0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

"Done for You" - List of Hacker Training Videos
By: ginasilvertree
May 20, 2016

Here's a concise list of offensive Hacker Training Videos on Cybrary (in alphabetical order by first letter). Enjoy!   Google Hacking Length: 3:24 Google Hacking Lab Length: 25:40 Hacking Web Servers (Whiteboard) Length: 19:36 Info Gather (part 1) – An Activity in Post Exploitation Hacking ...

CyberPop - Name the 7 Stages of an APT Attack
By: ginasilvertree
May 20, 2016

CyberPop from Cybrary aims adds to your knowledge as an Infosec pro.  Today's Question: Name the 7 Stages of an APT Attack  According to Wired.com, the 7 stages are:1. Reconnaissance2. Intrusion into the network3. Establishing a backdoor4. Obtaining user credentials5. Installing multiple utilities6. Privilege escalation7. Maintaining persistence Read more...

CISCO ASA Firewall Commands Cheat Sheet [Part 3]
By: Motasem
May 18, 2016

CCNP Security Firewall CISCO ASA Firewall Commands Cheat Sheet – Part 3 This sheet, and its previous parts, assume you have the required knowledge of CCNA, CCNA Security, CCNP and could be handy if you’re already enrolled in CCNP Security pathway. Let’s begin…    Configuring Dynamic NAT NAT inside 1 networkip  subnetmask         ...

CISCO ASA Firewall Commands Cheat Sheet [Part 2]
By: Motasem
May 16, 2016

CCNP Security Firewall CISCO ASA Firewall Commands Cheat Sheet - Part 2 The sheet, and its previous part, assume you have the required knowledge of CCNA, CCNA Security, CCNP and could be handy if you’re already enrolled in CCNP Security pathway.Let's begin...  Configuring host name and domain name to create FQDN for the ASA: Hostname ...

Sunday's Cyber Security Fact: Education and Awareness (May 15, 2016)
By: ginasilvertree
May 15, 2016

According to a recent survey, some 42% of survey respondents said security education and awareness for new employees played a role in deterring a potential [cyber] criminal. — “US cybercrime: Rising risks, reduced readiness; Key findings from the 2014 US State of Cybercrime Survey,” PwC

How to Cultivate an Info Sec Mindset
By: foxpro
May 13, 2016

Do you have an information security mindset?   Consider these scenarios: Yesterday, I received a PDF form to fill out from a mortgage company that required me to provide my social security number and send the document as an email attachment. The other day, I downloaded an ISO file over an HTTP connection and ...

Is the Android World Secure?
By: Dr3AMCoDeR
May 13, 2016

Hello dear Cybrary people! Thank you for your great support! I'm back with another interesting article today. Since most of you were asking me different security questions  lately, and most of them are related to Android, I'd like to share my view and experiences on Android as a platform.As you may know, Android is a mobile operating system (OS) currently ...

CISCO ASA Firewall Commands Cheat Sheet [Part 1]
By: Motasem
May 12, 2016

Let's begin...   Configuring trunk link and sub-interfaces between ASA and Switch On the outside physical interface of switch1:             Interface f0/10             Switchport mode trunk             No shutdown ...

Certifications, Salary Info for a Career in Penetration Testing
By: darkc0de
May 11, 2016

Certifications. Salary Info for a Career in Penetration Testing According to the InfoSec Institute , Professional penetration testers undergo an extensive training that helps them to identify high-risk vulnerabilities, allows testing of network defenders, and helps them to assess the magnitude of potential operational and business ...

Security Compliance Models: Checklists vs. Risk
By: foxpro
May 9, 2016

Introduction There are various of security compliance models that organizations can implement to do business legally and lawfully, adhere to industry standards and appeal to the consumer choice. Each security and compliance model is meant to address specific areas and domains of business. There are models that are required by law, others ...