Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Best SIEM Tools in 2021
By: Nihad Hassan
April 1, 2021

The widespread adoption of digital technology has shifted a significant volume of crimes from the physical world into cyberspace. Cyberattacks are increasing in sophistication and numbers. Worldwide cybercrime cost is projected to be $10.05 billion annually by 2025. The estimated losses of cybercrime have been reflected worldwide by increasing spending on security solutions significantly. According to [International Data Corporation (IDC) ...

Cloud Security Policy Fundamentals
By: Nihad Hassan
March 31, 2021

The ongoing spread of coronavirus has forced many companies to change their operating philosophies. The most notable change was in the massive shift from employees working on-site to a remote workforce model. With the increased number of people (both employees and clients) accessing IT systems remotely, the large-scale adoption of cloud technologies has become necessary for businesses. Cloud technology brings ...

How To Become A Program Manager
By: Shelby Welty
March 31, 2021

The Program Manager career path prepares students for a management-level role in an organization's IT department. Students on this path will learn how to lead, coordinate, integrate, and be accountable for the success of an organizational program while maintaining alignment with the company's priorities or enterprise. The program manager career path will help students develop a core technical program leadership ...

End User VPN Security Course Review
By: Prasanna Peshkar
March 30, 2021

Virtual private networks (VPNs) have become prevalent, especially with individuals, because they give high-level security without risking availability. They are simple to configure and use and are one of the most important cybersecurity advantages available today. In this End User VPN Security course from Cybrary, students will learn VPNs' history and who is required to utilize a VPN. This course ...

Email Hacking Techniques To Watch In 2021
By: Nihad Hassan
March 30, 2021

Email is considered the primary vehicle used to carry out different types of cyberattacks. According to many reports, phishing and spear-phishing email are the preferred attack vectors used by cybercriminals to exploit organizations' IT systems. Security Boulevard published a report listing statistics about phishing attacks in 2020. Phishing attacks are mainly conducted via email messages. Spear-phishing attacks cause 95% of cyberattacks ...

Sumo Logic Daily Checks For Success
By: Owen Dubiel
March 29, 2021

Working within a SIEM solution doesn't have to be an overwhelming task. Furthermore, Sumo Logic makes it easy and streamlined for security teams to manage, triage, and respond to daily events without too much overhead work. This article will cover some of the daily tasks that a security analyst should be doing and some of the Sumo Logic features you ...

Top 4 Business Process Management Software
By: Nihad Hassan
March 29, 2021

Business Process Management Software: What are they? And Which BPM are the leaders in the industry? Digital transformation has accelerated significantly during the ongoing COVID19 pandemic; this forces many companies to change their business operations processes to remain operational. Business process management (BPM) has become a key enabler of digital transformation. Gartner defines it as follows “*as the coordination ...

Burp Suite Tutorial (Part 1): Introduction to The Burp Suite Proxy
By: payloadartist
March 26, 2021

Burp Suite acts as a proxy that allows pentesters to intercept HTTP requests and responses from websites. Not just web applications, the Burp Proxy is capable of proxying through requests from almost any application like Thick Clients, Android apps, or iOS apps, regardless of what device the web app is running on if it can be configured to work with ...

Disaster Recovery as a Service (DRaaS)
By: Nihad Hassan
March 26, 2021

As the world moves steadily to adopt digital technologies in all aspects of life, most data in the world are now created digital and never go to papers. Nowadays’, organizations rely on documents, files, databases, applications, and data to function. If a business loses access to its data, it cannot continue operating. Data is now considered the blood of organizations; ...

Fighting the Good Fight: Cybrary & MITRE Join Forces to Battle the Cybersecurity Skills Gap with the Launch of MITRE ATT&CK Defender™
By: Amanda Davi
March 25, 2021

Although there’s still progress to be made, cyber professionals fighting the growing tide of new and advanced threats just got a new weapon in their security defense arsenal. Earlier today, Cybrary and MITRE Engenuity, MITRE's tech foundation for public good, announced an industry partnership to offer MITRE ATT&CK Defender™ (MAD), a new online training and certification product. Ralph Sita Jr., ...