0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

DFIR Investigations And Witness Testimony Course Review
By: Prasanna Peshkar
March 11, 2021

Cybercrime is more common than ever, and the attacks are getting more complicated. The eyes and skills of a qualified expert witness are crucial. The possibility of becoming an expert witness in court can be a difficult one. The question and answer scenario in which one must witness can look uncomfortable. This course addresses the purpose of the expert witness, ...

Penetration Testing Methodologies
By: Nihad Hassan
March 10, 2021

The ongoing pandemic of coronavirus disease has forced most companies to adopt a work from home model. The Interpol has issued many reports about the impact of COVID-19 on cybercrime activities worldwide and noticed a significant increase in cyberattacks during the COVID-19 crisis against government organizations, big enterprises, and critical infrastructure. As a result of the general shutdown enforced worldwide, most ...

SIM Swapping Scams
By: Gabriel Schram
March 10, 2021

Mobile phones have made their way into daily life and infrastructure to the point of societal dependence. As a result, massive amounts of data and personal information are stored on users' cellular devices. To store the data that is specific to a user's phone, companies use SIM cards. SIM (Subscriber Identity Module) cards store information specific to the device ...

Top 6 Digital Transformation Strategies
By: Nihad Hassan
March 9, 2021

The topic of digital transformation (DT) has occupied news headlines for a while. However, the ongoing COVID-19 pandemic has pushed the matter to a very urgent status. DT integrates technology into all aspects of business operations, enhancing customer experience and increasing work operations efficiency. To be successful, DT adopters should change their business culture to cope with all the needs ...

Kubernetes vs. Docker Swarm: How These Container Orchestration Options Compare
By: David Bisson
March 8, 2021

Organizations are using a growing number of containers in production. In a 2020 survey, the Cloud Native Computing Foundation (CNCF) found that the percentage of organizations running at least 250 containers had jumped up 28% to more than 50% for the first time. Meanwhile, the percentage of organizations running fewer than 250 containers and 50 containers dropped by 26% and ...

How to Learn AI
By: Happi Yvan
March 5, 2021

Artificial Intelligence is one of the fastest-growing fields alongside its friend Cybersecurity. The immense data available, structured and unstructured, and the need for machines to understand, process, and use data effectively with little to no effort provided by humans accelerates the need for AI practitioners and experts. Interest and investment in AI emerged rapidly when machine learning was successfully applied ...

Course Review: Network Troubleshooting and Tools
By: Hugh Shepherd
March 5, 2021

Course: Network Troubleshooting and Tools Instructor: Jeff Brown Network Troubleshooting and Tools is a great course to learn the basics of network troubleshooting quickly and some common tools. The instructor covers troubleshooting techniques using command-line tools in a Windows environment to identify network problems in this course. Additionally, the course explains how to verify local network configurations and test ...

Cryptocurrency Scams and Security Basics
By: Gabriel Schram
March 3, 2021

Recent developments have seen cryptocurrency reaching closer to mainstream financial markets. With the rise of crypto’s legitimate reputation, an increased number of people seek to take advantage of the opportunity. Investors want to become rich, payment companies want to draw a larger clientele, and retailers want to offer more payment options. However, a lack of full understanding of how cryptocurrency ...

IT Asset Discovery Tools
By: Nihad Hassan
March 2, 2021

Digital transformations and an increasing reliance on Information Technology (IT) are prevalent across most industries. Computing devices have become an essential business tool. For instance, computers are used in an organization's operations, such as product/service creation, marketing, administration, finance, HR, communications, and data tracking and storage. Indeed, no one can imagine a world without computers! A medium-sized enterprise can have ...

Web Cookie Tracking Explained
By: Gabriel Schram
March 2, 2021

Cookies are small files containing uniquely identifiable data for web users. They are typically used to identify an individual's computer as it relates to a specified network. Cookies are established when a user connects to a network server. The unique identifiers stored in cookies help servers render more specific data to those accessing the network. Cookies are strong utilities ...