0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What Is Payment Card Industry Data Security Standard?
By: Nihad Hassan
October 12, 2021

In today's digital age, people increasingly use the internet to conduct most of their daily activities. People use the internet to work, study, socialize, entertainment, online shopping, and banking. Most services and products are now available for sale online. Paying for these services/products is mainly done using credit card payment methods. Credit card payment is very important, not just for customers ...

Jobs After CEH
By: Prasanna Peshkar
October 11, 2021

Ethical hacking is known to be one of the most promising careers in cybersecurity. A certified ethical hacker (CEH) is a professional who is responsible for finding security vulnerabilities. To evaluate the robustness of the company's cybersecurity condition, one needs to collect data, conduct scanning and enumeration, and prove how an enemy could hack into the systems. This CEH certification ...

Malware Analysis: Techniques and Tools
By: Divya Bora
October 11, 2021

header What is Malware Analysis? Malware is malicious software used to cause extensive damage to data and systems by gaining unauthorized access. Malware Analysis understands the purpose, functioning, or behavior of the suspicious file, particularly malware. The outcome of malware analysis is helpful in the detection and mitigation of any potential threats related to the malware. types of malware analysis Types of ...

How Runtime Application Self-Protection (RASP) Protects Applications From Within
By: Evan Morris
October 8, 2021

header One cybersecurity problem that has been tolerated mainly as a norm is the predisposition of developers to write vulnerable code. It has been nearly two decades since The OWASP Top 10 standard awareness document for developers and web application security was released. Still, the problem of unsafe or security issue-ridden code persists. No sensible developer intentionally writes defective code, but the ...

How to Install a Cisco (IOS) Router On GNS3 VM
By: Parvez Ahmed
October 8, 2021

GNS3 (Graphical Network Simulator-3) is a network simulator software used to simulate routers, switches, and other networking devices, and it runs on Cisco IOS. Cisco uses proprietary software called Cisco IOS for its routers and switches. GNS3 does not include any Cisco IOS in its default installation since Cisco IOS has copyright laws to protect it. It only facilitates a ...

How to Import PST to Office 365 Mailbox Account: Quick Solution
By: magstephen08
October 7, 2021

A .pst is an Outlook data file for “personal storage table” and consists of emails, calendars, tasks, and details. This file is usually generated when someone exports their Outlook email client data to their desktop. MS Office 365 services provide an excellent opportunity for businesses to drag runny innovative capabilities to meet what they want. Moving to Exchange Online can ...

How To Renew CEH Certification
By: Vijay Maripi
October 6, 2021

CEH Overview The Certified Ethical Hacker (CEH) is a reputed title for someone who has earned a certification to perform specialized services for various businesses. This certification is one of the most credible certifications offered by EC-Council. Preparing for and receiving this certification will undoubtedly take time and effort. It does not, however, end after you receive it. CEH qualified ...

Linux Hardening
By: Corey Holzer, Ph.D. CISSP
October 6, 2021

I cannot count the number of times I’ve heard the phrase, “While adversaries only need to get lucky once, we need to be right every time.” If it were not so accurate, it might become a meme or other running joke. Then again, as Al Capone, played by Robert DeNiro, said in the movie The Untouchables, “As with so many ...

Python Programming For AWS Security Automation
By: Shimon Brathwaite
October 5, 2021

Amazon Web Services (AWS) is one of the most popular cloud service providers for easy to access IT infrastructure. Especially for smaller companies trying to launch a web application, most founders would much rather pay for services like AWS to handle the infrastructure for them rather than having to buy the IT equipment necessary for launching a tech company (e.g., ...

How To Protect Windows Remote Desktop Connection
By: Nihad Hassan
October 5, 2021

The ongoing spread of the COVID-19 virus has significantly impacted the work culture around the world. Digital transformation witnessed a boost by several years in just a few months. To remain operational during the long period of lockdown, organizations opted to adopt the work-from-home model. To gain access to remote resources, employees have to use specialized software to connect with ...