

Author: rcubed

Children are taught from an early age about the many things in the world that can harm them. Even in a toddler’s narrow world, there are plenty of potential hazards lurking around almost every corner. With growing autonomy, children are then warned ...

April 17, 2017

Cyber Feminist Hacker and New Course Contributor: Magda Lilia CHELLY

Author: Olivia

Cyber feminism, used to describe the philosophies of a contemporary feminist community whose interests are cyberspace, the Internet and technology, is most likely not a term you’ve heard too often, but it’s gaining traction thanks to women in cyb ...

April 14, 2017

UNM4SK3D: CIA, Dallas, and NASA

Author: Olivia

#wikileaks (but wait, there’s more). At this point, the leaks have become a flood. And speculation is drowning us. This week, Symantec Security researchers have confirmed that the alleged CIA hacking tools exposed by WikiLeaks have been used ...

April 13, 2017

Hacking for Mischief, Mayhem and Pranking

Author: rcubed

Last weekend in Dallas the evening calm was shattered by the wail of 156 tornado warning sirens sounding at once. Attempts to turn off individual sirens failed and after 95 minutes of the din, officials mercifully shut down the entire system in a fin ...

April 11, 2017

Quiz: Micro Certification Placement

Author: Olivia

You won’t pass or fail. You’ll just get some direction. In previous blogs, I offered tips on how to earn specific Micro Certifications, and how to determine which Micro Certifications were best for your career goals. And while making career decis ...

April 11, 2017

Monitoring the Dark Web for Cyber Threat Intel

Author: rcubed

Last week we discussed the Dark Web. Its scope, its architecture, and what lurks (slithers) within its depths. On the flip side, the Dark Web also presents a useful source to mine for cyber threat intelligence. When bricks and mortar criminal types k ...

April 10, 2017

Hacker, YouTube Star, and Cybrary’s New Course Contributor: Priyank Gada

Author: Olivia

If you are an avid reader of 0P3N, chances are you’ve seen a post or two from avid contributor Priyank Gada (@groupflexi). Priyank, who has experience as a forensics expert and penetration tester, frequently makes YouTube videos to share his knowle ...

April 7, 2017

UNM4SK3D: CIA, Dark Web, and China

Author: Olivia

#wikileaks (they just keep coming). You know that feeling you get when your favorite artist continues dropping singles but doesn’t release an album? The same can be felt for Wikileaks, but instead of anticipation, their releases cause anxiet ...

April 6, 2017

Exploring The Dark Web: Don’t Venture In Alone

Author: rcubed

Cyber Threat Intelligence is a complex topic consisting of a lot of moving parts. It requires a high degree of technical knowledge combined with a healthy dose of paranoia. Staying ahead of the bad guys or simply keeping up with them is a 24/7 job. ...

April 5, 2017

‘Silver Hats’ Off to Chris Greco and Cybrary’s First User- Generated Course

Author: Olivia

I think it’s safe for me to assume that anyone who’s the least bit familiar with cyber security has heard of Black Hat and White Hat hackers, and even those in between, the Gray Hats. I’d like to expand your cyber lexicon further and introduce ...

April 4, 2017


Author: rcubed

IT Acronyms have a tendency to pop up like mushrooms on a suburban lawn after a 3-day rain storm. Even seasoned pros occasionally find themselves stumped by one or two that have slipped past their radar. After learning quite a while back that BYOD di ...

April 3, 2017

Don’t be Nervous Your New Co-Worker Could be a Robot

Author: Olivia

In the past, I’ve written with a mixture of excitement and hesitation on the topic of Artificial Intelligence (AI). AI is defined as: the theory and development of computer systems able to perform tasks that normally require human intelligence, suc ...

March 31, 2017

UNM4SK3D: FCC, WhatsApp, and GiftGhost

Author: Olivia

#privacyrules Ladies and gentlemen, start your VPNs. As of March 28th, the House of Representatives and the Senate agreed to repeal the FCC’s recent privacy rules. And while those rules still need President Trump’s likely signature, many ...

March 30, 2017

Overturning FCC Privacy Ruling: A Marketer’s Viewpoint

Author: rcubed

The United States Senate voted last week to reverse broadband privacy rules put in place last October requiring ISPs to get consent from consumers before selling or sharing their Web browsing data and other private info with third parties. The vote w ...

March 28, 2017

Closing the Cyber Security Skills Gap

Author: Olivia

Register for the April 18th event. Any search of the term ‘Cyber Security Skills Gap’ will return a laundry list of frightening facts about how far behind the industry is in terms of finding and hiring the needed professionals. Those with the de ...

March 28, 2017

Robocalling for Dollars – a phish by another name

Author: rcubed

The number of robocalls blasted out to American phones during each month in 2016 is estimated to have been 2.4 billion. That number would be high just for a single year, but when it occurs on a monthly basis, then things become insane. And this isn ...

March 24, 2017

UNM4SK3D: CIA, Apple, and TSA

Author: Olivia

#wikileaks (again). Dark Matter may sound like a new sci-fi movie, but it’s actually the latest of the WikiLeaks Vault 7 classified documents shared with the public.These new documents, which build off of this month’s previous leak, desc ...

March 23, 2017

History of Phishing: Then and Now

Author: rcubed

 Last year (2016) turned out to be a banner year for phishing. According to APWG (Anti-Phishing Working Group), the total number of phishing attacks in 2016 was 1,220,523, a 65% increase over 2015. In the fourth quarter of 2016, APWG saw an average ...

March 23, 2017

How to get Nessus Certified and Why Technology Specific Certifications are so Valuable

Author: Olivia

As the Cybrary site continues to change, and trust me when I say there are many changes coming (good ones!), the Micro Certification catalog will only continue to expand. In my recent post, I mentioned more certifications geared toward specific vulne ...

March 21, 2017

11 Ways to Reduce Ageism Bias in Tech Hiring

Author: Olivia

The other day, I was reading a ‘Dear Abby’ type blog that focused on ageism in hiring, and I thought that topic specifically geared toward the tech industry would be interesting to explore. Recently, I’ve written a lot about how you can earn sk ...

March 21, 2017

Best Resources for Learning Android Programming or Anything Else

Author: rcubed

This post is a follow-on to the series I began a few weeks back on mobile app development in general and Android coding in particular. It’s also the concluding post in the series. The previous post on getting started with Android development walked ...

March 17, 2017

UNM4SK3D: Yahoo, IBM, and Twitter

Author: Olivia

  #indictments In the ongoing saga over Yahoo’s security breaches, one of which affected over 500 million users, a grand jury has indicted four defendants on charges of computer hacking, economic espionage and other criminal offenses in c ...

March 16, 2017

Cybercrime and Punishment: Who’s Actually Paying the Price?

Author: rcubed

It seems that a week doesn’t go by where there isn’t news of a major data breach or intelligence dump. Yesterday gave us something slightly different, but still a variation on the same theme. On Wednesday March 15, 2017 the Justice Department ind ...

March 15, 2017

How to Showcase your Skills in an Online Portfolio

Author: Olivia

In the blog, I’ve talked a lot about resume tips and emphasizing skills to help you get hired. I realize in doing so that some skills are more visual and creative than others, with everyone from coders to technical writers needing an ideal place to ...

March 15, 2017

Missing: Women in IT

Author: rcubed

This post is a follow up on a previous bleak one that examined harassment of women in the IT field. And while sexual harassment is a contributing factor to talented women choosing to leave the field and even possibly deterring others from entering it ...

March 13, 2017

A Man of Many Certs: How One Cybrarian Views Micro Certifications

Author: Olivia

We’ve been asked by many members how other Cybrarians are using micro certifications to learn new skills and further their careers. It’s a fair question certainly, with this concept being so new. Certifications are imperative to a cyber security ...

March 11, 2017

Technology in Travel

Author: Rachel Laura M

Gone are the days when frequent travelers for business and/or pleasure were in for a tedious, drawn out process of phone calls and prolonged research to book plane tickets, hotel rooms, and rental cars. Today’s travelers no longer need to make an a ...

March 10, 2017

UNM4SK3D: CIA, Headphones, and Consumer Reports

Author: Olivia

#wikileaks True or false? That’s the question being asked by millions of Americans after Wikileaks released a series of 8,761 documents titled ‘Vault 7,’ which detail the CIA’s cyber spying techniques and capabilities. Big ne ...

March 9, 2017

The WikiLeaks Just Keep Dripping

Author: rcubed

Table of Contents: 1. What’s in the vault? 2. Hacking the endpoint is where it’s at. 3. Who done it? 4. Ethical issues.   This past Tuesday (March 7, 2017), the internet’s online library of cool stuff, WikiLeaks, published the ...

March 8, 2017

How to get Secure Coding Certified

Author: Olivia

Hopefully the answer to the question, “How do I get _________ certified?” is becoming clearer with each post I write. You may or may not have realized that the certification catalog is continuing to grow, with some of the newest certifications, ...

March 8, 2017

Role Technology: Healthcare

Author: Rachel Laura M

When dealing with a health problem, gone are the days when we had to make many phone calls, ask a lot of questions and then wait for a doctor or other medical professional to follow up with us. Today, when it comes to managing our health, the Interne ...

March 7, 2017

Harassment in IT: Are things any better 40 years later?

Author: rcubed

Several high-profile sexual harassment cases in recent years serve as a reminder how far the tech industry has yet to advance with regard to the fair treatment of women in the workplace. Truth be told, it’s a pervasive problem in our culture that e ...

March 6, 2017

The Art of First Impressions: How to Stand Out at a Career Fair and Land the Job

Author: Olivia

For many students, the approaching of spring means one thing: A rush to attend every career fair and hiring event possible to land that job or internship post-graduation. For professionals, the attendance of career fairs may come on more of an ‘as ...

March 4, 2017

Flex-Learning: Exploring the growing world of online learning

Author: Rachel Laura M

Not so long ago, when you wanted to pursue any kind of educational experience, you had to enroll in a course, pay your tuition and then commit to a specific time and place for a certain amount of time (e.g., a quarter, semester or academic year) to ...

March 3, 2017

UNM4SK3D: AWS, Cloudbleed, and CloudPets

Author: Olivia

#outage The annoyance when your Internet won’t load is quite possibly the most irritating feeling of the 21st century. So when the Amazon S3 outage occurred on Tuesday, February 28th for almost 5 hours, both consumers and businesses alike were ...

March 2, 2017

Alexa, Call Jeff Bezos

Author: rcubed

Last Tuesday (2/28/2017) Amazon’s AWS S3 web service was intermittently unavailable. S3 (Simple Storage Service) is one of the many web services hosted on the Amazon Web Services platform, AWS. It’s also the most used service hosting everything ...

February 28, 2017

How to get Malware Certified

Author: Olivia

I’ve been on a mission to answer the question, “How do I get _________ certified?” In recent posts, I’ve dove into how to earn the TCP/IP certification and how to best utilize your hard earned certifications on your resume. With new micro ce ...

February 28, 2017

Let’s Build an Android App

Author: rcubed

It’s now time to roll up our sleeves and get our hands dirty with a little mobile app development. This next post in the series on Mobile App Development will focus on putting things in place for developing Android mobile apps. The last time I had ...

February 25, 2017

Coding Theory: The wide world of cryptography

Author: Rachel Laura M

Coding theory and cryptography are two well-known areas of information security as both are necessary for today’s technology oriented; online-based world. However, many wonder what is the difference between coding theory and cryptography? Essential ...

