0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

TLS 1.2 and TLS 1.3 - What's the Difference?
By: hempelge
December 18, 2018

TLS (Transport Layer Security) was developed as a descendant of SSL in order to provide a secure channel between two communicating peers (i.e., web browsers and servers). The main intent of TLS is to authenticate peers, prevent eavesdropping, and tamper-proof communications by validating the authenticity of messages. The protocol aims to authenticate all data, maintain the integrity of the ...

Career Readiness: Developing Yourself at Any Stage of Your IT/Cyber Career
By: ginasilvertree
December 17, 2018

According to the careertech.org website, “A career-ready person effectively navigates pathways that connect education and employment to achieve a fulfilling, financially-secure and successful career.” This site also notes that a career is more than just a job and career readiness has no defined endpoint. Further, to be career ready in an ever-changing global economy requires adaptability ...

How Haaz Skipped the Entry-Level Job and Shattered the "No Experience" Barrier
By: SLWelty
December 14, 2018

Haaz is an Insider Pro member who used Cybrary to successfully change career fields. Prior to Cybrary, Haaz encountered many adversities when applying to entry-level jobs with little to no experience. Cybrary’s online learning community gave Haaz the tools and knowledge necessary to wow companies and win interviews. Read more about his journey in his own words:  The ...

All •Cybrary LIVE courses are FREE to attend Monday 12/10 and Tuesday 12/11
December 8, 2018

 Monday and Tuesday, December 10th and 11th, we are offering •Cybrary LIVE courses FREE to all users! For these two days only, you can attend any live course to experience the power of the unlimited access Insider Pro ...

Balancing Network Risk and Cost by Scale
By: Guest Writer
December 6, 2018

It is not always an easy task determining which approach and what amount of resources are necessary to secure networks from cyber attacks. Protecting important information is essential when resources are at risk, but there are wasteful approaches and limited resources ...

Networking Part 3: Routing Metrics, Tables, Broadcast Domains, SPAN Ports
By: Iselin
December 5, 2018

Routing Metrics “Qualities used to determine best path” • Hop count: how many other routers does a signal need to pass?• Maximum Transmission Unit (MTU): The maximum size of a single packet we can send. Bandwidth and ports limit how much data can be pushed through• Casts: reliability, Roundtrip, cost etc.• ...

Quora Data Breach Affects ~100,000,000 Customers.
By: Joe (Research Director)
December 4, 2018

Just the Facts Monday night (for me, I'm in England at the moment), the question/answer site Quora.com reported a data breach potentially affecting 100 million accounts (for those who read my last article, this is about a 1.5 on the  Thriller  scale). According to their release, the following information was obtained by attackers: ...

LAN Turtles and Hardware-Based Network Reconnaissance
By: Tatianna
December 4, 2018

There are a countless number of ways to monitor a network, and often times this means gathering target information and using software to perform reconnaissance. The software is used in acquiring a host target within an organization, extracting information from these ...

Marriott Reports the Loss of 500 Million Customer Records in Massive Data Breach
By: Joe (Research Director)
November 30, 2018

Good news Dell! You are no longer the cybersecurity nightmare of the week. Bad news 500 million people! You are now the victims of a truly magnificent data breach.   First, just the facts. On 30 November, 2018, Marriott International issued a press release ...

Is the CISSP Certification Worth it?
By: Vikrant Saran
November 30, 2018

CISSP is considered as Internationally acknowledged benchmark for the information security professional. From the past two decades, it has gone through the test of times and proved its mettle. Stands for Certified Information Systems Security Professional and is expected to take a great deal of time and efforts from the aspirants by studying CBK - Common Body of Knowledge ...