0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Module 3: Network Structure and Configuration Unit Overview Network TopologiesNetwork TypesNetwork OptimizationNetwork Ports and ProtocolsRouting and Switching Network Topologies Bus TopologyRing TopologyMesh TopologyStar TopologyTree Topology Multiple LANs make a WAN Bus Topology Connected in line – any break in line, the network goes down. Must be terminated on ends. Ring Topology ...
![Promoting Data Security in the Workplace [InfoGraphic]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

No matter the workplace, data security is a top concern for management professionals. Security breaches can end up threatening the livelihood of employees and entire companies alike, depending on how severe they are. There are solutions available to many common professional data security problems. However, understanding the surrounding statistics is often the first step. Take a look at the ...


#wikileaks (but wait, there's more). At this point, the leaks have become a flood. And speculation is drowning us. This week, Symantec Security researchers have confirmed that the alleged CIA hacking tools exposed by WikiLeaks have been used against at least 40 governments and private organizations across 16 countries, and seem to reflect those ...


Module 2: Storage Device Configuration Part 1 Unit Overview Storage Types and Configuration Tiering Redundant Array of Independent DIsks (RAID) File System Types Disk Types and Configurations Removable Media - 1 Interface Type Access Speed ...


Wifiphisher is a tool that I love using on a daily basis. It's simple, easy and great for beginners and professionals. WHAT YOU NEED: Laptop with onboard or additional Wifi-Adapter 2x Wifi-Adapters (recommended) Targets (optional) I had to buy myself an additional Wifi-Adapter to the ...


Last weekend in Dallas the evening calm was shattered by the wail of 156 tornado warning sirens sounding at once. Attempts to turn off individual sirens failed and after 95 minutes of the din, officials mercifully shut down the entire system in a final, desperate act of frustration. A search for a direction in which to point the finger ...


Cloud+ Module 1: Cloud + Network Storage Types and Configuration Unit Overview Network and Direct Storage Types Accesses and Protocol Storage Preparation and Accessing Network and Direct Storage Types Network Attached Storage - NAS ...


One thing I have noticed during testing is that there are a number of vulnerabilities that occur as a result of TLS version and cipher suite used. So, I have added a few new tricks in my arsenal to hunt for SSL/TLS that are being used.We will discuss both of the following, one by one - ...


Back to Basics, Information Security: Today we all are running good so far with old and new security products to give us secure environments. However, we are dying in our knowledge of basics. What do we mean by "basics of information security"? The basics are nothing but hygiene. Similar to how we keep good hygiene at our house, work ...


Just like with any job there are tools, in the IT community there are millions of tools. Finding the tool that is most affordable and most efficient is important to make the life of any IT worker's life easy. But once you find the tools that make your life easier where do they go? Usually (at least for me) ...