February 24, 2017

UNM4SK3D: Google, Netflix, and Bill Gates

Author: Olivia

#SHA-1 Maybe you’ve heard of it, and maybe you haven’t. But Google just impressed the world again by producing the first successful SHA-1 collision attack ever. And that means it’s officially time for services to migrate to safer c ...

February 23, 2017

Seeking Clues to MS’s Strategy in Windows 10 Mobile

Author: rcubed

Before launching into the remainder of the series on mobile app development, I thought it would be instructive to take a look at what Microsoft has been quietly up to with Windows 10 Mobile. The battle for dominance of the smartphone arena ended long ...

February 22, 2017

Insights and Trends on Micro Certifications

Author: Olivia

Linux Academy and Cybrary survey 6,000 IT professionals on experiences with micro certification. Results offer insight into learning preferences, certification in the workforce, training costs, and trends. To read the full press release, click h ...

February 21, 2017

Introduction to Mobile Development Platforms

Author: rcubed

It seems the title of the previous post in this series threw a few people. I suppose it serves me right for flirting with a click baity title. The point I was attempting to make was that though mobile app development has a lot of allure as a road to ...

February 20, 2017

How to Showcase Certifications on Your Resume and 3 Reasons Why You Should

Author: Olivia

In my recent post, ‘How to get TCP/IP Certified’ I offered some guidance on how you go about obtaining a certification on Cybrary. I first discussed the three general steps and then turned my focus to the TCP/IP Micro Certification specifically. ...

February 17, 2017

UNM4SK3D: IoT, Yahoo!, and Microsoft

Author: Olivia

#DNS Someone was really craving fish. That’s the only logical explanation for why an unnamed university’s vending machines and other IoT devices were making seafood-related DNS requests every 15 minutes. This case, which comes from Veriz ...

February 16, 2017

3 Simple Steps to Wealth and Fame as a Mobile App Developer

Author: rcubed

The allure of becoming rich and famous from publishing a viral mobile app can be pretty strong. A lot of people see mobile app development as the fast track to living the life of a Silicon Valley entrepreneur. Not to crush anyone’s dreams, but a he ...

February 16, 2017

A Report on Reports: Briefing on the State of Security

Author: Olivia

Many of you are probably aware that RSA is currently taking place. Having fomo like me? Twitter is a lifesaver if you are. Still, it’s hard to stay updated on all the juicy things being discussed there. Some of the major topics I’ve come across a ...

February 14, 2017

How to get TCP/IP Certified

Author: Olivia

Many Cybrarians have been asking the question, “How do I get _________ certified?” There are many resources across the internet that discuss how you can earn various certifications.  I wanted to get specific in a series of blog posts on how you ...

February 14, 2017

So you want to be my CISO?

Author: rcubed

What would you say about a job where the primary attributes were only accepting workaholics, where your successes received little notice but your slip ups most likely would cost you your job or worse, get worldwide media attention and you could neve ...

February 13, 2017

The Future of Programming – It’s where the Money is!

Author: GWCitroner

According to a 2015 report from Burning Glass; there were almost 7 million job openings that required coding skills, and programming jobs are growing 12% quicker than average. But, the most important fact we can take away from this report is: fully 5 ...

February 10, 2017

UNM4SK3D: Dark Net, Vizio, and Homeland Security

Author: Olivia

#hacked “Hello, Freedom Hosting II, you’ve been hacked.” That’s the message visitors to any of the 10,000 affected websites that were a part of a Dark Web hack received recently. So, it seems Anonymous isn’t afraid to p ...

February 9, 2017

Software Development Methodologies: Tumbling down the waterfall

Author: rcubed

Picking up the thread from a previous post on structured software design and CASE, it’s worth examining some of the major development methodologies and their evolution. Where SA/SD and CASE deal with the process of designing and creating software p ...

February 8, 2017

Privileged Password Security: How to Protect your Organization

Author: Olivia

You turn on the evening news and a breaking report flashes, “Major Data Breach of Huge Corporation, details at 11” and you immediately begin to question, “could this happen to my organization?” In the wrong hands, privileged accounts represen ...

February 7, 2017

Incytes: Micro Certifications by the Numbers

Author: Olivia

      *Data as of 2/7/17 Data is a beautiful thing. In many ways, it’s almost artistic because it can help us paint a picture of abstract concepts. You may have questions about Cybrary Micro Certifications, ‘who’s ...

February 7, 2017

Tax Refund Scams: Benefits to filing early and often

Author: rcubed

The two constants of the universe are death and taxes, however, advancements in life extension and anti-aging research threaten to up end the former. Taxes are eternal and in some cases, literally. Estates and heirs are often hounded by the IRS for t ...

February 6, 2017

5 Ways Virtual Reality is Impacting Your Life

Author: GWCitroner

Virtual reality has come a long way from the first primitive 3D viewers.  This technology is now poised to change the way we learn, communicate, travel, and receive medical care. Here are 5 big ways virtual reality is enriching our lives. Education ...

February 5, 2017

Android Development – These are the droids you’re looking for …

Author: Rachel Laura M

Android is the Google platform billions of people use on their smartphones.  The origins of Android began in 2006, around the same time that Apple denied it was creating the now ever-popular iPhone. Compact laptops were the hot new item and the tabl ...

February 4, 2017

This Day in History: Famous Firsts that Impacted the World

Author: Tatianna

Estimated reading time: 3 minutes Making in impact in one person’s life isn’t difficult, but what about impacting the world? What does it take to have a monumental effect on people? Some may say that kinds words, a new thought/idea, rese ...

February 3, 2017

UNM4SK3D: Executive Order, Take-Two, and Facebook

Author: Olivia

#cyberpolicy You’ve heard of the 12 days of Christmas, now post- holiday we’re looking at 60 days of cyber. An Executive Order draft reveals the White House will be calling for swift review of “national security systems” within 60 da ...

February 2, 2017

Whatever happened to software that would write itself?

Author: rcubed

Age does have some benefits, though they are sometimes hard to appreciate among the aches and pains and general tendency for complaining about…well, getting older. In some respects, I was fortunate to begin my career in technology in 1980 just when ...

February 1, 2017

Cash Me Ousside, Or Better Yet Don’t: 7 Tips for Protecting your Money Transfers

Author: Olivia

First things first, if you haven’t yet seen the video from Dr. Phil where the teenage utters the phrase ‘Cash me ousside, howbow dah’ that’s storming the internet, please look it up. Otherwise this blog title makes no sense. A ...

January 31, 2017

All The News Fit or Unfit to Print

Author: rcubed

This is the fifth and final post in the series on “How to be an Educated Consumer of Online Information.” I can hear you cheering now. I realize that this series may have seemed like I’ve veered off on a tangent. After all, what does any of thi ...

January 30, 2017

Winter Phishing: Gmail Scams

Author: Rachel Laura M

Scams! Some hackers are good at them. Hackers who create phishing schemes often create documents that are realistic and convincing enough to look legitimate; causing even some of the most technologically savvy users to fall for them. That is a ̶ ...

January 28, 2017

This Day in History: Communication Methods & Technology

Author: Tatianna

Evolution of human work silhouettes | designed by Vexels Estimated reading time: 3 minutes This week’s history lesson is about communication methods. Let’s start with something that practically everyone uses, the telephone. Invented and ...

January 27, 2017

Obtaining a Skill Certification is as Easy as Taking a Practice Test

Author: Olivia

Awhile back, I said that passing a micro certification exam is ‘so easy a caveman could do it.’ And in a sense that still holds true. However, I know many of us have test anxiety, and for some, obtaining a certification is a matter of job securit ...

January 27, 2017

UNM4SK3D: Dropbox, Russia, and Google Play

Author: Olivia

#filesharing Recently, Dropbox earned itself a new nickname, ‘Dropbug,’ also synonymous with ‘restore files.’ The crowd-favorite file sharing company implemented a bug fix which had corrupted the metadata of their files. Thi ...

January 26, 2017

The Many Faces of Social Media: The Good, Profitable and Ugly

Author: rcubed

This next to last post in the series begun a few weeks ago on “How to be an Educated Consumer of Online Information” covers the vast topic of social media. It’s so vast in fact, that apart from a general overview of this particular communicatio ...

January 25, 2017

Who, Not What, is the ‘R’ in RSA?

Author: Olivia

The other day, I took to Cybrary’s search feature in hopes of finding information on an inventor of the RSA public-key cryptosystem, and when nothing turned up, not only was I utterly disappointed, but it made me wonder why we do not dedicate more ...

January 24, 2017

How Data Recovery is Sometimes like a Seinfeld Episode

Author: rcubed

The Seinfeld comedy series is famously referred to as “a show about nothing.” Though many of its episodes revolved around mundane incidents from the main characters’ lives, there usually was a profound message that resonated with many viewers s ...

January 21, 2017

This Day in History: What makes the world go ’round?

Author: Tatianna

  Have you ever stopped to think about historic events or “history” as a whole? It can be overwhelming to realize that so much happens every day. If you think harder, there are 24 hours in a day [duh] (that’s 1440 minutes if you ...

January 20, 2017

UNM4SK3D: Anonymous, Apple and the Army

Author: Olivia

  #threats Today, January 20, 2016 the 45th President of the United States, Donald Trump, will be sworn into office. While many opinions surround the recent election and overall political landscape, none have been more threatening than those fr ...

January 19, 2017

[PODCAST] Minicast Episode 8 The one about ransom and privacy

Author: CyDefe

Hey hey everyone we’ve published another podcast this month. On this episode we talk about Microsoft’s new privacy dashboard, and a lot of ransom happening in the cyber world. You can listen to our podcast on, watch our raw vi ...

January 19, 2017

Risk Management: The what, the how, and next steps in advancing your cyber career

Author: Olivia

When we talk about cybersecurity, for the most part, we are talking about the protection of systems and information from threat vectors such as: cyber espionage, cyber warfare, cyber terrorism, cyber negligence (looking at you Sony). In their most tr ...

January 19, 2017

Software Security Analysis: Manual vs. Automated

Author: rcubed

A lot of effort goes towards securing networks and the resources they host, but when it comes to the seven layers of the ISO OSI stack, it’s the application layer where a lot of the trouble begins and ends. Gartner places 90% of the blame for secur ...

January 17, 2017

Network Security vs. Endpoint Security is the Boxing Match of the Year: Who Wins?

Author: Olivia

327 new threats every minute. More than 5 every second. That’s the state of the world’s threat landscape according to Avecto. As you can probably guess, the challenge for organizations and their dedicated cyber security teams lies within the shee ...

January 17, 2017

Become an Expert in any Subject Without Visiting the Library

Author: rcubed

Back in the old days (pre-internet), writing research papers for school was an arduous task. The process began with badgering my poor mother into dropping me off at the public library and then returning several hours later to retrieve me. My badgerin ...

January 13, 2017

Cybrary Mobile Apps: iOS and Android Now Available

Author: Tatianna

You heard right! We finally have an app for iOS. Yes, the long awaited and severely overdue iOS app is now more than a dream. And, for those of you who use Android, we didn’t forget about you. We created an all-new app for android to match 1 f ...

January 13, 2017

UNM4SK3D: Ukraine, Altaba, and St. Jude

Author: Olivia

  #hacked (again). Someone’s flexing their cyber muscles. It appears as though the recent attack on a Ukrainian transmission facility points to a person or group using the country as a trial for refining attacks on critical infrastructure ...

January 12, 2017

Demand for Cybersecurity Pros Will Explode in 2017

Author: rcubed

A topic we hammer on often and hard here at is the critical shortage of Cybersecurity professionals and the growing demand for them. Guess what? Things haven’t changed and the shortage and corresponding demand only continue to increase a ...

