0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

All You Needed to Know about the CompTIA CASP Certification
By: Rachel Laura M
The CompTIA Advanced Security Practitioner (CASP) certification is a credential that designates professionals IT industry with advanced-level security skills and knowledge. The CASP certification is approved by the United States Department of Defense (DoD) to meet IA technical and management certification requirements and is a credential favored by multinational corporations such as Dell and HP. It is vendor neutral and ...June 2, 2015

Is Security Awareness Training a Worthy Investment?
By: ryan c
Over the past few years, the news has been full of stories detailing how large corporations put the security information of tens of thousands of their clients at risk. More times than not, these risks came as the result of low-level employees doing things to compromise the cyber security of large multi-million-dollar corporations. In an effort to combat security breaches, ...June 2, 2015

Useful Tools for Security Professionals
By: klowe
Threat intelligence company Recorded Future has just released a daily email service that will deliver up-to-date information on the latest threat indicators for IT and cyber security professionals. The service, called the Cyber Daily, is a free newsletter that will include the top five results in each category for trending technical indicators that Recorded Future has analyzed over ...May 28, 2015

What Enterprise End User Security Awareness Effectiveness Requires
By: klowe
The end user security awareness industry has taken off substantially in the last several years. As more and more organizations are breached and embarrassed publicly due to end user negligence or malevolence, the mass adoption of "we need to do something about this" has spread rampantly. What we previously believed to be a problem reserved for major corporations, we ...May 22, 2015

Create a Culture of Cyber Security Learning in Your Organization
By: ryan c
Cybrary's initiative is to make cyber security learning free and open for everyone, everywhere. This basically means, we want to provide the opportunity to learn to those who either want to begin a career in the field, or for those who want to advance within their current IT or cyber security job. In order to reach this goal, we need ...May 15, 2015

Summarizing The Five Phases of Penetration Testing
By: ryan c
In the ethical hacker class on our website, the course begins by recapping the five phases of penetration testing . Essentially, the five phases of pen testing is a module that summarizes what the rest of the ethical hacker class is going to look like. The five phases refer to each primary step in the process of ...May 6, 2015

Add some swagger to your Profile
By: CybrarySupport
Show off Your Achievements Use Cybrary often? Completed several courses? Show off what you've worked so hard for! Now that you have earned the cred make sure to share your achievement! Our L337 Emblem is available below along with a code snippet to help you better display it on your site or signature. ...April 24, 2015

Coding and Cyber Security, Hand-in-Hand, Yet Different
By: ryan c
We often get asked by our Members, if we plan on offering coding classes. The short answer is no, and typically, what we do, is refer people to sites like Codecademy and Code Fellows . Those companies specialize in coding / programming training, and have capabilities to do that type of training much better than we do. Our focus ...April 21, 2015

Password Cracking: How to Do It
By: klowe
In order to get into a secured system, you'll have to first break in---and a lot of times, the first step in doing so requires cracking a password. Contrary to popular belief, password cracking doesn't actually require a lot of heavy-lifting. Instead of spending hours at a computer screen trying your hand at thousands of random combinations, the ...April 20, 2015

The Starting Point of all Major Public Hacks: Footprinting
By: ryan c
Want to Know How and Where All Major Data Breaches Begin? With all of the publicity major corporate data breaches receive, we often get caught up in the outcomes. What happened, how many people were impacted and in what ways, who was responsible, etc. In the 2014 Sony Pictures hack, personal data about employees and corporate ...April 20, 2015
Ready to start learning?
Cybrary Picks