0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

CompTIA Security+ Certification, Evolution and Innovation for Sustained Relevancy
By: ryan c
June 23, 2015

Many companies, throughout the years, have failed because they failed to innovate and change. Many great market leaders, like Kodak, even held in their hands the future of their industry, and still refused to embrace it. Change is always difficult for someone of something in a position where status quo is providing awesome returns. It takes courage to innovate, and ...

2 Key Elements of Your Info Sec Job Search
By: DocGreenBanner
June 22, 2015

This is a primer for new job seekers and a refresher for seasoned job seekers.  People often ask, " How do I find and get Info Sec jobs? "This document will: identify online and offline job sources provide key elements of a good resume ...

The Role of Information Security Governance and Risk Management in the CISSP certification
By: Rachel Laura M
June 22, 2015

The Certified Information Systems Security Professional (CISSP) certification is a strong credential to have for professionals who have a mix of both technical and managerial experience as well as competence in designing, engineering and the overall management of security programs. Their knowledge helps protect company’s important and confidential information from the growing threat of cyber attacks. This certification is perfect ...

Launch a Web Application Bruteforce Using Burp Suite
By: fr4nc1stein
June 22, 2015

Hello to all Cybrary Members.This is my process on how to launch a bruteforce attack on any web application. Today, web applications are using a defense mechanism we called Authentication and using Login Pages. I'm going to teach you how this bruteforce attack by using a simple proxy tools.  Requirements: 1. Burp Suite ( click here to download )2. Worldlist ...

Tutorial: Evading Anti-Virus Software While Hacking
By: Akash Raghav M
June 22, 2015

Hello,When it comes to " hacking " into our target's system, where most of us all fail is evading their Anti-Virus (AV) .In this tutorial, I'll be teaching you various ways to actually by-pass the AV, so you can easily have a meterpreter session running into your target's system without the Anti-Virus flagging your software.AV software companies generally ...

CISSP Book Cross Reference Chapter Correspondence
By: DocGreenBanner
June 21, 2015

CISSP Book Domain Chapter Mapping Cross Reference.

A Comprehensive Look at Cyberterrorism, Hactivism and Cyber Espionage
By: Alan Raff
June 21, 2015

The Idea of Terrorism What images come to mind when someone says "terrorism"? Many people may think of bombs, hostages, and/or other conventional weapons. What people don’t consider might easily be the biggest and most harmful weapon of all: technology.Today, everything revolves around computers. Computers and computer systems were designed to work, but not necessarily with ...

Encryption Software and Combating Cyber Crime
By: smoke
June 19, 2015

Encryption Software and Combating Cyber Crime Abstract Encryption software has been a controversial topic in the legal world since its inception. There are differing views on the legalities of this type of software, each with their own valid viewpoints. There have been many cases decided on this matter in various courts but no ...

An Introduction to Linux File and Directory
By: HakTuts
June 19, 2015

Introduction LINUX is a Unix-like and mostly POSIX-compliant computer operating system assembled under the model of free and open-source software development and distribution. The defining component of Linux is the Linux kernel, an operating system kernel first released on 5 October 1991 by Linus Torvalds.The Free Software Foundation uses the name GNU/Linux to describe the operating system. Linux ...

Introduction to Cryptography
By: HakTuts
June 17, 2015

What is cryptography? Cryptography derives its name from the Greek word “Kryptos,” which means “Hidden Secrets.” Cryptography is the practice and study of hiding information. It's the Art or Science of converting a plain intelligible data into unintelligible data and again re-transforming that message into its original form. It provides: Confidentiality, Integrity, Accuracy. Encryption The process ...