January 11, 2017

Your Girlfriend Has Already Adopted the Zero Trust Model: Here’s Why you Should Too

Author: Olivia

“Never trust, always verify” is shifting from the adage of crazy girlfriends everywhere to the motto of cyber security experts across the globe. The Zero Trust Model of cyber security is one that focuses on the belief that both internal and exter ...

January 10, 2017

Call Me, Beep Me if You Wanna Reach Me (And Steal My Data): Malvertising in the Mobile Device Landscape

Author: Olivia

Awhile back I had made a prediction in the blog ‘Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications’ that mobile applications will become hacker’s target of choice in 2017. I decided based on some further re ...

January 10, 2017

Online Shopping and Review Sites: Getting more bang for your buck

Author: rcubed

The writing has been on the wall for a while now for brick and mortar retailers. Growing pressure from online shopping sites has been taking big chunks out of their revenue year-over-year. Stalwarts of the department store industry have either gone o ...

January 7, 2017

Today’s History: Microsoft’s Unveiling and Duoscopic TV

Author: Tatianna

Every day holds significance to someone, but today is special to us because of Microsoft. Founded in 1975, Microsoft is the worldwide leader in software, services and Internet technologies for personal and business computing. The company offers a wi ...

January 6, 2017

UNM4SK3D: Bitcoin, Financial Services, and Smart Meters

Author: Olivia

  #digitalcurrency While playing the Stock Market may not be for you, you may want to reconsider when it comes to digital currency. The worth of Bicoin is on the rise, with it’s value surpassing $1,000 for the first time since November 20 ...

January 5, 2017

[PODCAST] Update for our fans & monthly puzzle

Author: CyDefe

Hey hey everyone it’s been some time since our last post on here and since then we’ve had a few new episodes come out. Check out the links below to listen to our latest content. We streamed our last podcast recording live at https://www. ...

January 5, 2017

Tips for using Google like a Ninja

Author: rcubed

(Google Logo by Google Inc. ( [Public domain], via Wikimedia Commons.) –This is the second in a series of posts on the topic of how to be an educated consumer of online information. Most online information searches begin with Google, ...

January 4, 2017

Don’t Wear your Data on your Sleeve: Why You Should Be Wary of Fitness Trackers from a Security Standpoint

Author: Olivia

Recently, I was reading a blog post about all the hot Christmas gifts for 2016 and their inherent vulnerabilities. Of course, there were the usual suspects like computers and mobile devices, but more IoT devices crept onto the list, including smart h ...

January 3, 2017

Top Tips for being an Educated Consumer of Online Information

Author: Tatianna

Part of Cybrary’s personal office library. Updated August 2018 As we enter a brand new year filled with both hope and more than a fair degree of trepidation, As always, there are points in time where it’s worth taking a moment to review ...

January 2, 2017

My Love/Hate Relationship with Amazon: Digital Privacy Concerns Raised by the Power and Products of the Big “A”

Author: Olivia

How many times have you opened the Amazon app to buy a book and ended up with a slew of products you never intended to purchase in the first place? If you just nodded in agreement, then you, like me, have a love/hate relationship with the ‘magic’ ...

December 30, 2016

UNM4SK3D: PHPMailer, OpenStack, and Amazon

Author: Olivia

  #criticalvulnerabilities If there was a book of critical vulnerabilities across the Internet, it’d be longer than the Bible. The latest discovered in PHPMailer by Polish researcher David Golunski, is one that affects multiple popular, ...

December 29, 2016

Ransomware: When it’s truly better to be safe than sorry

Author: rcubed

In general, encryption is a good thing and the stronger the better. Protecting data both at rest and while in transit is a recommended security best practice of which you should be aware. But when you discover that all the files on your computer have ...

December 29, 2016

10 Questions You Need to Ask Yourself Before Deciding if a Technical Project Management Role is Right for You

Author: Olivia

In light of recent recognition of the Technical Project Management Skill Certification test’s popularity, I decided it may be wise to provide a closer look at how someone in a role such as this functions, and if making a transition into a similar p ...

December 27, 2016

Be a Learn-a-holic: Using Webinars as Supplemental Learning Tools

Author: Olivia

I’d like to propose an idea. I want the title of ‘Cybrarian’ to become synonymous with the term ‘learn-a-holic.’ What’s a learnaholic? As the name implies, it’s someone addicted to learning. But not just learning in a general sense, rat ...

December 27, 2016

Biometrics: Not the Promised Silver Bullet

Author: rcubed

Remembering passwords has become a necessary annoyance in the Digital Age. We resort to using birth dates, pets’ and children’s names, and easily-remembered numeric sequences like ‘1234’ or ‘666’ (if you have a Satanic bent). The more cre ...

December 22, 2016

You Say Cyber Security, I Say Cybersecurity

Author: rcubed

Being it’s the Thursday before Christmas I thought a somewhat less technical post was in order to get us in the Holiday spirit. It would also be a good opportunity to clear up an issue that’s been nagging me for a long time: what is the proper sp ...

December 22, 2016

UNM4SK3D: Ads, Email, and Inflight Entertainment

Author: Olivia

  #methbot Slow clap for fraud-prevention firm White Ops who discovered the biggest digital ad fraud ever, lovingly dubbed ‘Methbot.’  This may sound like a bad dream, or just another episode of Breaking Bad, but Methbot, a ‘ ...

December 21, 2016

Here’s a Toast to Lists: What Skills, Certifications & Technologies are in Demand for 2017

Author: Olivia

As the clock ticks down to midnight on December 31st and signals the end of 2016, a year that’s been the center of a slew of ‘worst year ever’ memes and remarks across the internet, it is also a reminder of the predications and resolutions bein ...

December 20, 2016

Like to Break Stuff? You May Have a Career in Software Testing

Author: rcubed

Were you the kind of kid that loved to take stuff apart to see how it worked? As an adult, are you constantly coming up with suggestions for how things could be better-designed and built? Do you have a pit bull-like tenacity for making sure that prob ...

December 19, 2016

Let’s Get Serious: A Discussion on Cyber Attacks

Author: Olivia

Being that I’m new to cyber security, I can’t help but gape at the number of ‘hacks’ I hear about on an almost daily basis. The other day I read an article on a KFC rewards program in the UK whose members were hacked. There were a lot of corn ...

December 16, 2016

UNM4SK3D: Europol, the FCC, and China

Author: Olivia

  #cybercriminals Small victory dance from around the world- an international operation uncovered teens connected to DDoS cyber attacks.  Who says Generation Z is lazy?! Of the 101 watch-listed and 34 arrested suspects, the majority were under ...

December 15, 2016

Sniffing Your Way through Snort NIDS

Author: rcubed

Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) are currently hot topics in the cyber security space and for good reason. Threats and exploits aren’t slowing down and the pressure is ramping up on organizations to do a bett ...

December 15, 2016

[podcast] Amanda Berlin, the art of the sale, and Malware droppers

Author: BrBr
 1840 “Always Be Closing” is the mantra that Alec Baldwin’s character “Blake” intones in the movie “ ...

December 14, 2016

Here’s How to Get Hired: 7 Resume Must Do’s for the IT Professional

Author: Olivia

Once upon a time, I worked as a recruiter for a telecommunications company. And I believe that while your interview skills are incredibly important, one’s resume is truly the ‘key to the kingdom’ of sorts. After all, if you can’t get through ...

December 13, 2016

Linux Smackdown: Which Distro Reigns Supreme for Pentesting?

Author: rcubed

There are some things in life that were simply meant for each other: peanut butter and jelly, snow and Christmas, and Friday night and pizza. In the case of pizza, it goes well with pretty much anything, especially cold beer. When it comes to the art ...

December 12, 2016

9 Ways to Cheat on Behalf of Your Brain

Author: Olivia

I have a confession to make. I always want people to think I’m smart and trendy. People who are both smart and trendy, typically know what’s going on in the news, their industry, what’s new with pop culture, anddddd they’re well read. But the ...

December 10, 2016

The National Institutes of Standards in Technology (NIST)

Author: Rachel Laura M

What is NIST? The National Institutes of Standards in Technology (NIST) dates back to 1901. The United States Congress originally founded NIST as means to combat and issue with competition in the US during that time. Back in the day, the infrastruc ...

December 9, 2016

UNM4SK3D: IBM, DailyMotion, and Android

Author: Olivia

  #deeplearning Fortune 500 Companies have a new secret weapon against cyber crime: IBM’s Watson for Cyber Security.  This overachieving supercomputer uses machine learning and language processing to sift through vast amounts of data, bo ...

December 8, 2016

Dusting for Digital Prints at Cybercrime Scenes

Author: rcubed

The most enduring principle of detective work is Locard’s exchange principle. Developed by the father of Forensic science, Dr. Edmond Locard (1877-1966), it states that a perpetrator of a crime will both take something from the scene of the crime a ...

December 7, 2016

I Passed My First Skill Certification Test: So Easy a Caveman Could Do It

Author: Olivia

Do you remember the Geico marketing campaign from a few years ago featuring cavemen with the slogan, “So easy a caveman could do it”? The driving message of this snarky humored campaign was that getting insurance is so, so easy, why wouldn’t yo ...

December 6, 2016

What’s the deal with IPV6?

Author: rcubed

Not long after the Internet and World Wide Web were unleashed on the public, plans were already underway to increase the potential pool of IP addresses available for allocation. The version of the IP protocol standard most in use today, IPv4, was rel ...

December 2, 2016

A Buzzword to Rattle your Brain

Author: Olivia

Updated October 2018 I’ve got a buzzword for you. ‘Deep learning.’ Perhaps you’ve heard of it, or maybe not. But if you’ve been following the IoT trend like I have, you’ll hear its praise there. Deep learning is a branch of machine learni ...

December 1, 2016

Why are Russians Such Talented and Determined Hackers?

Author: rcubed

When we hear about cybercrime and hacking exploits we tend to immediately assign blame to the usual suspects: the Russians or the Chinese. Next in line are hackers from other Eastern European countries formerly part of the Soviet Union such as Romani ...

November 29, 2016

Palm Reading: How Hackers Steal Data from the Palm of your Hand Via Mobile Applications

Author: Olivia

Today, I’m a psychic. And my prediction for the upcoming year is this: Mobile applications will become hacker’s target of choice. According to Dr. Larry Ponemon, Chairman and Founder of the Ponemon Institute, a research think tank dedicated to ad ...

November 29, 2016

Big Mac Attack: Is the Apple Macintosh Virus-Proof?

Author: rcubed

The age-old battle of supremacy between PC and Mac users dates back to the introduction of the first Mac back in 1984. I jumped on the Apple bandwagon back then with a purchase of the original Mac 128k machine. I loved it and the MS DOS machines I wa ...

November 25, 2016

Target Security Breach and the Value of Pentesting

Author: rcubed

Being that it’s Black Friday, I thought it only fitting to revisit the infamous Target Security Breach of holiday shopping seasons past. For Cybrarians, there’s a lot to take from the case, particularly in the area of pentesting and fundamental n ...

November 24, 2016

The dark side of programming

Author: Rachel Laura M

Even though the average person might not be aware of it, software is everywhere in our daily lives. Everything from online transactions, buying a smartphone, to driving a car involves software. As consumers, we assume and take for granted that the s ...

November 23, 2016

Data Security Breaches: Superman’s Kryptonite

Author: Olivia

Dust off your comic books, Superman is back. Imagine this: In the latest issue, Superman sets up a secure perimeter around Metropolis. Or at least, he thinks it’s secure. While he’s leading his other life as Clark Kent, Lex Luther takes advantage ...

