0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Trump's Innovative Cyber Policy: "You have less than 90 days"
By: Thomas Callahan
June 2, 2017

TRUMP’S CYBERSECURITY EXECUTIVE ORDER If there is one person who approves of Trump’s recently signed executive order, its former president Obama.Why, you ask? A side by side comparison of Obama's and Trump's policy and it’s clear. Trump simply mandated compliance of Obama’s 2013 executive order within 90 days. While his tactic of “do what the other ...

Making Sense of Certifications: MCSA vs. MCSE
By: Olivia
June 1, 2017

In a recent post, I looked at the difference between the CSA+ and CEH certifications, and considering that security certifications are perhaps the most popular on the site, it seemed like the best place to start. The more I thought about it, the more I realized how many Cybrarians are also interested in entry-level IT skills, which will benefit ...

RAM Memory Forensic Analysis
By: Eliézer Pereira
June 1, 2017

RAM Memory Forensic Analysis 1 Goal The purpose of this article is to show how to perform a Ram memory forensic analysis, presenting some examples of information that can be retrieved and analyzed to help identify indications of security incidents as well as fraud and other illegal practices through information systems. 2 Good Practices and Techniques ...

Risk Management: The Uncertainty in Information
By: themindandbeauty
June 1, 2017

  We often use the word “uncertainty” to refer to a doubtful thought because there is a lack of information about what will or will not happen in the future so, we often use uncertainty and risk together. For example, when someone says “I am uncertain what grade I am going to get in the ...

How HR Fits in Cyber Security
By: themindandbeauty
May 31, 2017

Just because most of us work in the cyber security industry and have to abide by other security rules doesn't mean we are immune from HR violations. We must conform to our company's or organization's HR rules or we could risk being terminated. Human Resources does not just deal with sexual harassment, it deals with much more ...

WikiLeaks - The Good, The Bad & The Ugly!
By: mysticman2k
May 31, 2017

Wikileaks – The Good, the Bad & the Ugly! So just to start off – I’ll let you know that I’m a full supporter of the work and the activists that produce the public information provided by WikiLeaks. I have a lot of respect for the likes of Julian Assange and Edward ...

Which Security Certification is Right for You: CSA+ vs. CEH
By: Olivia
May 30, 2017

Many are drawn to the Cybrary site by a desire to learn security skills and extend their IT background into the cyber security industry, as jobs in this field are in high demand and can offer an exciting and rewarding career.The confusion arises when IT professionals are unsure of where to start in order to reach their end goal ...

What Holds the Hacker's Heart? NetCat
By: Mr. Sirja
May 30, 2017

Hello, Cybrarians!Do you know what NetCat is?  We can say NetCat is the heart of the Hacker, Pentesters and Security ninjas. Well, it first surfaced in 1995 and it is one of the most popular and very lightweight Network Security Tools.Netcat lets computers transfer data with each other via TCP & UDP protocols.We'll learn some basic uses ...

Cyber Reality Crime Alert: Newly Identified Virus (NIV) Prevention
By: gangsters
May 29, 2017

According to reliable sources and research, and relevant case studies, it is ensured that there is a new virus that has appeared in cyberspace. It's a newly identified virus (NIV). It enters into a device through an internet connection with any type of contents and data. But normally, NIV doesn't harm the devices or systems ...

Lesson 1- Let's Learn Python!
By: jumb01
May 28, 2017

This series is going to teach you the concepts, and functions of the Python programming language, it will help you build an understanding of the language. Gradually we will base the series on security related issues, with the focus of ethical hacking and penetration testing. :~$ whoami Aslam Admani That's me!Well, why Python you ask? ...