0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

CISSP Study Guide: Computer Forensics
By: Cybrary
December 16, 2022

What is Computer Forensics? Computer forensics is the investigation of computer crimes with the objective of identifying and prosecuting the perpetrator. It involves the collection, examination and safeguarding of information from and related to computer systems that can be used to pinpoint and prosecute the perpetrator. For this information to be admissible in a court of law as evidence, standard ...

CISSP Study Guide: The Computer Crime Investigation Process
By: Cybrary
December 16, 2022

Due to the ongoing business procedures of an organization, a computer crime investigation is complicated by several factors. The investigation process could affect critical operations. As such, it’s important to have an action plan in place for handling reports of suspected computer crimes, and a designated committee should be created beforehand. This committee should formulate prior correspondence with law enforcement, ...

CISSP Study Guide: System Development Life Cycle (SDLC)
By: Cybrary
December 16, 2022

The System Development Life Cycle (SDLC) is a structure for system development. Its purpose is to manage the development process and implement security at each stage of the development process. The principal elements of the SDLC are listed in “Generally Accepted Principles and Practices for Securing Information Technology Systems” (SP 800-14, National Institute of Standards and Technology, September 1996) and ...

CISSP Study Guide: The Software Maintenance and Change Control
By: Cybrary
December 16, 2022

Information security should be a significant aspect of the software development process. This ensures secure applications are being used at the optimal level while minimizing development costs and code reworking. Software Maintenance and Change Control: Change management is a formalized process designed to control any changes made to systems and programs, and to examine the request, determine its feasibility and ...

CISSP Study Guide: Object-Oriented Programming (OOP)
By: Cybrary
December 16, 2022

Object-oriented programming (OOP) is a modular form of programming that allows pieces of software to be reusable and interchangeable between programs. The practice of recycling tested and reliable objects is more of an effective method of programming and reduces programming costs. Because it utilizes modules, a programmer can easily make changes to an existing program. Code from one class can ...

CISSP Study Guide: Application Development - Process Models
By: Cybrary
December 16, 2022

The development of quality software applications is not attainable without the development process model. A process model guides the project procedures and activities and represents the lifespan of a project. It ensures that the application meets the customer’s requirements and that its development adheres to budget and time schedule. Several process models have developed over the last twenty-plus years. Historically, ...

CISSP Study Guide: Cost Estimation Models
By: Cybrary
December 16, 2022

Cost estimation models don’t entail developmental processes but are used to estimate costs of software development projects. An early example is the Basic COCOMO Model, which estimates software development effort and cost as a function of the size of the software product in source instructions. This model uses two equations: The number of man-months (MM) required to develop the most ...

Monday Mix: The Couch is on Fire
By: Sara Faradji
December 13, 2022

Take some time out of your busy day to enjoy our featured content! This week, we’re covering critical vulnerabilities and best practices for narrowing the cybersecurity skills gap. NEW COURSE The couch is (figuratively) on fire in our new CVE Series course covering a high-impact Apache CouchDB remote code execution (RCE) flaw, CVE-2022-24706! See if you can securely exploit this vulnerability that ...

Monday Mix: Kicking Off December with New Content
By: Sara Faradji
December 8, 2022

As we start the month of December, we at Cybrary are eager to share new courses and podcast material to help you end the year on a productive note! NEW COURSES If you are looking to earn your CompTIA A+ certification, we’ve got you covered with courses on both of the newly-updated core 1 (220-1101) and core 2 (220-1102) exams. Bill Price ...

Monday Mix: Gobble Up the Latest Cyber Challenges
By: Sara Faradji
December 8, 2022

During this Thanksgiving holiday season in the United States, we want to express our gratitude for all of your support and feedback as we expand our content offerings! To share our thanks, please enjoy our new challenge, skills-based course, and podcast content to keep you, your friends, and your family occupied all week. NEW WEEKLY CHALLENGE In this week’s Thanksgiving-themed challenge, can ...