November 23, 2016

[podcast] BlackNurse, Buenoware, ICMP, Atombombing, and PDF converter fails

Author: BrBr
 1753   This week, Mr. Boettcher found himself with an interesting conundrum concerning what happened when he converted a Windows DOCX file to a PDF using a popul ...

November 22, 2016

Mobile Malware Now Equals PC Infection Rates

Author: rcubed

There are currently 2 billion smartphone users in the world. These users have amassed over 268 million downloads. It should then come as little surprise that cybercriminals have turned their attention to attacking mobile devices and the users to whic ...

November 22, 2016

Nerding Out: Top 7 Most Interesting Cyber Crime Books You Should be Reading

Author: Olivia

My Kindle is my best friend. There I said it. And if you’re like me then chances are you want to soak up every ounce of knowledge you can when it comes to the topics you love. Books are a great source for that, and expanding your interests to the f ...

November 21, 2016

Is a degree in cyber security worth it?

Author: Rachel Laura M

The following statistics are very sobering and disturbing: More the 80% of US-based companies have been hacked This number includes major companies such as Target, Sony, and Home Depot These incidents caused consumer’s sensitive personal and f ...

November 20, 2016

The Ethical Hacker: How to Certify

Author: Rachel Laura M

A certified ethical hacker is a computer programmer hired by a business to attempt to break into a computer system with the purpose of discovering vulnerabilities and other things a malicious hacker could potentially exploit, resulting in significant ...

November 20, 2016

Becoming a Software Developer

Author: Rachel Laura M

According to US News and World Report, software developers enjoy a median salary of $95,510 annually. In addition to this higher than average salary, the unemployment rate is very low (about 2.5%) and people in this field enjoy a nice work-life balan ...

November 18, 2016

TCP/IP: The Next Gateway Drug? Transform Your Tech Addiction into a New Career Path

Author: Olivia

Updated August 2018 You probably opened this blog because you thought I’d be making a lot of drug references. Sorry, but I’m fresh out of Adderall.  In all seriousness though, I do want to talk to you about addiction, and not as a disappointed p ...

November 18, 2016

Is teleworking creating a greater security risk for companies?

Author: Rachel Laura M

With today’s modern and sophisticated technology such as slim and fast laptops, smartphones, tablets and programs such as Skype and FaceTime, today’s employees are no longer married to the five day, 40 hours a week of being in the office, workin ...

November 17, 2016

Insider Threat Management

Author: rcubed

A DOE contractor feeling the pressures of rising debt attempted to sell stolen uranium parts to agents of a foreign government. A government researcher who experienced a hostile work environment accessed a secured facility and intentionally left 4,00 ...

November 17, 2016

Dude, Where’s My Skill Cert? 7 Ways that our CPE Granting Skill Certifications Add Value

Author: Olivia

Let me start by asking you a question. What is your education worth to you? If your immediate thought was, well, not too much, then let me ask you another question. Would you be willing to spend about 40 minutes to learn a whole heck of a lot and get ...

November 16, 2016

[#podcast] Ben Johnson on company culture shifts, needing better job descriptions, assisting your company’s “cyber self-esteem”

Author: BrBr
 1436     Ben Johnson from Carbon Black has been around the industry for a good while, and has seen a lot of ugly things in our industry. Ben had written a recent blog post (http ...

November 16, 2016

[#podcast] Aamir Lakhani discusses the DarkWeb…is all the content on the Darkweb bad? And becoming a known quantity on the DarkWeb…

Author: BrBr
 1418   Mr. Boettcher and I met Mr. Aamir #Lakhani at DerbyCon this year, and immediately intrigued with his work on the Dark Web. He has assisted w ...

November 15, 2016

Counterfeit Mobile Shopping Apps Steal Christmas 2016

Author: rcubed

Each holiday shopping season has a must-have gift item. Holidays past had their Cabbage Patch Kids, Mighty Morphin Power Rangers, and Legos as perennial favorites. Holiday 2016 is shaping up to have several contenders, but no clear favorite has yet e ...

November 14, 2016

The role of cyber voting scams in the recent USA Election

Author: Rachel Laura M

The US Presidential Election, which took place on November 8th, 2016 was unprecedented and will likely go down in history as the biggest political upset of all time. Former Secretary of State and First Lady Hilary Rodham Clinton ran against billionai ...

November 10, 2016

When Lithium Ion Batteries Explode

Author: rcubed

Exploding lithium ion (Li-ion) batteries in hoverboards made in China last holiday season and more recently, exploding batteries in Samsung’s Galaxy Note 7 phones has raised awareness – and paranoia – over this battery technology. It’s a tech ...

November 8, 2016

AI and Automating Incident Response

Author: rcubed

Artificial Intelligence and Automating Incident Response Updated August 2018 Managing the sheer number of alerts that get raised by incident response systems on a monthly basis has reached the point of overwhelm in many organizations. For the most pa ...

November 3, 2016

Computer Forensics and the Hillary Clinton Email Case

Author: rcubed

I thought it might be both interesting and challenging to examine the recent revelation about the newly discovered emails on Anthony Weiner’s laptop. Emails that the FBI feels may be pertinent to the Hillary Clinton Email case. It should be an Inte ...

November 1, 2016

Top Skills for Getting Hired in 2016

Author: rcubed
 3432 recently reported a spike in job applications for October 2016. At the same time, they revealed their Top Skills of 2016, an annual list of skills employers need most. If that weren’t enough, broke things down on a global ...

October 28, 2016

[Product Update] Notecards and New Lesson Pages


Introduction Learning is a tricky thing. Research suggests 3 primary learning styles: auditory, visual, and tactile. Each person is different in the way they learn, and each technique offers various suggestions and strategies to optimize the learnin ...

October 28, 2016

Anatomy of a DDoS Attack

Author: rcubed

Friday morning October 21, 2016 didn’t get off to a good start for me. Shortly before 9 am EDT I was attempting to make an online purchase using PayPal as my payment processor of choice. When I clicked the “Submit” link (the button graphic wasn ...

October 27, 2016

Self-driving Cars: An Introduction

Author: rcubed

Elon Musk, CEO of Tesla Motors, recently announced that all the electric cars coming off Tesla’s assembly line will now be equipped to be full-on autonomous. It appears that the quest for truly self-driving cars – ones where you don’t have to s ...

October 26, 2016

Top In-Demand Cyber Security Certifications

Author: rcubed

When it comes to IT certifications most would agree that the “Big-3” essentials are CompTIA A+, CompTIA Network+, and CompTIA Security+. From there, a few specialized certs along the lines of Cisco CCNA, Linux and Microsoft certifications as well ...

October 18, 2016

Power Grid Attack – Doomsday Scenario

Author: rcubed

We’ve all heard the scare stories about how hackers will one day successfully launch a power grid attack in the US. You may have even tried to imagine it by comparing it to something you can recall from recent history such as the infamous Northeast ...

October 17, 2016

Your Incident Response Refresher

Author: Tatianna

  To get you prepared for our newest addition, the “Incident Response and Advanced Forensics” course, we’ve put together this little list of Incident Response topics just for you! Let’s dig in, shall we? Intro to Incident R ...

October 13, 2016

Cybercrime and the Gaming Industry

Author: rcubed

Groups with ominous-sounding names such as Lizard Squad, Team Poison, and the Armada Collective are making a virtual killing from cybercrime. But the attack surfaces they target aren’t what you may have come to expect. Rather than going after finan ...

October 11, 2016

Cybersecurity Excellence Awards 2017

Author: rcubed

Cast your vote for the 2017 Cybersecurity Excellence Awards, here! The need to increase awareness around the importance of cybersecurity is being championed by an increasing number of organizations and among them is the Department of Homeland Securit ...

October 7, 2016

ITT Tech Closing and Impact on Students

Author: rcubed

The ITT Technical Institute (ITT Tech for short) announced on September 6, 2016 that it was immediately ceasing operations and closing all of its campuses. Less than two weeks later, on September 16, 2016, ITT Tech filed for bankruptcy protection and ...

October 5, 2016

Women in Tech – Smashing Myths and Prejudice

Author: rcubed

What if I were to tell you that during the stone age of computing (1940s) women dominated the programming profession? You might have a difficult time believing me if you were to look around and observe the gender imbalance of women in tech today, bu ...

October 3, 2016

National Cybersecurity Awareness Month 2016

Author: rcubed

The National Cybersecurity Awareness Month 2016 is entering its 13th year this October. Founded in 2004, it is co-sponsored by the United States Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA) to put the focus o ...

September 20, 2016

OWASP’s 13th Annual AppSecUSA Conference

Author: Tatianna

We’d like to invite you to OWASP’s 13th Annual AppSecUSA Conference taking place in Washington, DC, October 11-14. The event is comprised of two days of training sessions followed by a two-day conference where software security leaders, research ...

September 14, 2016

What is happening with technology?

Author: Tatianna

In a day and age where everything is online, it makes sense to use email; but why is it “a dying media”? Before I answer this question, have you ever wondered why people don’t use email? Well, one reason is all the junk or “spam” as people ...

September 14, 2016

CyDefe Cyber Security Podcast Mini Episode 5

Author: CyDefe

On this episode we discuss password leaks from Last.FM and Opera browser. You can check it out on our website or on youtube We are also doing a Qwertycards giveaway which can be found here

August 28, 2016

CyDefe Cyber Security Podcast Mini Episode 4

Author: CyDefe

On this episode Micheal and i talk about CVE-2016-5696 better known as the off path attack. You can listen to our podcast on our website or via our youtube channel below. If you enjoy our podcast please subscribe to our channel and follow ...

August 16, 2016

Tradecraft Tuesday – Mobile Exploitation

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

August 3, 2016

CyDefe Cyber Security Podcast Episode 23

Author: CyDefe

On this weeks episode we are joined by Ben0xA who works for you can follow him on twitter @Ben0xA. This week we discuss Macs and iPhones have a Stagefright-style bug, Android banking malware blocks victims’ outgoing call ...

July 30, 2016

CyDefe podcast update.

Author: CyDefe

Hey hey everyone, It’s been a little while since we’ve last posted but we figured we should pop on here and give everyone an update on our podcast. Since we’ve last posted we’ve had a few awesome episodes come out. Minicast: 1 ...

July 27, 2016

[podcast] Cheryl Biswas discusses TiaraCon, Women in Infosec, and SCADA vendor headaches

Author: BrBr
 2582   Long time listeners will remember Ms. Cheryl #Biswas as one of the triumvirate we had on to discuss #mainframes and mainframe #security. (http:// ...

July 27, 2016

[podcast] Steps when scheduling a pentest, and the questions you forgot to ask… with Jarrod Frates

Author: BrBr
 2234 Jarrod Frates (@jarrodfrates on Twitter) has been doing pentests as a red-team member for a long time. His recent position at #InGuardians sees h ...

July 27, 2016

[Product Update] Introducing Cybrary Teams


Cybrary has been working hard to release our newest platform for individuals, allowing them to learn and develop their cyber security skills on Cybrary together. Drum-roll, please…Introducing Cybrary Teams! With Cybrary eclipsing the 500,000 Re ...

July 26, 2016

Tradecraft Tuesday – Fuzzing for Vulnerabilities

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

July 24, 2016

CyberPop – What’s a Proxy Server

Author: ginasilvertree

CyberPop gets your brain going! Today’s Question: What’s a Proxy Server? Answer: A proxy server is a server that acts as an intermediary for requests from clients seeking resources from other servers. A proxy server is associated with or ...

