0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Pass: Security+ Practice Test
By: Olivia
June 10, 2017

Across the site, there is plenty of discussion happening around what study tools users utilized in order to help them prepare for and pass an exam. Typically, Cybrarians use a variety of resources to ensure they’ve covered all material and experienced a variety of question types. We’d like to offer another resource to add to ...

Making Cyber Security a Priority for Nonprofits with SIEM
By: Olivia
June 10, 2017

Of course, cyber security is important for all organizations, but sometimes, best practices are easier to implement for some companies than others, especially nonprofits. Operating with typically a smaller budget and a smaller staff, the costs and manpower needed to implement a strong data protection program can put a strain on a nonprofit, leaving the company open to vulnerabilities.Still, ...

Quick Tutorial: NetApp and SMB2
By: JBingham
June 10, 2017

Due to the recent malware issues that have plagued the Internet, our organization made the decision to upgrade the current version of the protocol Server Message Block (SMB) to version 2.  This caused an authentication issue between the users and the filers in which the data is stored. Before I explain the fix, let’s discuss what ...

UNM4SK3D: NSA, Bitcoin, and Supreme Court
By: Olivia
June 9, 2017

#classified NSA Contractor, Reality Winner (yes, that is her real name) was arrested on June 3rd for leaking classified information to an online news outlet, The Intercept. This document alleged that the Russian General Main Staff Intelligence Directorate (GRU), had attempted to break into a company that sells voting registration equipment prior ...

WiFi Security: WEP, WPA, and WPA2
By: jaspreet17
June 8, 2017

Nowadays everyone uses the internet - most commonly through WIFI  (wireless fidelity). Wifi is a short-range wireless transmission technology that can send signals up to hundreds of feet away to support access to the Internet. But what about the security of our data which is easily breached by any attacker through these airwaves. In this article, I mainly concentrate ...

How to Pass: CompTIA A+ Practice Test
By: Olivia
June 8, 2017

Did you know that the CompTIA A+ course has been taken on Cybrary over 150,000 times? If you’re not familiar with the content of the A+ course or why it may be so popular, I suggest you start by reading ‘A Complete Guide to Earning Your A+ Certification.’ For those already invested in learning the fundamentals covered ...

Lesson 2 - Learning Python!
By: jumb01
June 8, 2017

:~$ whoami Aslam Admani This is lesson 2 in my Python series. If you'd like to start from the beginning, access the previous lesson here .In this lesson, we will cover the following: Data type Print statement Doc-string and commenting Variables # A ...

A Complete Guide to Earning Your A+ Certification
By: Olivia
June 7, 2017

Lately, I’ve been working to help Cybrarians make sense of certifications, more specifically, which credentials are right for different career goals and the path to earning those certifications. Seeing as many Cybrary users are simply looking to get their start, it’s only logical that I provide an overview for earning perhaps the most popular IT certification, the CompTIA A+ ...

Egyptian Construction Management
By: themindandbeauty
June 7, 2017

Egyptian Construction Construction industry enjoys a remarkable activity that enriches the Egyptian economy. Construction industry represents 7% of the Egyptian GDP and it is expected that the investment will increase and reach US$21bn by 2017 (UKTI, 2013). There are 31 public construction companies and 36000 private ones contributing to the construction industry ...

Android Security Basics - Reinforcing Security Measures
By: Christopher Bainbridge
June 6, 2017

As I write this, I am aware that there are a few different approaches to Android security. This article aims to provide the following: Just ensuring you have a basic understanding of security You know how to be private and safe Know how to lock down and secure ...