0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Add Certifications To Linkedin
January 1, 2016

Hello guys, I started a couple of days ago my learning trip in Cybrary. :) At the moment i already completed a course and get its completition certificate. I would like to add that on my Linkedin profile, someone of you know how to do it? Hope someone can clear this point :) Thanks a lot how can i add my ...

A Good Laptop For Pentesting
January 1, 2016

Hi, I wanted to know if you could recommend me a laptop which is suitable for pentesting, coding and so in. It should be portable, so no 17", and have a good processing power, maybe a quadcore and 8+ Gigs oft RAM. I found some gaming ultrabooks online, but they either are too expensive or have high-specs GPUs. The battery ...

Is It A Good Idea To Take Both A+ Exams On The Same Day?
January 1, 2016

Does anyone know if you have to take both A+ exams on the same day? Or can you break them up and take them separately? I wanted to learn as much as possible for the first exam, then concentrate on the second. According to this reddit post you can but it is not recommended. The user Phalt explains: "My suggestion would ...

28 Sites To Legally Test Your Hacking Skills
January 1, 2016

Practise your Infosec skill on these (legal) 28 Hacking Sites People dealing with cyber security can't learn essential things on infosec if they do not practise the core activity they're defending against: hacking. Since this is illegal to perform, sites have been set up to train people in hacking without putting them in legal danger. Here are two links that ...

13 More Hacking Sites To (Legally) Practice Your InfoSec Skills
January 1, 2016

https://www.checkmarx.com/2015/11/06/13-more-hacking-sites-to-legally-practice-your-infosec-skills/ Thanks :) +1 Thanks! nice one how can hack my friends whatsapp messages? nice one! Thanks for the share! Great list thanks :) And another huge list aimed for penetration testers. Although some resources from the list hasn't been updated for some time and a bit outdated, many of them worth a look. Thanks for sharing For an electrician, who only grounds wires because it is the law, how ...

Metasploit: Advanced Penetration Testing
By: chiheb chebbi
December 31, 2015

Metasploit Advanced Penetration Testing Cyber risks: a severe and present danger that everything is under attack. Did you know: "The annual cost of cybercrime to the global economy ranges from $375 billion to as much as $575 billion"?  Are you ready to defend Hackers? First, let's define "Hackers?" Hackers are intelligent ...

Python Programming for Hackers (Part 1) - Getting Started
By: bjacharya
December 30, 2015

Hi and welcome to this new how to series of student tutorials. My name is Bijay, and I'll be teaching you a complete series of Python Programming for Hackers . Part 1 is the introduction to the course outline and the set up process. Well, first, why Python? Python ...

Cybrary is Seeking a Wordpress Web Developer, Full-Time in Maryland
By: ryan c
December 30, 2015

ATTENTION: Web Developers in the Washington DC / Baltimore, MD area!! Here is a chance to come work for us!!We are seeking a talented Wordpress developer to join our team, and work with us to continue to build our rapidly growing community and learning website. The person we hire must be able to work at our Greenbelt, MD ...

[podcast] Interview with ISC2 Board member Dave Kennedy
By: BrBr
December 28, 2015

Dave Kennedy does a lot for the infosec community. As owner/operator of 2 companies (Binary Defense Systems and Trusted Security), he also is an organizer of#DerbyCon as well as creator and active contributor to the Social Engineering ToolKit (#SET).  You can also find him discussing the latest hacking attempts and breaches on Fox News and other mainstream media outlets.But this ...

The Complete CCENT Cheat Sheet (For CCNA Part 1)
By: CrazyHorse019
December 24, 2015

  Let's begin...   Routers - Communicate over layer 3 (IP)- Drop broadcast messages- Connects LAN’s to WAN’s  Switches - Communicate over Layer 2 (MAC)- Distributes broadcast messages- creates multiple collision domains  Hubs - Dumb devices with NO logic- data is sent to all connected device  Bridge - Local solution connecting two local networks together.  Notes: A switch ...