July 24, 2016

Sunday’s Cyber Security Fact – Collaboration is Key (July 24, 2016)

Author: ginasilvertree

According to a 2016 survey by PwC: 65% of businesses surveyed are “embracing a more collaborative approach to cybersecurity, one in which intelligence on threats and response techniques is shared with external partners. Internally, organizatio ...

July 22, 2016

Report: Healthcare Under Attack – Cybercriminals Target Medical Institutions

Author: ginasilvertree

InfoArmor has identified a group of bad actors performing targeted cyberattacks on healthcare institutions and their IT infrastructure, including connected medical devices such as Magnetic Resonance Imaging systems (MRI), X-ray machines and mobile c ...

July 21, 2016

“Done for You” – Complete List of DNS Training Videos

Author: ginasilvertree

Here’s a complete list of DNS Training Videos on Cybrary (in alphabetical order by first letter). Explore additional classes and modules here… Configuring DNS Zone Transfers Length: 12:12 Configuring DNS Zones Length: 21:27 DNS Enumerati ...

July 19, 2016

Tradecraft Tuesday – AWS Cloud Hijacking

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

July 17, 2016

Sunday’s Cyber Security Fact: Apple iOS Users Face More Risk (July 17, 2016)

Author: ginasilvertree

“Thanks to Apple’s tight control over its app store and operating system, threats to iPhones and iPads have been infrequent and limited in scale. This changed in 2015. In 2015, [Symantec] identified nine new iOS threat families,compared t ...

July 15, 2016

CyberPop – What is SIEM?

Author: ginasilvertree

CyberPop is a quick way to learn definitions and facts about cyber security.   Today’s Question: What’s SIEM Answer: The combined process of incident detection and incident response (pronounced “sim”). Includes features such as ale ...

July 14, 2016

[podcast] DFIR conference, DFIR policy controls, and a bit of news

Author: BrBr
 1739 Mr. Boettcher is back!  We talked about his experiences with the #DFIR conference, and we get into a discussion about the gap between when incident response is and w ...

July 13, 2016

See How “My Notes” Continues to Grow on Cybrary

Author: ginasilvertree

Recently, Cybrary released the “My Notes” feature, which members use to their personal record notes while take free cyber security training class. Since its inception, many users have leveraged this tool to capture critical information, t ...

July 10, 2016

Sunday’s Cyber Security Fact: Unique Pieces of Malware (July 10, 2016)

Author: ginasilvertree

“Symantec discovered more than 430 million new unique pieces of malware in 2015, up 36 percent from the year before. Perhaps what is most remarkable is that these numbers no longer surprise us. As real life and online become indistinguishable ...

July 8, 2016

CyberPop – What’s Remediation?

Author: ginasilvertree

CyberPop is a quick way to learn more definitions and facts about cyber security. Today’s Question: What’s Remediation Answer: What an organization does to limit or stop an attack once it’s detected, as part of incident response. Includes ...

July 6, 2016

“Done for You” – The Complete List of Python Training Classes (Plus a Bonus)

Author: ginasilvertree

Advanced Activities in Python Length: 39:47 Basic Python Commands and Functions Length: 29:47 Ctypes in Python Length: 31:32 Data Structures in Python Length: 31:36 Exceptions and Classes in Python Length: 28:05 Exploit Development (part 5) Python L ...

July 6, 2016

Cyber Workforce Solution: Hire More Veterans

Author: ginasilvertree

By Kathleen Smith For the last several years, cyber security leaders and business owners have been lamenting the worldwide hiring crisis for cyber security professionals[1]. From building new educational programs, to discussing the relaxation of immi ...

July 3, 2016

Sunday’s Cyber Security Fact: Cyber Security Standards (July 3, 2016)

Author: ginasilvertree

What are Cyber Security Standards?   “Cyber security standards are various forms of security standards which enable entities and organizations to practice security techniques to help minimize the number of cyber security attacks. In essenc ...

July 2, 2016

“Done for You” – Collection of Content on How to Prevent Ransomware

Author: ginasilvertree

Today, most companies are deeply concerned about how to prevent ransomware. News stories abound and Infosec professionals are scrambling to keep themselves and their users out of the fire. Below, you’ll find a compilation of content to underst ...

July 1, 2016

CyberPop – What’s Penetration Testing or Pentesting?

Author: ginasilvertree

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What’s Penetration Testing or Pentesting?   Answer: “Penetration Testing or Pentesting refers to techniques for actively testi ...

June 30, 2016

[podcast] Windows Registry, Runkeys, and where malware likes to hide

Author: BrBr
 2101 The Windows Registry has come a long way from it’s humble beginnings in #Windows 3.11 (Windows for Workgroups).  This week, w ...

June 30, 2016

[podcast] Kim Green, on CISO-aaS, the Redskins Laptop, and HIPAA

Author: BrBr
 1709   We are pleased to introduce Ms. Kim Green (Twitter: @kim1green). She is the CEO of KAZO Security, as well as the CISO / CPO o ...

June 29, 2016

Got Burgeoning Hacking Skills? Consider a Degree in Cyber Security

Author: ginasilvertree

Got burgeoning hacking skills? Growing cyber security talents? A compelling mission to join or continue working in the cyber security industry? A cyber security degree is something to seriously consider: Cybercrime continues to grow into more of a ...

June 28, 2016

[Product Update] New Cybrary Certificate of Completion


We love feedback from our Userbase. We have thousands of Users taking Cybrary classes on a daily basis and wanted to ensure that a Cybrary Certificate of Completion is a valuable measure of achievement. It should be something you’re proud to s ...

June 28, 2016

Tradecraft Tuesday – Mastering Cyber Attribution

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

June 26, 2016

Sunday’s Cyber Security Fact – Operation “Get Rich or Die Trying” (June 26, 2016)

Author: ginasilvertree

Operation “Get Rich or Die Trying” — Beginning in 2005 and for a more than a three year period, American hacker Albert Gonzalez, along with accomplices in Russia and the Ukraine, pulled off what has been called the largest cyber crime of all t ...

June 24, 2016

CyberPop – What Does ‘Kill Chain’ Mean?

Author: ginasilvertree

CyberPop is a quick way to learn definitions, terms and facts about cyber security.   Today’s Question: What does ‘Kill Chain’ mean? Kill Chain is a “military-inspired term encompassing the various stages of a cyber atta ...

June 21, 2016

Tradecraft Tuesday – $60M Heist: The DAO Hack

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

June 21, 2016

“Done for You” List of Exploit/Exploitation Videos

Author: ginasilvertree

According to the website, “The purpose of the Post-Exploitation phase is to determine the value of the machine compromised and to maintain control of the machine for later use. The value of the machine is determined by the ...

June 19, 2016

Sunday’s Cyber Security Fact: The Angler Exploit Kit’s Rate of Infection (June 19, 2016)

Author: ginasilvertree

Angler Manages to Infect more than One Million Workstations a Year “There is a common misconception that a user explicitly needs to download a malicious file in order to get his PC infected. Exploit kits use a technique called drive-by-downloa ...

June 17, 2016

CyberPop – What are Exploit Kits?

Author: ginasilvertree

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What are Exploit Kits? According to Wikipedia, “an exploit kit is a software kit designed to run on web servers, with the purpose of ...

June 14, 2016

“Done for You” – The Complete List of Information Security Governance and Risk Management Training Videos

Author: ginasilvertree

  Information Security Governance and Risk Management professionals maintain and enforce policies to ensure the preservation of information security and build plans to account for applicable risks. Watch these videos to learn more!   Infor ...

June 14, 2016

Tradecraft Tuesday – HDRoot Bootkit

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

June 13, 2016

[Product Update] Introducing My Notes


We’re very excited to launch My Notes on Cybrary. My Notes was developed after spending a good deal of time speaking with Users and learning what we could provide to help improve the experience on the site. Researchers found that if important ...

June 12, 2016

Sunday’s Cyber Security Fact: Vulnerability of Web Apps (June 12th, 2016)

Author: ginasilvertree

” A staggering 98% of tested web applications were vulnerable to attack. Web apps are everywhere now, and it’s essential that updates and patches are installed so known vulnerabilities are addressed.” – 2015 Trustwave Global Secur ...

June 11, 2016

CyberPop – What was Heartbleed?

Author: ginasilvertree

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What was Heartbleed? A widespread vulnerability discovered in April 2014 that put user passwords (and other sensitive information) on popul ...

June 8, 2016

“Done for You” – The Complete List of Kali Linux and Linux Training Videos on Cybrary

Author: ginasilvertree

Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd. Mati Aharoni, Devon Kearns and Raphaël Hertzog are the core developers. (from Wikipedia ...

June 7, 2016

[podcast] Earl Carter dissects the Angler Exploit Kit

Author: BrBr

Earl Carter (@kungchiu) spends all day researching exploit kits and using that information to protect customers from various malware payloads that spread ransomware.  This week we sit down with him to understand the #Angler EK. He starts us off wit ...

June 6, 2016

[Product Update] Introducing the New Course Catalog


Today, we’re introducing the new course catalog on Cybrary. To date, Users have had limited flexibility when it comes to sorting through our course catalog. Taking into account some great User feedback, we’ve included the ability to filte ...

June 5, 2016

Sunday’s Cyber Security Fact: Breach Detection (June 5th, 2016)

Author: ginasilvertree

“The majority of data breach victims surveyed, 81 percent, report they had neither a system nor a managed security service in place to ensure they could self-detect data breaches, relying instead on notification from an external party. This was ...

June 4, 2016

CyberPop – What’s “Dwell Time?”

Author: ginasilvertree

CyberPop is a quick way to learn more definitions and facts about cyber security.   Today’s Question: What’s “Dwell Time?”   Answer: “Duration, usually in days, that a vulnerability or infection remains undete ...

June 1, 2016

[podcast] Carbon Black’s Ben Johnson: EDR and threat intel

Author: BrBr

  Ben Johnson (@chicagoben on Twitter) has spent a good deal of time working on protecting client’s endpoints. From his work at the NSA, to being the co-founder of Carbon Black (@carbonblack_inc). Ben is co-founder and chief security stra ...

June 1, 2016

“Done for You” – List of Malware Training Videos

Author: ginasilvertree

Here’s a “done for you” list of Cybrary’s Malware Training Videos. Enjoy!   Incident responders (or Malware Analysts) perform appropriate malware analysis in order to fix the current infections and prevent future ones. M ...

May 31, 2016

Tradecraft Tuesday – RUAG Breach Breakdown

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

May 29, 2016

Sunday’s Cyber Security Fact: Startling Belief (May 29, 2016)

Author: ginasilvertree

Despite almost daily reports revealing the contrary, 44% of organizations still believe they can keep attackers off their network entirely. – CyberArk’s 2015 Global Advanced Threat Landscape Survey

May 27, 2016

CyberPop – Define Code Injection

Author: ginasilvertree

CyberPop tests your knowledge and builds your strength as an Infosec pro. Today’s Question: Define Code Injection Answer: An attack or pentest that introduces malicious code into a software application, which executes the code when the applicati ...

May 25, 2016

“Done for You” – List of TCP/IP Training Videos

Author: ginasilvertree

Let’s begin…   TCP .IP Internet Protocol Length: 15:48   TCP/IP Configurations (part 1) Length: 07:30   TCP/IP Configurations (part 2) Length: 11:33   TCP/IP Configurations (part 3) Length: 13:14   TCP/IP Configu ...

