0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Break PST File Passwords or Unlock PST Files
By: Rude Jonson
January 12, 2021

MS Outlook is the world's most popular email client program used to manage the Exchange emails that improve business performance. MS Outlook stores its email files in a PST file format, and this file must remain secure so no third party can access it without permission. The best technique for securing this file is to protect it with a password. ...

Why (Many) Programmers Prefer Linux Over Windows
By: mrNayaNi
January 9, 2021

Linux was developed and publicly released by Linus Torvalds in September 1991. Linux is a free and open-source operating system, unlike either Windows OS or macOS. Linux offers multiple desktop and server distros. Typically the Linux OS is employed for cloud and server software. Some popular Linux distros are Ubuntu, Debian, and RedHat Enterprise Linux. Because Linux is free and ...

SOC Analyst: Career Path Overview
By: Olivia
January 8, 2021

SOC stands for Security Operation Center. A SOC is staffed with cyber-security professionals who work as a team to protect an organization's IT assets from cyberthreats. A SOC analyst's role is not merely limited to protecting IT infrastructure. Instead, a SOC analyst's primary role is assessing the target organization's IT infrastructure for weaknesses and suggesting countermeasures to improve its defenses ...

Pentesting with the SQLi Dumper v8 Tool
By: Darcy Kempa
January 8, 2021

Individuals interested in performing penetration testing on Structured Query Language (SQL) databases should look at SQLi Dumper. This is an excellent automatic SQL injection tool that scans web applications for SQL injection vulnerabilities. It can be downloaded through the https://sqli-dumper.com/ website. Use/download with caution. The website also provides SQLi Dumper tutorials and other pertinent information. This overview ...

Best Way to Copy SQL Server Database From One Server to Another
By: justin hansen
January 7, 2021

Most of the time, users want to copy the database from one server to another without any data loss. One of the most emerging queries nowadays is to copy SQL Server databases from one Server to another Server. This is a challenging task for end-users; therefore, not easy to execute. Nevertheless, it will not be more difficult from now onwards ...

Database Differences: Microsoft SQL Server vs. Oracle Database
By: Olivia
January 7, 2021

It's no secret that today's businesses cannot function without data. Think about all the questions you ask yourself at work regularly, "What are my sales so far this month?" "How many customers purchased item X this year?". These questions are answered by data and can provide insights that differentiate a failing company and a successful business. That is why learning ...

How To Learn DevOps
By: Garrett Wilson
January 5, 2021

Upskill Battle: How to Learn DevSecOps As enterprises look to embrace new technologies, develop new software, and customize IT deployments, “upskilling” has become a priority. With skilled staff in high demand and their cost at a premium, this training approach focuses on improving current IT skillsets to help technology teams stay ahead of the curve. Applications have emerged as a particular ...

Cybrary's Free Courses | January 2021
By: Tatianna Harris
January 4, 2021

A new year means new free courses! Here's what's free in January. With recent events, such as the COVID-19 pandemic and the SolarWinds/SUNBURST cyber attack, cybersecurity remains a top priority for both enterprises and federal agencies. As organizations respond and look to hire more cybersecurity talent in 2021, we’re offering our January free courses to meet these industry’s needs. ...

Ping Using Python Script
By: klowe
December 31, 2020

Nowadays, people use scripts for automating almost every day-to-day task. It is essential to automate tasks to increase productivity and reduce the time taken to run the same job repeatedly. People use different scripting languages to automate their functions, including Bash, Python, Javascript and Go. Many simple tasks can be automated using these languages. As a security professional, the essential task ...

The Most Wanted Security Certifications
By: Garrett Wilson
December 29, 2020

Cybersecurity operations are changing. As companies deal with the dual challenges of surging remote work and the shrinking supply of traditional cybersecurity talent, they’re opting for another approach: New-collar cybersecurity professionals. Unlike their white and blue collar counterparts, new-collar staff combines knowledge training and practical technique to deliver both the hard and soft skills needed by organizations to defend digital assets. ...