0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

NoobSecToolkit: Enhance Linux Security and Facilitate Pentesting
By: Krintoxi
October 23, 2015

Hello,Today I'll be showing you how to enhance your Linux Security and facilitate basic penetration testing!To do this, we'll use an open tool called  NoobSecToolkit. The toolkit comes built with the following options: Toolkit Options (sqli)SQL Injector (Tests web urls for SQLI) (vulscan) Vulnerability Scanner (Scans for Vulnerabilities in a Network) (dinfo) ...

What You May Not Know About Accessing Websites
By: Rattar
October 23, 2015

Want to show off to your friends - displaying that you're a super programmer even if you may not know anything about computers? You won't find this information on Wikipedia, so read on!  Hey guys! Andy here, with another fun guide!All you need is a web browser. I suggest ...

Help Name the Cybrary Community
By: Tatianna
October 20, 2015

[one_half]We’ve toiled and wracked our brains trying to figure out what to call our members, but nothing ever seemed good enough.   Trying to explain who our global community is in just a name is trickier than it seems. Now you get the chance to voice your opinion. What do you want to be called? Let us know which of the ...

Create Great Passwords By the Book
By: Rattar
October 19, 2015

Do you have one password for all your devices? Do you have 100 passwords and sometimes forget them? Do you have trouble remembering passwords? Do you write your passwords on notecards or post-it notes? If you answered yes to any of these questions, then you should read this post. If not, read it anyway, as it may offer ...

How to Get a Cyber Security Job on Cybrary
By: klowe
October 16, 2015

Getting hired has never been an easy process. Between revamping your resume and spending hours on LinkedIn searching for 'networking opportunities', looking for a new job can be both time-consuming and frustrating. Enter Cybrary's new job platform, created in part to help alleviate some of the stress invariably involved in the job hunting process. Currently, there are over one ...

Insecure Data Storage on Android Mobile Phones
By: udhayaprakash
October 15, 2015

  Insecure Data Storage on Android Mobile Phones What Does this Mean? Today, cellular networks are becoming a vital element for exchanging the electronic data in low income countries. A problem arises: insecure data storage on mobile phones. This leads to theft of all important data from victims' phones. I’m here to give a Solution for insecure ...

Traversing the Cyber Corridor
By: TREVORH
October 15, 2015

Washington D.C., Virginia, and Maryland are being called the hub for cyber security jobs. Driven by an exorbitant federal budget and an influx of venture capital, demand for cyber security professionals is not only high, but, as basic economics tells us, due to the shortage of those qualified professionals, salaries for these positions are pushing ever higher.The venture capital that ...

We've Gone Mobile
By: Tatianna
October 13, 2015

Get even more convenient access to Cybrary through our Android mobile app so you can learn how to hack, crack and exploit nearly anything. Our developer @akhaliq92 has worked diligently over the past several months to make your mobile experience better with features that include easy video downloading, video streaming, and offline viewing. You can also visit the ...

Cyber Security from a College Student's Perspective
By: Maddie
October 13, 2015

Typically, October equals Halloween. The month of October is also national cyber security awareness month. Sure it’s all about the haunted houses, frightening decorations, and scary costumes. Do you know what else is scary? Viruses and malware. These two often occur when an abundance of internet searches occur. What group of people spend a significant amount of time on laptops, ...

[podcast] Guardrails vs. Speedbumps
By: BrBr
October 12, 2015

When we wanted to have Martin Fisher on, it was to discuss 'Security Mandate vs. Security Influence'. We wanted to discuss why companies treat compliance as more important, and if it's only because business requires it to be done. And if infosec is a red-headed stepchild because they often don't have the guidance of a compliance framework.But it ended up ...