May 24, 2016

[podcast] Software Restriction Policies and Applocker

Author: BrBr
 1626 Windows has all the tools you need to secure an OS, but we rarely use them.  One example of this is ‘Software restriction policies’ or the use ...

May 20, 2016

“Done for You” – List of Hacker Training Videos

Author: ginasilvertree

Here’s a concise list of offensive Hacker Training Videos on Cybrary (in alphabetical order by first letter). Enjoy!   Google Hacking Length: 3:24 Google Hacking Lab Length: 25:40 Hacking Web Servers (Whiteboard) Length: 19:36 Info Gat ...

May 20, 2016

CyberPop – Name the 7 Stages of an APT Attack

Author: ginasilvertree

CyberPop from Cybrary aims adds to your knowledge as an Infosec pro.   Today’s Question: Name the 7 Stages of an APT Attack   According to, the 7 stages are: 1. Reconnaissance 2. Intrusion into the network 3. Establishing a ...

May 18, 2016

S3SS10N Wednesday – Hashing Algorithms For Data Integrity

Author: Tatianna

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Kelly Handerhan Skilled ...

May 17, 2016

Tradecraft Tuesday – IoT Worm Casestudy

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each w ...

May 15, 2016

Sunday’s Cyber Security Fact: Education and Awareness (May 15, 2016)

Author: ginasilvertree

According to a recent survey, some 42% of survey respondents said security education and awareness for new employees played a role in deterring a potential [cyber] criminal. — “US cybercrime: Rising risks, reduced readiness; Key findings from th ...

May 11, 2016

S3SS10N Wednesday – How to Break into a Company from the Internet (part 1)

Author: Tatianna

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Andrew McNicol Andrew (@ ...

May 10, 2016

Tradecraft Tuesday – Verizon Breach Report Overview

Author: kylehanslovan

#content-block-background-1605 { background-image: url(); background-position: center top; background-repeat: no-repeat; background-color: #fff; background-attachment: scroll; background-size: auto; } # ...

May 6, 2016

A Missing Piece That’s Hurting Your Company’s Cyber Security Efforts

Author: ginasilvertree

Take a moment to consider your company’s cybersecurity efforts. Do you picture your IT and security teams devising proactive technical solutions and dealing with threats? If so, that’s a typical and valid response.   Yet, there’s another k ...

May 6, 2016

Next Generation Mobile Hacking Techniques

Author: StevenE

What is Mobile Hacking? With the alarming rate of advances in technology and affordability, a New Wave of Hackers has reached the shores of the infosec world. And the preferred choice of platform for these next generation hackers? The Mobile Phone. T ...

May 4, 2016

S3SS10N Wednesday – IP Security (part 2)

Author: Tatianna

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Kelly Handerhan Skilled ...

May 3, 2016

Tradecraft Tuesday – COM Scriptlets & the Squiblydoo Attack

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

April 27, 2016

S3SS10N Wednesday – IP Security (part 1)

Author: Tatianna

What is S3SS10N Wednesday? Click here to find out more, or watch the Session below to experience it.   You must be a Cybrary member to view this S3SS10N Wednesday video. Join for free. Join Now Login Instructor Bio- Kelly Handerhan Skilled ...

April 21, 2016

[PODCAST] Episode 22 The one after the long break

Author: CyDefe

On this weeks episode we discuss checking for malware in your firmware with Google’s VirusTotal, Getting pwned by hearthstone hacking tools, Fake Flash Update Serves OS X Scareware, and the FBI trying to scrub its employees data off of the web ...

April 20, 2016

S3SS10N Wednesday – Ransomware, Where It Fits In Your Budget

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

April 19, 2016

A Big Thank You to Joe Taylor!

Author: ryan

I just wanted to take a minute to thank Joe Taylor @jbtaylor051 for making a substantial donation today. Joe purchased a huge amount of Cybytes, and the team here at Cybrary would like to say thank you!

April 18, 2016

Tradecraft Tuesday – Hacking Team Breach Overview

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

April 13, 2016

S3SS10N Wednesday – Malware Persistence 101

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

April 6, 2016

[podcast] Michael Gough, the ISSM model, and the 5 P’s

Author: BrBr
 1705 Direct Link: iTunes: ...

April 6, 2016

[podcast] Ben Caudill on App Logic Flaws, and Responsible Disclosure”

Author: BrBr
 1575 Ever bought “-1” of an item on a retail site? Or was able to bypass key areas of an application and get it bypass authentication, or you were able ...

April 6, 2016

S3SS10N Wednesday – These 4 Steps Will Prevent You From Ransomware Destruction

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

April 5, 2016

Tradecraft Tuesday – Malvertising (Malicious Advertising)

Author: kylehanslovan

What is Tradecraft Tuesday? Every Tuesday at 12pm ET, Chris Bisnett and Kyle Hanslovan expose the techniques used by hackers. With their 20 combined years in offensive cyber security and digital forensics, Chris and Kyle cover a new topic each we ...

April 4, 2016

Cyber Resilience [A Primer]

Author: ginasilvertree

In 1903, “Magician and inventor Nevil Maskelyne disrupted John Ambrose Fleming’s public demonstration of Guglielmo Marconi’s purportedly secure wireless telegraphy technology, sending insulting Morse code messages through the auditoriu ...

March 30, 2016

S3SS10N Wednesday – What It Means to Be a Cyber Professional

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and Subject Matter Experts’s. They are designed to provide you with a quick dose of cyber security learning. New episodes from v ...

March 25, 2016

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section

Author: ginasilvertree

Cybersecurity News Site Review: TechNewsWorld – Cybersecurity Section Relevance to the Readership: Potentially high. A Google search on “cybersecurity news sites,” returned this site as the second listing on the SERP. This site may likely have ...

March 23, 2016

S3SS10N Wednesday – Aggregation, Inference, and Polyinstantiation

Author: Tatianna

You must be a Cybrary member to view this S3SS10N Wednesday Video .. Login or Join for Free Now

March 15, 2016

S3SS10N Wednesday – How to Sell Compliance to Management

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are weekly 15 minute (or less) white board lessons by Cybrary Instructors and SME’s. They are designed to provide you with a quick dose of cyber security learning. We publish a new episode every Wednesd ...

March 14, 2016

Hector Monsegur, on being a reformed “Black Hat”

Author: BrBr

Hector Monsegur has had a colorful history. A reformed black hat who went by the name ‘Sabu’ when he was involved in the hacker collectives “Lulzsec” and “Anonymous”, he turned state’s evidence for the FBI, w ...

March 9, 2016

[podcast] R-CISC Exec. Dir. Brian Engle, on threat intel

Author: BrBr
 1607 We’ve reached peak “Br[i|y]an” this week when we invited our friend Brian Engle on to discuss what his organization does. Brian is the Exe ...

March 8, 2016

S3SS10N Wednesday – History of Cyber Security Intelligence

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are our weekly 15 minute (or less) lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will ...

March 7, 2016

[podcast] History of DNS, DNS reconnaissance in pentests, and protecting your DNS infrastructure

Author: BrBr
 1462   DNS… we take it for granted… it’s just there. And we only know it’s broken when your boss can’t get to Facebook. This week, we discuss the ...

March 3, 2016

Cyber Security Degrees Remain Critical, Though Certs Drive the Industry

Author: ryan

Diving a little deeper Previously, I’ve written about the value of cyber security degrees and wanted to dive a little deeper into this topic. Lately, I have had a series of conversations on this topic. The opinion I’ve formed on the sub ...

March 2, 2016

S3SS10N Wednesday – Build Your Own Pen Testing Lab

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are our weekly 15 minute lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will be availab ...

March 1, 2016

[PODCAST] Episode 21 The 2015 Wrap Up

Author: CyDefe

Hey hey everyone after a very long break due to work, education, and family circumstances we are finally back. On this weeks episode we are joined by Ben Miller and Jayson Street. We discuss three stories from 2015 and talk about our predicitons for ...

February 24, 2016

[podcast] Pentesting and Defending a Mainframe and Mainframe Security

Author: BrBr
 2242 This week’s super-sized episode is brought to us thanks to previous guest Cheryl Biswas. You might remember her from our “Shadow IT” (http:/brakeingsecurity ...

February 24, 2016

S3SS10N Wednesday – Initialization Vectors

Author: Tatianna

You must be a Cybrary member to view this S3SS10N. Don’t worry, membership is completely free! Join Now Login

February 17, 2016

[podcast] Application Profiling with FingerprinTLS!

Author: BrBr

We first heard about FingerprinTLS from our friend Lee Brotherston at DerbyCon last September. Very intrigued by how he was able to fingerprint client applications being used, we finally were able to get him on to discuss this. We do a bit of history ...

February 11, 2016

[podcast] “Moxie vs Mechanisms”: The Over-Dependence on Tools and Automation

Author: BrBr

This week starts with an apology to Michael Gough about comments I (Bryan) mangled on the “Anti-Virus… What is it good for?” podcast. Then we get into the meat of our topic… a person’s “Moxie” vs. a mechanism ...

February 10, 2016

S3SS10N Wednesday – Cellphone Search and Seizure Laws

Author: Tatianna

You must be a Cybrary member to view this S3SS10NS. Membership is free! Register Now Login Whiteboard Notes (Click the picture below to open in a new tab)   The Supreme Court Decisions of Riley v. California and U.S. v. Wurie (seizure of cell ...

February 3, 2016

S3SS10N Wednesday – Kerberos in Depth

Author: Tatianna

What is S3SS10N Wednesday? S3SS10N Wednesdays are our weekly 15 minute lessons put together by Instructors and Cybrary Staff to offer you valuable information relevant to your life. Every Wednesday morning (Eastern time) a new session will be availab ...

February 1, 2016

[podcast] Dropbox Chief of Trust and Security Patrick Heim!

Author: BrBr

Patrick Heim, Chief of Security and Trust at Dropbox Brakeing Down #Security had the pleasure of having Patrick Heim join us to discuss a number of topics.   What stops many traditional #companies from moving into #cloud based operations? What h ...

February 1, 2016

February is #SecureCodingMonth at Cybrary!

Author: ryan

The team at Cybrary has officially named February: #SecureCodingMonth Given that secure coding principles are often so overlooked in most CS programs and coding classes, we feel the obligation to fill the coding security void. There are many courses ...

January 24, 2016

[podcast] Infosec Author Bill Gardner

Author: BrBr

BrakeSec Podcast welcomes Bill Gardner this week! #Author, #InfoSec Convention Speaker, and fellow podcaster… We break a bit from our usual rigid methods, and have a good ol’ jam session with Bill this week. We talk about #vulnerability # ...

January 17, 2016

[podcast] Anti-virus (…what is it good for… absolutely nothing?)

Author: BrBr

Anti-virus products… they have been around for as long as many of us have been alive. The first anti-virus program, “The Reaper” was designed to get rid of the first virus ‘The Creeper’ by Ray Tomlinson in 1971. This wee ...

January 14, 2016

Building Threat Analyst Centaurs Using Artificial Intelligence

Author: klowe

When you think of a centaur, thoughts of a mythical creature that can perform threat analysis doesn’t exactly come to mind, does it? Enter Recorded Future’s artificial intelligence system – poised to provide both intelligence and s ...

January 13, 2016

It’s 2016…and Recorded Future is Naming the 3 Hottest Security Trends for the New Year

Author: klowe

  As every security professional knows, for every ‘Happy New Year!’ shout, hoot and holler, there’s a heck of a lot additional commotion going on surrounding another issue—a new year of new security threats. And while it ...

