0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

The Growing Field of Digital Investigation
By: Rachel Laura M
June 8, 2015

Computer related crime is very prevalent in this day of global communication, people bringing their personal electronic items to work as well as many companies having people who do not work in house but instead opt to work remotely. For this reason, the field of digital investigation is an emerging field and up to date knowledge of the latest practices ...

The Importance of the CompTIA Network+ Course for a Cyber Security Career
By: ryan c
June 3, 2015

Many of the Members that join Cybrary, join because they are looking to begin a career in cyber security. This is obviously a great idea given that the amount of unfilled jobs in cyber security, globally, is estimated to be over 1 million. The question is though, where should one begin when they have no tech, IT, or cyber security ...

The Key Notes of Cryptography
By: Rachel Laura M
June 3, 2015

Public key cryptography has been around for a long time. Whitfield Diffie and Martin Hellman invented it in 1976. It sometimes goes by the name Diffie-Hellman encryption as well as symmetric encryption as it uses to keys instead of one (this is called symmetric encryption). Cryptography uses two kinds of encryptions: A public key which is known to ...

The Emerging and Growing field of E-Discovery
By: Rachel Laura M
June 2, 2015

Electronic discovery, also known as e-discovery refers to a process of how information is obtained, located and secured to be used as evidence in a civil or criminal legal case. E-discovery can be carried out in the following ways: Offline On a particular computer As part of a network In addition to the ...

All You Needed to Know about the CompTIA CASP Certification
By: Rachel Laura M
June 2, 2015

The CompTIA Advanced Security Practitioner (CASP) certification is a credential that designates professionals IT industry with advanced-level security skills and knowledge. The CASP certification is approved by the United States Department of Defense (DoD) to meet IA technical and management certification requirements and is a credential favored by multinational corporations such as Dell and HP. It is vendor neutral and ...

Is Security Awareness Training a Worthy Investment?
By: ryan c
June 2, 2015

Over the past few years, the news has been full of stories detailing how large corporations put the security information of tens of thousands of their clients at risk. More times than not, these risks came as the result of low-level employees doing things to compromise the cyber security of large multi-million-dollar corporations. In an effort to combat security breaches, ...

Useful Tools for Security Professionals
By: klowe
May 28, 2015

Threat intelligence company Recorded Future has just released a daily email service that will deliver up-to-date information on the latest threat indicators for IT and cyber security professionals. The service, called the Cyber Daily, is a free newsletter that will include the top five results in each category for trending technical indicators that Recorded Future has analyzed over ...

What Enterprise End User Security Awareness Effectiveness Requires
By: klowe
May 22, 2015

The end user security awareness industry has taken off substantially in the last several years. As more and more organizations are breached and embarrassed publicly due to end user negligence or malevolence, the mass adoption of "we need to do something about this" has spread rampantly. What we previously believed to be a problem reserved for major corporations, we ...

Create a Culture of Cyber Security Learning in Your Organization
By: ryan c
May 15, 2015

Cybrary's initiative is to make cyber security learning free and open for everyone, everywhere. This basically means, we want to provide the opportunity to learn to those who either want to begin a career in the field, or for those who want to advance within their current IT or cyber security job. In order to reach this goal, we need ...

Summarizing The Five Phases of Penetration Testing
By: ryan c
May 6, 2015

In the ethical hacker class on our website, the course begins by recapping the five phases of penetration testing . Essentially, the five phases of pen testing is a module that summarizes what the rest of the ethical hacker class is going to look like. The five phases refer to each primary step in the process of ...