0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Here's a concise list of offensive Hacker Training Videos on Cybrary (in alphabetical order by first letter). Enjoy! Google Hacking Length: 3:24 Google Hacking Lab Length: 25:40 Hacking Web Servers (Whiteboard) Length: 19:36 Info Gather (part 1) – An Activity in Post Exploitation Hacking ...


CyberPop from Cybrary aims adds to your knowledge as an Infosec pro. Today's Question: Name the 7 Stages of an APT Attack According to Wired.com, the 7 stages are:1. Reconnaissance2. Intrusion into the network3. Establishing a backdoor4. Obtaining user credentials5. Installing multiple utilities6. Privilege escalation7. Maintaining persistence Read more...
![CISCO ASA Firewall Commands Cheat Sheet [Part 3]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

CCNP Security Firewall CISCO ASA Firewall Commands Cheat Sheet – Part 3 This sheet, and its previous parts, assume you have the required knowledge of CCNA, CCNA Security, CCNP and could be handy if you’re already enrolled in CCNP Security pathway. Let’s begin… Configuring Dynamic NAT NAT inside 1 networkip subnetmask ...
![CISCO ASA Firewall Commands Cheat Sheet [Part 2]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

CCNP Security Firewall CISCO ASA Firewall Commands Cheat Sheet - Part 2 The sheet, and its previous part, assume you have the required knowledge of CCNA, CCNA Security, CCNP and could be handy if you’re already enrolled in CCNP Security pathway.Let's begin... Configuring host name and domain name to create FQDN for the ASA: Hostname ...


According to a recent survey, some 42% of survey respondents said security education and awareness for new employees played a role in deterring a potential [cyber] criminal. — “US cybercrime: Rising risks, reduced readiness; Key findings from the 2014 US State of Cybercrime Survey,” PwC


Do you have an information security mindset? Consider these scenarios: Yesterday, I received a PDF form to fill out from a mortgage company that required me to provide my social security number and send the document as an email attachment. The other day, I downloaded an ISO file over an HTTP connection and ...


Hello dear Cybrary people! Thank you for your great support! I'm back with another interesting article today. Since most of you were asking me different security questions lately, and most of them are related to Android, I'd like to share my view and experiences on Android as a platform.As you may know, Android is a mobile operating system (OS) currently ...
![CISCO ASA Firewall Commands Cheat Sheet [Part 1]](https://images.ctfassets.net/kvf8rpi09wgk/3tpSXLMbs6D0bXlTw8UucK/2d648c6dd1981c3fca93f5c03ea36bc7/blog-default.jpg?w=800&fm=webp)

Let's begin... Configuring trunk link and sub-interfaces between ASA and Switch On the outside physical interface of switch1: Interface f0/10 Switchport mode trunk No shutdown ...


Certifications. Salary Info for a Career in Penetration Testing According to the InfoSec Institute , Professional penetration testers undergo an extensive training that helps them to identify high-risk vulnerabilities, allows testing of network defenders, and helps them to assess the magnitude of potential operational and business ...


Introduction There are various of security compliance models that organizations can implement to do business legally and lawfully, adhere to industry standards and appeal to the consumer choice. Each security and compliance model is meant to address specific areas and domains of business. There are models that are required by law, others ...