January 11, 2016

[podcast] Cryptonite – or how to not have your apps turn to crap

Author: BrBr

This week, we find ourselves understanding the #Cryptonite that can weaken devs and software creators when dealing with #cryptographic #algorithms and #passwords. Lack of proper crypto controls and hardcoded passwords can quickly turn your app into c ...

January 7, 2016

[#podcast]: Jay Schulmann explains how to use BSIMM to enhance your security program

Author: BrBr

#Jay #Schulman is a consultant with 15+ years of experience in helping organizations implementing #BSIMM and other compliance frameworks.  For our first #podcast of 2016, we invited him on to further discuss BSIMMv6 and how he has found is the best ...

January 4, 2016

Android Authority features the previously banned Cybrary App

Author: ryan

The good folks over at Android Authority featured our Android App, which of course was previously banned in the Google Play Store. Again, thanks to all of you who caused an uproar, which ultimately got the app reinstated by Google Play. Here is the ...

December 30, 2015

Cybrary is Seeking a WordPress Web Developer, Full-Time in Maryland

Author: ryan

ATTENTION: Web Developers in the Washington DC / Baltimore, MD area!! Here is a chance to come work for us!! We are seeking a talented WordPress developer to join our team, and work with us to continue to build our rapidly growing community and learn ...

December 28, 2015

[podcast] Interview with ISC2 Board member Dave Kennedy

Author: BrBr

Dave Kennedy does a lot for the infosec community. As owner/operator of 2 companies (Binary Defense Systems and Trusted Security), he also is an organizer of #DerbyCon as well as creator and active contributor to the Social Engineering ToolKit (#SET) ...

December 17, 2015

[podcast] Interview with ISC2 board member Wim Remes…

Author: BrBr

I got a hold of Mr. Wim Remes, because he was elected to the ISC board in November 2015.  Recent changes to the CISSP included changing the long-standing 10 domains down to 8 domains, plus a major revamp to all of them. I wanted to know what Mr. Rem ...

December 16, 2015

Cybrary’s 2016 Cyber Security Job Trends Report [Infographic]

Author: ryan

Recently, we surveyed 435 senior-level cyber security professionals on topics surrounding the cyber security job market, and discussed the directions the market may be heading. As we’ve discussed many times, cyber security’s skills gap is ...

December 14, 2015

Tell us what you think about the new course pages!

Author: Tatianna

We’ve realized that it might have been confusing for some people on where to start a class since all of the “good stuff” was buried under hundreds of page scrolls. Well now we’ve re-arranged the main course pages. The informa ...

December 10, 2015

[podcast] MITRE’s ATT&CK Matrix:

Author: BrBr

#MITRE has a matrix that classifies the various ways that your network can be . It shows all the post-exploitation categories from ‘Persistence’ to ‘Privilege Escalation’. It’s a nice way to organize all the information ...

December 7, 2015

[podcast] Can you achieve Security Through Obscurity?

Author: BrBr

That’s the question many think is an automatic ‘yes’.  Whether your httpd is running on port 82, or maybe your fancy #wordpress #module needs some cover because the code quality is just a little lower than where it should be, and y ...

December 3, 2015

Around the World with Cybrary


Globally, cyber security shortages are expected to reach upward of 1.5 million by the year 2020. As the Cybrary community reaches the 300,000 registered users mark; we found this a great opportunity to thank everyone that has contributed and continu ...

December 1, 2015

Google Hears Cybrarian’s Appeal, Lifts Ban on Free Cyber Security Training App

Author: ryan

This post is an update to my previous post about Cybrary’s Android app being banned from the Google Play store: Thank you Cybrarians, for your ...

November 29, 2015

[PODCAST] Episode 20 Another giveaway episode

Author: CyDefe

On this week’s episode we discuss Microsoft’s operations center to fight cyber threats, Dell added Cylance, a bug in Gmail app for Android allows anyone to send spoofed emails, and Siri’s lockscreen bypass. This weeks episode also has a codewor ...

November 25, 2015

Google Play – Against Cybersecurity Education and for Censorship? You Decide

Author: ryan

What we are about to present are facts regarding why the Google Play Support team decided to remove our app from their app marketplace, and how this position by Google Play reflects a negative stance against the free flow of cyber security education, ...

November 25, 2015

A Career in Cyber Security


Cybersecurity – Choosing a Career As computer systems store more and more confidential personal, financial, medical, and top secret data, protecting that data is becoming more and more important to governments and businesses, worldwide. Enterpris ...

November 17, 2015

Please Help! The November Invite Campaign

Author: ryan

Hello Fellow Cybrarians, As you know, our promise to you at Cybrary is that we will continue to provide new, cutting edge cyber security classes for free, forever. We will never ask you to pay for our classes. We are working hard to continue to buil ...

November 10, 2015

Cybersecurity Industry Certifications: What You Need to Know


Cybersecurity certifications are very often required for employment in cybersecurity jobs. Certifications benefit employers by identifying prospective employees with specific skill sets, and certifications help prospective employees stand out when a ...

November 9, 2015

Think a Cybersecurity Job is All Technical? Think again.


Struggling to get that promotion or land that cybersecurity job? Have all the right skills/certifications/years of experience but things just don’t seem to work out? You’ve read about the demand for cyber professionals, seems like a no brainer th ...

November 6, 2015

Increasing Millennials’ Interest in Cyber Security Careers


Cyber security is a booming field with many positions available, but Millennials seem to be largely ignorant of these opportunities. In order to stay on top of the demand for cyber security specialists, both current professionals and educational ...

November 5, 2015

5 Reasons Cyber Professionals Don’t Worry About Job Security


Updated August 2018 Job security in the field of Cyber Security: Cyber security, as much as it seems to be just a buzzword as of late, is very much part of our present and future lives. Today’s cyber industry is more than just “generic I ...

November 4, 2015

Top 5 Highest Paying Cyber Security Jobs


Cyber security jobs offer lucrative financial rewards for protecting the nation’s computer networks and data from attack or unauthorized use. These top five highest paying positions command six-figure salaries: 1. Chief Information Security Officer ...

November 4, 2015

Remember Remember the Fifth of November – #RememberRemember

Author: ryan

In honor of November 5th, we will be issuing double Cybytes on all Cybyte based activity (not on purchases, these ones you have to earn). Cybytes activities can be found here: So, any time on 11/5/2015, login and acc ...

November 3, 2015

Choosing A Career in Cybersecurity: Public Sector or Private Sector?


With the proliferation of hack attacks and cybersecurity breaches, there is a growing need for cybersecurity experts and, therefore, there are an increasing number of opportunities in cybersecurity for those entering the work place or wanting to chan ...

November 3, 2015

Big Cybersecurity Budget Means Big Business for Defense Contractors


Following last month’s $1billion contract awarded to Raytheon from the Homeland Security Department, the Pentagon is now taking bids from defense contractors to help protect against the digital future. Big industry names such as Raytheon Co., Lockh ...

November 3, 2015

Looking for a Security Clearance? You Better Pay Attention to Cybrary!

Author: ryan

Finding a job that will sponsor you for a US Security Clearance is pretty tough to do. Many jobs out there in the US Cyber Security jobs market require that you already have a clearance. People know all to well, that in the USA, a Security Clearance ...

November 2, 2015



A “Cyber Talent Pipeline” refers to an organization’s creation of an going, readily available, talent pool to fill various cyber security jobs, as they become available. The effects of a poorly maintained pipeline is hitting the cyber secu ...

October 29, 2015

CyDefe podcast episode 19

Author: CyDefe

Episode 19 of our podcast is up at On this weeks episode we are joined by Shannon Morse. We discuss hacking chip and pin cards, malware that replaces your browser, a FitBit danger, and the rise of OS X malware. Have a listen and ...

October 28, 2015

Take the Cybrary Cyber Security Survey – Win an iPad!

Author: klowe

Did you know that the demand for skilled cyber security professionals is growing four times faster the overall IT job market, and 12 times faster than the total labor market? Currently there are more than a million open job postings for cyber se ...

October 26, 2015

[podcast] WMI, WBEM, and enterprise asset management

Author: BrBr

WMI (Windows Management Instrumentation) has been a part of the Windows Operating system since Windows 95. With it, you can make queries about information on hosts, locally and even remotely. Why are we talking about it? Its use in the enterprise and ...

October 26, 2015

Help Our Android App!!

Author: ryan

Hello Cybrarians, I hope you all had a great weekend! Many of you know that Two weeks ago, we launched our Android Application, which is available here I would like to ask for your help i ...

October 20, 2015

Help Name the Cybrary Community

Author: Tatianna

We’ve toiled and wracked our brains trying to figure out what to call our members, but nothing ever seemed good enough.   Trying to explain who our global community is in just a name is trickier than it seems. Now you get the chance to voice you ...

October 16, 2015

How to Get a Cyber Security Job on Cybrary

Author: klowe

Getting hired has never been an easy process. Between revamping your resume and spending hours on LinkedIn searching for ‘networking opportunities’, looking for a new job can be both time-consuming and frustrating. Enter Cybrary’s ...

October 15, 2015

Traversing the Cyber Corridor


Washington D.C., Virginia, and Maryland are being called the hub for cyber security jobs. Driven by an exorbitant federal budget and an influx of venture capital, demand for cyber security professionals is not only high, but, as basic economics tells ...

October 13, 2015

We’ve Gone Mobile

Author: Tatianna

Get even more convenient access to Cybrary through our Android mobile app so you can learn how to hack, crack and exploit nearly anything. Our developer @akhaliq92 has worked diligently over the past several months to make your mobile experience bett ...

October 13, 2015

Cyber Security from a College Student’s Perspective

Author: Maddie

Typically, October equals Halloween. The month of October is also national cyber security awareness month. Sure it’s all about the haunted houses, frightening decorations, and scary costumes. Do you know what else is scary? Viruses and malware. The ...

October 12, 2015

[podcast] Guardrails vs. Speedbumps

Author: BrBr

When we wanted to have Martin Fisher on, it was to discuss ‘Security Mandate vs. Security Influence’. We wanted to discuss why companies treat compliance as more important, and if it’s only because business requires it to be done. A ...

October 8, 2015

CyDefe Podcast Episode 18

Author: CyDefe

Hey hey everyone. We at CyDefe have released another awesome episode of our cyber security podcast. On this week’s episode we discuss fake blue screen of death, ad blocking, a critcal WinRAR vulnerability, and a shortage of cyber professionals. Yo ...

October 6, 2015

The Twisted Security Honey Pot Network

Author: klowe

Sure, maybe you’d like to think you possess the manpower to monitor your computer networks 24/7, but we all know that’s simply impossible.  Thus, threats come as they may, and you might be sleeping when one attempts to overthrow your da ...

October 6, 2015

Java Programmers Competition IPPC: Show Me Your Speed

Author: ryan

Cybrary would like to announce a really cool Java programming competition by our friends at NextHacker. Check it out:  Java Programmers Competition IPPC: SHOW ME YOUR SPEED!  We are already convinced that there are many gifted programmers and inge ...

October 5, 2015

Jobs are coming!

Author: Tatianna

Employers Want YOU!   If you are searching for a job or looking to change to a career in IT or Cyber Security, our developer has created something special for you. Cybrary’s job platform was created for employers, recruiters – and yes – Y ...

September 18, 2015

Hacked Through Phishing: An Ugly Security Awareness Lesson Learned

Author: ryan

Given we’re a cyber security education company, we like to preach (maybe too much at times) about how darn important security awareness training for employees really is. So, we thought we’d share the hideously ugly lesson that internet ...

