0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Stateful vs. Stateless Firewalls
By: Nilesh Mojidra
December 7, 2020

Protecting an organization's network becomes a top priority in today's information age. As more organizations are shifting their operations to become completely digital, the cost of a data breach can have tremendous effects on any business entity. According to Statista, the number of data breaches in the United States amounted to 1,473, with over 164.68 million sensitive records exposed, ...

Advanced Google Dorking Commands
By: Aditya010
December 4, 2020

Google hacking, also known as Google Dorking, is a computer hacking technique. It uses advanced Google search operators to find security holes in the configuration and code that websites use. It is also useful for retrieving hidden information not easily accessible by the public. Google Dorking involves using advanced operators in the Google search engine to locate specific text strings within ...

Introducing the New “Cisco Security Outcomes Study”
By: Mike Hanley
December 4, 2020

This blog was originally posted on cisco.com but has been reposted with permission by author. Uncovering today’s most impactful security practices Security teams today are facing extraordinary challenges – securing and supporting the rapidly accelerated “work from anywhere” model, protecting a workforce under stressors unlike anything we’ve seen before, and battling a threat landscape that’s constantly adapting to exploit cracks in the ...

Where To Start For AWS Certifications
By: Garrett Wilson
December 1, 2020

Conquering the Cloud: Where to Start for AWS Certifications Amazon Web Services (AWS) remains the undisputed leader of public cloud offerings. AWS holds the lead in the hotly-contested cloud market that includes top-tier challengers such as Google, from robust service infrastructure to speedy service deployment and a myriad of cloud-based applications designed to streamline enterprise operations Microsoft, and IBM. But as ...

Cybrary's Free Courses | December 2020
By: Tatianna Harris
December 1, 2020

'Tis the season for free courses! Here's December's holiday lineup, free all month long. We're spreading holiday security awareness to get you and your team in the right mindset. This year especially, with online purchasing expected to surge, keep up with security best practices to protect your data and your organization. For the entire month of December, we’ve made 7 ...

How Will The New Normal Impact The Cybersecurity Industry?
By: Vivek Soni
November 30, 2020

The COVID19 pandemic, which has taken many lives and has shaped itself into the worst global event that we have faced, has changed human behavior and attitudes forcing organizations to respond. The need to respond will not end even in case the threat eventually subsides. These uncertain conditions have impacted every industry and have turned the trajectory of growth upside ...

Incident Response Lifecycle
By: Adnan Khan
November 27, 2020

Incident Response is a process of responding to cyber-attacks and threats to IT infrastructure. It establishes a framework to minimize service downtime and accelerate the recovery process. This course focuses on collaboration and efficient communication between the stakeholders. It explains the technical preparation processes to detect, respond, and recover from a cyber incident. Practicality for this course: This fascinating ...

Impact Of Artificial Intelligence On Data Privacy
By: Gabriel Schram
November 27, 2020

Online data has become an increasingly valuable asset in the current state of technological advancement. Private data is seemingly leaked at every turn with little to no regulation regarding its collection, and features of new applications and products seem more like vulnerabilities. The magnitude of available data and capability for data storage has paved the way for advancing and widening ...

What Certifications Do I Need For Cybersecurity
By: Garrett Wilson
November 25, 2020

Cybersecurity vacancies continue to outpace qualified applicants as companies look to shore up network, application, and infrastructure defense. While companies are willing to "reskill" internal staff and look beyond traditional four-year degrees to find best-fit candidates, evolving compliance and regulatory expectations mean they're also on the hook to be choosy about who they hire. What's the result? Interest and ability ...

Best Order For Azure Certifications
By: Garrett Wilson
November 25, 2020

Step-by-Step: Unpacking the Ideal Order of Azure Certifications The right Azure certifications can boost IT earning potential and allow technology professionals the freedom to carve out their unique career paths. But with a growing roster of Microsoft cloud computing designations, how do IT experts choose which to tackle first, which ones can wait, and which ones require knowledge from previous ...