0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Summarizing The Five Phases of Penetration Testing
By: ryan c
May 6, 2015

In the ethical hacker class on our website, the course begins by recapping the five phases of penetration testing . Essentially, the five phases of pen testing is a module that summarizes what the rest of the ethical hacker class is going to look like. The five phases refer to each primary step in the process of ...

Add some swagger to your Profile
By: CybrarySupport
April 24, 2015

Show off Your Achievements Use Cybrary often? Completed several courses? Show off what you've worked so hard for! Now that you have earned the cred make sure to share your achievement! Our L337 Emblem is available below along with a code snippet to help you better display it on your site or signature. ...

Coding and Cyber Security, Hand-in-Hand, Yet Different
By: ryan c
April 21, 2015

We often get asked by our Members, if we plan on offering coding classes. The short answer is no, and typically, what we do, is refer people to sites like Codecademy and Code Fellows . Those companies specialize in coding / programming training, and have capabilities to do that type of training much better than we do. Our focus ...

Password Cracking: How to Do It
By: klowe
April 20, 2015

  In order to get into a secured system, you'll have to first break in---and a lot of times, the first step in doing so requires cracking a password. Contrary to popular belief, password cracking doesn't actually require a lot of heavy-lifting. Instead of spending hours at a computer screen trying your hand at thousands of random combinations, the ...

The Starting Point of all Major Public Hacks: Footprinting
By: ryan c
April 20, 2015

Want to Know How and Where All Major Data Breaches Begin? With all of the publicity major corporate data breaches receive, we often get caught up in the outcomes. What happened, how many people were impacted and in what ways, who was responsible, etc. In the 2014 Sony Pictures hack, personal data about employees and corporate ...

Start Learning Mobile Penetration Testing and the Smartphone Pentest Framework
By: ryan c
April 16, 2015

The Smartphone Pentest Framework (SPF) in Kali Linux is an increasingly useful tool, initially developed by Georgia Weidman. The 5 part tutorial for how to use the SPF is part of the Advanced Penetration Testing class, which of course is free, just like all of our classes. For Cybrary Members who have a solid foundation in penetration testing, ...

Classes That Help You Build a Cyber Security Career
By: ryan c
March 12, 2015

This post will begin by assuming you have a baseline skill set in information technology. Generally, in order to begin your career in Cyber Security, you would need some fundamental skills. Often, in the IT training industry, baseline skills include topics covered in the CompTIA A+ class and the Network+ class . If you don’t have that ...

Please Help Cybrary's Kickstarter Campaign
By: ryan c
March 6, 2015

The first month and a half here at Cybrary have been really fun. So far, we are hearing from our Members that they appreciate what we are doing. I have spoken on this blog before about why we believe so firmly, that the opportunity to learn should be free and open to anyone, anywhere, for free, forever.We have found that ...

Example Page do not edit
By: SLWelty
February 13, 2015

What do Security Engineers do? Working in the information security realm comes with a lot of advantages. With nearly everything having a digital component these days, the career opportunities in this industry are plentiful. As we continue to rely on the internet, networks, and systems to help manage everything from our online shopping to confidential information, it makes ...

Red Team Vs Blue Team Review
By: Admin Anthony
February 10, 2015

What is Red Team & Blue Team? At its core, there are two main players in any cybersecurity or penetration testing event. While the terminologies for the two sides vary (Hackers vs. Defenders, ‘Bad Guys’ vs ‘Good Guys’, etc.) one of the most commonly used titles is Red Team and Blue Team. To put it simply the “Red Team” ...