September 16, 2015

Why Using Study Guides Make a Big Difference

Author: klowe

You know those times where you took an exam without studying, and still did well? We hate to break it to you, but those times don’t exist in the Infosec world.  Sure, you may have one or two baby Einsteins who can sit through a five-day bootc ...

September 3, 2015

Why Hundreds of Thousands of People are Learning Hacking, for Free

Author: ryan

Perhaps it is somewhat shocking that hundreds of thousands of people are learning hacking, for free on Cybrary. However, there are several very good reasons for this free cyber security learning revolution. A fundamental change in the way cyber secur ...

August 19, 2015

CyDefe Podcast Has a Cool Tee Shirt, Help Support Their Kickoff!

Author: ryan

There is a cyber defense podcast that launched a couple of months ago called CyDefe, and they have been doing some really cool things. Their focus, and tagline, is “Making cyber defense simple”. I had the pleasure of joining this podcast ...

August 7, 2015

A Synopsis of Personally Identifiable Information (PII) for End-User Security

Author: ryan

Updated October 2018 Regarding, end-user security, the term PII is commonly referenced. PII, or Personally Identifiable Information, consists of data that can allow an individual to trace and/or contact another person. This type of information may ...

August 4, 2015

Security Awareness – How to Spot Spoofed Emails and URLs

Author: ryan

Security Awareness Training has migrated from a “nice to have” security function within an organization, to now, a “must have.” In fact, more quickly than ever, companies of all sizes and industries are integrating security aw ...

July 9, 2015

Security Awareness, Now Available at Cybrary!

Author: ryan

Great news! Our End User Security Awareness training course, is now available from Cybrary. No matter how well trained the cyber security staff is within your organization, the greatest vulnerability remains just that, a huge vulnerability, if it re ...

July 3, 2015

Minimize Vulnerability to VMEscape

Author: ryan

Are you familiar with the process of a virtual machine’s OS separating from its parent’s hypervisor, which is known as VMEscape? Are you familiar with the key vulnerabilities that exist within the VMEscape process? Here is how you mitig ...

June 29, 2015

Security+ Certification Success by Cybrary Member @aer9480

Author: ryan

Below is an email we received from Cybrary Member @aer9480. He wrote to tell us about the success he had in passing the exam after taking our Security+ Course. If you have a similar success story, we’d love to share it. Send an email telling u ...

June 23, 2015

Why Isn’t That Course Live Yet?!

Author: klowe

We get it. We truly do. We’re JUST as excited about our new classes as you. We understand the anticipation, the anxiousness and the frustration. You joined Cybrary just for Malware Analysis. You refresh the Metasploit course page daily.  We ge ...

June 23, 2015

CompTIA Security+ Certification, Evolution and Innovation for Sustained Relevancy

Author: ryan

Many companies, throughout the years, have failed because they failed to innovate and change. Many great market leaders, like Kodak, even held in their hands the future of their industry, and still refused to embrace it. Change is always difficult fo ...

June 22, 2015

The Role of Information Security Governance and Risk Management in the CISSP certification

Author: Rachel Laura M

The Certified Information Systems Security Professional (CISSP) certification is a strong credential to have for professionals who have a mix of both technical and managerial experience as well as competence in designing, engineering and the overall ...

June 16, 2015

Education: the first line of defense in wireless network security

Author: Rachel Laura M

Wireless networks are fast and convenient and allow for many devices to be connected on a network and communicate with each other. However, this technology presents a new set of issues that weren’t present in the wired world. Mainly, threats to sec ...

June 16, 2015

The Limitations of Modern Cryptography

Author: Rachel Laura M

Individuals now own multiple electronic devices – from Smartphones, to tablets, to laptops and more. They often bring these items into the workplace, or use them to work from a remote location. Increased threats to a company’s important and c ...

June 13, 2015

A Good Plan is Crucial in the Fight against Cyber Crime

Author: Rachel Laura M

In a physical crime scene, say a home has been burned down as a result of an arsonist or maybe a home has been burglarized, the role of first responders on the scene is very important. These skilled individuals must be able to avoid contaminating the ...

June 11, 2015

Cybrary is Going Global!

Author: klowe

Calling all Spanish, French and German Speakers Cybrary’s mission is to provide free cyber security and IT training to people across the globe. However, as an English-only website, we have been limited in our ability to reach people who do no ...

June 11, 2015

Learning from Home: How to succeed at Cybrary’s Online Learning

Author: Tatianna

Updated August 10, 2018 When taking classes to prepare for exams, there are important factors to consider. With Cybrary’s courses, much of the class material is based on watching videos. While this may be great for some people, for others it is not ...

June 9, 2015

What is the CIA Triad? Confidentiality, Integrity and Availability

Author: ryan

The CIA triad is becoming the standard model for conceptualizing challenges to information security in the 21st century. CIA stands for confidentiality, integrity and availability, which are said to be the three most important elements of reliable se ...

June 8, 2015

Ethical Hacking: It’s not an oxymoron.

Author: Rachel Laura M

When most people think of a hacker, they think of a dishonest individual who uses techniques to bypass a system’s defenses and steal confidential and sensitive information. Security breaches, data as well as identify theft are all incidents which c ...

June 8, 2015

The Growing Field of Digital Investigation

Author: Rachel Laura M

Computer related crime is very prevalent in this day of global communication, people bringing their personal electronic items to work as well as many companies having people who do not work in house but instead opt to work remotely. For this reason, ...

June 4, 2015

Vulnerability Assessment & Penetration Testing, An Analysis

Author: ryan

The following is a re-post of the excellent PowerPoint presentation created by Cybrary SME @ethicalmjpen regarding Vulnerability Assessment and Penetration Testing and how the two differ, and overlap. We wanted to share this on the blog because the c ...

June 3, 2015

The Importance of the CompTIA Network+ Course for a Cyber Security Career

Author: ryan

Many of the Members that join Cybrary, join because they are looking to begin a career in cyber security. This is obviously a great idea given that the amount of unfilled jobs in cyber security, globally, is estimated to be over 1 million. The questi ...

June 3, 2015

The Key Notes of Cryptography

Author: Rachel Laura M

Public key cryptography has been around for a long time. Whitfield Diffie and Martin Hellman invented it in 1976. It sometimes goes by the name Diffie-Hellman encryption as well as symmetric encryption as it uses to keys instead of one (this is calle ...

June 2, 2015

The Emerging and Growing field of E-Discovery

Author: Rachel Laura M

Electronic discovery, also known as e-discovery refers to a process of how information is obtained, located and secured to be used as evidence in a civil or criminal legal case. E-discovery can be carried out in the following ways: Offline On a part ...

June 2, 2015

All You Needed to Know about the CompTIA CASP Certification

Author: Rachel Laura M

The CompTIA Advanced Security Practitioner (CASP) certification is a credential that designates professionals IT industry with advanced-level security skills and knowledge. The CASP certification is approved by the United States Department of Defense ...

June 2, 2015

Is Security Awareness Training a Worthy Investment?

Author: ryan

Over the past few years, the news has been full of stories detailing how large corporations put the security information of tens of thousands of their clients at risk. More times than not, these risks came as the result of low-level employees doing t ...

May 28, 2015

Useful Tools for Security Professionals

Author: klowe

Threat intelligence company Recorded Future has just released a daily email service that will deliver up-to-date information on the latest threat indicators for IT and cyber security professionals. The service, called the Cyber Daily, is a free news ...

May 22, 2015

What Enterprise End User Security Awareness Effectiveness Requires

Author: klowe

The end user security awareness industry has taken off substantially in the last several years. As more and more organizations are breached and embarrassed publicly due to end user negligence or malevolence, the mass adoption of “we need to do ...

May 15, 2015

Create a Culture of Cyber Security Learning in Your Organization

Author: ryan

Cybrary’s initiative is to make cyber security learning free and open for everyone, everywhere. This basically means, we want to provide the opportunity to learn to those who either want to begin a career in the field, or for those who want to ...

May 6, 2015

Summarizing The Five Phases of Penetration Testing

Author: ryan

In the ethical hacker class on our website, the course begins by recapping the five phases of penetration testing. Essentially, the five phases of pen testing is a module that summarizes what the rest of the ethical hacker class is going to look like ...

April 24, 2015

Add some swagger to your Profile

Author: CybrarySupport

Show off Your Achievements Use Cybrary often? Completed several courses? Show off what you’ve worked so hard for! Now that you have earned the cred make sure to share your achievement! Our L337 Emblem is available below along with a code snippe ...

April 21, 2015

Coding and Cyber Security, Hand-in-Hand, Yet Different

Author: ryan

We often get asked by our Members, if we plan on offering coding classes. The short answer is no, and typically, what we do, is refer people to sites like Codecademy and Code Fellows. Those companies specialize in coding / programming training, and h ...

April 20, 2015

Password Cracking: How to Do It

Author: klowe

  In order to get into a secured system, you’ll have to first break in—and a lot of times, the first step in doing so requires cracking a password. Contrary to popular belief, password cracking doesn’t actually require a lot o ...

April 20, 2015

The Starting Point of all Major Public Hacks: Footprinting

Author: ryan

Want to Know How and Where All Major Data Breaches Begin? With all of the publicity major corporate data breaches receive, we often get caught up in the outcomes. What happened, how many people were impacted and in what ways, who was responsible, et ...

April 16, 2015

Start Learning Mobile Penetration Testing and the Smartphone Pentest Framework

Author: ryan

The Smartphone Pentest Framework (SPF) in Kali Linux is an increasingly useful tool, initially developed by Georgia Weidman. The 5 part tutorial for how to use the SPF is part of the Advanced Penetration Testing class, which of course is free, just l ...

March 12, 2015

Classes That Help You Build a Cyber Security Career

Author: ryan

This post will begin by assuming you have a baseline skill set in information technology. Generally, in order to begin your career in Cyber Security, you would need some fundamental skills. Often, in the IT training industry, baseline skills include ...

March 6, 2015

Please Help Cybrary’s Kickstarter Campaign

Author: ryan

The first month and a half here at Cybrary have been really fun. So far, we are hearing from our Members that they appreciate what we are doing. I have spoken on this blog before about why we believe so firmly, that the opportunity to learn should be ...

February 10, 2015

Red Team Vs Blue Team Review

Author: Admin Anthony

What is Red Team & Blue Team? At its core, there are two main players in any cybersecurity or penetration testing event. While the terminologies for the two sides vary (Hackers vs. Defenders, ‘Bad Guys’ vs ‘Good Guys’, etc.) one of the mo ...

February 6, 2015

Education is Too Limited, but Change is On Its Way

Author: ryan

Hopefully, with the support of our Members, Cybrary can be successful. Why? Because the education system both domestically here in the USA, and internationally, is flawed, badly. Education is far too limited. If one is not born into a family that hig ...

January 27, 2015

Everyone Deserves the Opportunity to Learn

Author: ryan

“Education is the most powerful weapon which you can use to change the world.” -Nelson Mandela For too long IT & Cyber Security education has been reserved for those who have the money to pay highly inflated prices. In the growing technologic ...

January 15, 2015

 The Liberation of IT & Cyber Security Training Begins

Author: CybrarySupport

My Fellow Cybrary Members, We sincerely want to thank you for joining the revolution to liberate IT and cyber security training, for everyone, everywhere. The support you are providing will change the very landscape of the industry forever. I am post ...

January 5, 2015

Thank You for Joining the IT Learning Revolution

Author: ryan

Hello Cybrary Members, First, we are appreciative that you have decided to join our community. We cannot survive without members, and we are working very hard to make your learning experience here as excellent as possible. The training on Cybrary is ...

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?