0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

A Good Plan is Crucial in the Fight against Cyber Crime
By: Rachel Laura M
June 13, 2015

In a physical crime scene, say a home has been burned down as a result of an arsonist or maybe a home has been burglarized, the role of first responders on the scene is very important. These skilled individuals must be able to avoid contaminating the crime scene or destroying evidence, all the while securing the crime scene and documenting ...

Cybrary is Going Global!
By: klowe
June 11, 2015

C alling all Spanish, French and German Speakers Cybrary's mission is to provide free cyber security and IT training to people across the globe. However, as an English-only website, we have been limited in our ability to reach people who do not speak English as a first language. ...

Learning from Home: How to succeed at Cybrary’s Online Learning
By: Tatianna
June 11, 2015

Updated August 10, 2018 When taking classes to prepare for exams, there are important factors to consider. With Cybrary’s courses, much of the class material is based on watching videos. While this may be great for some people, for others it is not enough to fully grasp the discussed concepts. Below are some tips on how ...

What is the CIA Triad? Confidentiality, Integrity and Availability
By: ryan c
June 9, 2015

The CIA triad is becoming the standard model for conceptualizing challenges to information security in the 21st century. CIA stands for confidentiality, integrity and availability, which are said to be the three most important elements of reliable security. Every IT worker should have a thorough understanding of the triad and its intricacies, but every staff member who works around sensitive ...

Ethical Hacking: It's not an oxymoron.
By: Rachel Laura M
June 8, 2015

When most people think of a hacker, they think of a dishonest individual who uses techniques to bypass a system’s defenses and steal confidential and sensitive information. Security breaches, data as well as identify theft are all incidents which can occur as a result of a hacker breaking into a system. However, in this modern workplace where information can ...

The Growing Field of Digital Investigation
By: Rachel Laura M
June 8, 2015

Computer related crime is very prevalent in this day of global communication, people bringing their personal electronic items to work as well as many companies having people who do not work in house but instead opt to work remotely. For this reason, the field of digital investigation is an emerging field and up to date knowledge of the latest practices ...

The Importance of the CompTIA Network+ Course for a Cyber Security Career
By: ryan c
June 3, 2015

Many of the Members that join Cybrary, join because they are looking to begin a career in cyber security. This is obviously a great idea given that the amount of unfilled jobs in cyber security, globally, is estimated to be over 1 million. The question is though, where should one begin when they have no tech, IT, or cyber security ...

The Key Notes of Cryptography
By: Rachel Laura M
June 3, 2015

Public key cryptography has been around for a long time. Whitfield Diffie and Martin Hellman invented it in 1976. It sometimes goes by the name Diffie-Hellman encryption as well as symmetric encryption as it uses to keys instead of one (this is called symmetric encryption). Cryptography uses two kinds of encryptions: A public key which is known to ...

The Emerging and Growing field of E-Discovery
By: Rachel Laura M
June 2, 2015

Electronic discovery, also known as e-discovery refers to a process of how information is obtained, located and secured to be used as evidence in a civil or criminal legal case. E-discovery can be carried out in the following ways: Offline On a particular computer As part of a network In addition to the ...

All You Needed to Know about the CompTIA CASP Certification
By: Rachel Laura M
June 2, 2015

The CompTIA Advanced Security Practitioner (CASP) certification is a credential that designates professionals IT industry with advanced-level security skills and knowledge. The CASP certification is approved by the United States Department of Defense (DoD) to meet IA technical and management certification requirements and is a credential favored by multinational corporations such as Dell and HP. It is vendor neutral and ...