0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How to Import PST to Office 365 Mailbox Account: Quick Solution
By: magstephen08
October 7, 2021

A .pst is an Outlook data file for “personal storage table” and consists of emails, calendars, tasks, and details. This file is usually generated when someone exports their Outlook email client data to their desktop. MS Office 365 services provide an excellent opportunity for businesses to drag runny innovative capabilities to meet what they want. Moving to Exchange Online can ...

How To Renew CEH Certification
By: Vijay Maripi
October 6, 2021

CEH Overview The Certified Ethical Hacker (CEH) is a reputed title for someone who has earned a certification to perform specialized services for various businesses. This certification is one of the most credible certifications offered by EC-Council. Preparing for and receiving this certification will undoubtedly take time and effort. It does not, however, end after you receive it. CEH qualified ...

Linux Hardening
By: Corey Holzer, Ph.D. CISSP
October 6, 2021

I cannot count the number of times I’ve heard the phrase, “While adversaries only need to get lucky once, we need to be right every time.” If it were not so accurate, it might become a meme or other running joke. Then again, as Al Capone, played by Robert DeNiro, said in the movie The Untouchables, “As with so many ...

Python Programming For AWS Security Automation
By: Shimon Brathwaite
October 5, 2021

Amazon Web Services (AWS) is one of the most popular cloud service providers for easy to access IT infrastructure. Especially for smaller companies trying to launch a web application, most founders would much rather pay for services like AWS to handle the infrastructure for them rather than having to buy the IT equipment necessary for launching a tech company (e.g., ...

How To Protect Windows Remote Desktop Connection
By: Nihad Hassan
October 5, 2021

The ongoing spread of the COVID-19 virus has significantly impacted the work culture around the world. Digital transformation witnessed a boost by several years in just a few months. To remain operational during the long period of lockdown, organizations opted to adopt the work-from-home model. To gain access to remote resources, employees have to use specialized software to connect with ...

What Is DevSecOps, and Why Is It Important To Your Business?
By: Cybrary Staff
October 4, 2021

The rapid adoption of digital technologies has changed business rules, necessitating a security-first application development and deployment approach. Digital transformation is now well underway across virtually all industries. Still, major challenges remain when it comes to upholding the demands of security, privacy, and compliance during a period of rapid change. While the need for performance and efficiency is as strong as ...

CEH Prerequisites
By: Elviraluke Napwora
October 4, 2021

Certified Ethical Hacker (CEH) is a globally recognized professional security certification for Ethical Hackers administered by EC-Council. The CEH certificate holder has proven that they are proficient in identifying weaknesses in computer networks and systems and addressing those vulnerabilities. This could entail utilizing hacking tools and techniques to pre-empt actual attacks and how to defend and protect against them to ...

What Is Operational Technology, and Why Is It Important In Today’s Computing Environments
By: Cybrary Staff
October 1, 2021

What is operational technology, and why is it important? In today’s dynamic IT environments, operational technology plays a central role in monitoring, securing, and controlling business-critical processes. In today’s hyperconnected world, it has become impossible for information technology to exist in a bubble. Defined perimeters and connections between systems are protected and monitored to uphold the highest possible integrity, security, ...

Top Four eCommerce Security Threats For 2021
By: Nihad Hassan
October 1, 2021

The Digital revolution impacts everything around us; nowadays, people use the Internet heavily in their daily lives. For instance, they use it to study, work, socialize, conduct online banking, and shop from the online marketplace. The ongoing spread of COVID-19 has changed customer buying behaviors dramatically; people have become more willing to shop from home, especially after the extended lockdown ...

Is The CEH Worth It?
By: Hugh Shepherd
September 30, 2021

Spending the time and money to earn certification is a commitment. Asking yourself, "Is this worth it?" is an understandable question and makes perfect sense. Certification exams can be expensive and require time to study, so you want to make sure investments of time and money will pay "dividends" in a career boost. Before pursuing a certification, candidates need to ...