0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Networking part 2 DNS DHCP MAC
By: Iselin
November 24, 2018

Networking Part 2 DNS “The human name of IP addresses” Allows the computer to translate human names to IP addresses In order to make it easier to browse the web more efficiently, we translate our destination addresses to Domain Names. ...

Networking Part 1 IP Default gateway APIPA
By: Iselin
November 23, 2018

Networking Part 1 IP Addresses “The virtual name and address of a device” IP addresses are logical addresses that are used for identifying devices on a network. IP addresses can be found where devices are connected to a network. For example, a phone, a ...

Top Cybersecurity Predictions for 2019
By: Tatianna
November 21, 2018

This blog is sponsored by Thycotic Cybersecurity has again been a major focus in the past year as the compromise of elections and voting machines is on the top of everyone's minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It's especially concerning after it ...

Access Buildings with Social Engineering
By: Tatianna
November 19, 2018

Social engineering has always been a strange topic. If there’s something posted online about it, it’s either boring and no-one wants to read it, or it’s misconstrued ...

New to Cybrary: Joe Perry
By: Tatianna
November 15, 2018

New to Cybrary: Joseph Perry One of the newest members to the Cybrary team is Joseph Perry . You may have already seen his Python for Security Professionals course, but we want to introduce you to the SME behind the course and why Joe is an important part of the Cybrary Team. There's a ...

Ultimate Guide to Getting a VMware Engineer Job
By: Vikrant Saran
November 13, 2018

VMware is one of the most in-demand technologies in virtualization and cloud computing sphere. Owing to its rising demand in the IT industry and other enterprises, jobs in virtualization is very high. VMware provides an excellent feature to the users. As cloud computing and virtualization has solved many issues of an organization with an ease. One of ...

Is your cell phone under surveillance?
By: Guest Writer
November 11, 2018

Cellphones have become a ubiquitous influence in many individuals lives. And although every cell phone owner walks around with a device in their pocket - or in hand - that is capable of tracking their location and transmitting a wide range of messages, most owners have no idea about the security of their device . These messages may be ...

Passwords Aren't Enough: History of Passwords, Malware and More
By: premraj59
November 9, 2018

Passwords are secure keys that we have to remember to access some document securely, online or offline. Sometimes they may be the only obstacle between a hacker and you. Today, password security is employed by all major sites across the internet and even in the local accounts of your PC, Laptop or Phones. Although there are many ...

Exploiting Vulnerabilities of Windows 2000 Server using NMAP, Nessus and Metasploit
By: Ace
November 6, 2018

Using NMAP to identify OS and services on the vulnerable machine (Windows 2000 server) Nmap is a free and open source for network discovery and security auditing. Firstly we have to setup the virtual environments of vulnerable machine (Windows 2000) and kali Linux on the VM virtual box. And ...

Career Change From Military Logistician to I.T. Specialist - Success Series
By: cybergary
November 5, 2018

Justin B. is an Insider Pro member who chose to make a change in his career path, and made it happen with his own motivation, determination, and ambition.  Here’s his success story, in his own words: Where to start, it has been a crazy year. It started back in February when I, ...