0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Forensics
By: Divya Bora
July 20, 2021

WHAT IS CYBER FORENSICS? Cyber Forensics is defined as the process of gathering and documenting proof from a computing device in a form by utilizing investigation and analysis techniques that will be admissible in court. Cyber Forensics is also known as Digital Forensics or Computer Forensics. The term digital forensics was originally used as a synonym for computer forensics but ...

General Cybersecurity Interview Questions
By: Nihad Hassan
July 20, 2021

Cybersecurity is one of the fastest-growing job domains. As the digital transformation moves at a rapid pace, cybercriminals shift their activities to cyberspace. According to Cybersecurity Ventures, the global cost of cybercrime is projected to reach 6 trillion in 2021. The number is expected to reach $10.5 trillion in 2025. The massive increase in cybercrime costs will create a ...

Everything You Need To Know About Microsoft Azure Administrator Exam
By: Prasanna Peshkar
July 19, 2021

There is no debate that the future is in cloud computing. People are adopting more and more cloud services (even if they fail to recognize it), and companies are pushing to digitally modify their services, employing the potential of cloud computing to become more productive, effective, and competitive. Microsoft Azure certification courses are hot topics for both current and prospective IT ...

Slackbot for Rapid Response
By: Owen Dubiel
July 19, 2021

Slack is one of the leading communication platforms in both personal and professional use. Known for its inclusive collaboration style chats, Slack is infused with emojis, gifs, and the ability even to have group calls on the fly; Slack has made itself a staple in the new era of remote work. Many may not know the full capabilities that Slack ...

The Beginner's Guide To Zero Trust
By: Elviraluke Napwora
July 16, 2021

A BRIEF HISTORY; THE JOURNEY TO ZERO TRUST SECURITY In the recent past, security models were envisioned as "inside means trusted" and "outside means untrusted." However, in today's multifaceted and dynamic environment, and with networks consisting of mobile technologies, remote access/VPN use, cloud environment, etc., the perimeter-based approach becomes an inherent drawback in managing security because it grants excessive ...

Encryption For Data At Rest
By: Staford Titus S
July 16, 2021

Prelude A star-scanted, gloomy night sky, an eerie haze over the stone-paved streets, and tall tales of witchcraft and black magic just about summed up Mortem Town's actuality. A secluded, quaint old manor, atop the Phantom Hill overlooking the cove's ghastly-gleaming waters unsettled only by the treacherous rocks below, was the town's prime attraction! Coming to think of it, it ...

Poweshell Scripts: Useful Features
By: Divya Bora
July 15, 2021

Windows Powershell is an object-oriented automation engine and scripting language designed mainly for IT professionals and system administrators to control and automate Windows administration and other applications. It also provides new concepts to enhance the knowledge and scripts within the Windows command prompt. It is a perfect combination of flexible scripting, command-line speed, and a powerful GUI-based admin tool. ...

Introduction to SOAR
By: Nihad Hassan
July 15, 2021

As the world rushes towards complete digitalization, cyberattacks are increasing at an equal speed. According to Cyber Security Ventures, the global cost of cybercrime is projected to reach $10.5 trillion annually by 2025. Cyberattacks are accelerating in both number and sophistication, and cybercriminals are always in a pursuit to apply new attack techniques to infiltrate the most protected networks. Organizations of ...

Gsuite Logging Details
By: Owen Dubiel
July 14, 2021

Gsuite is widely used as both a professional and personal online computing source. Google is considered one of the biggest three competitors in the race for cloud domination. Google Cloud offers a wide range of tools, resources, and applications to help make day-to-day work life as stress-free and productive as possible. From a security standpoint, you must have proper visibility ...

The Importance Of Powershell For Ethical Hacking
By: Shimon Brathwaite
July 14, 2021

Powershell scripting is a scripting tool for automating almost any task in the windows operating system. Powershell is a more advanced version of the command prompt (CMD). It can be used to look at the processes running on Windows systems, start and stop processes, interact with files, and much more. Using PowerShell, you can do everything that CMD can do ...