0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Ethical Hacking Header WHAT IS ETHICAL HACKING? Hacking* is the process that involves searching for vulnerabilities in a system and using the vulnerabilities to gain unauthorized system access to perform malicious activities. Hacking is illegal and has dire consequences if someone has hacked a system illegally. Ethical hacking* is defined as an authorized attempt to gain unauthorized access to a system. ...


CompTIA Security+: Is Security+ an easy certification to obtain? Earning the CompTIA Security+ certification is not easy, but candidates can significantly increase their chances with ample preparation, including focused training. Summary: Like any other exam required to earn a professional accreditation, it is not easy to pass the CompTIA Security+ test. However, those capable of meeting the challenge will open the door ...


Cybersecurity Awareness Month– *Adhering to cybersecurity awareness standards With numerous standards and frameworks developed around security awareness and training, formulating the best strategy can be difficult.* Summary: With numerous standards, certifications, and frameworks developed to help counter today’s evolving cyber threat landscape, it can be difficult for business leaders to formulate a comprehensive training strategy. This guide explores some of the most ...


The Certified Ethical Hacker (CEH) certification from the EC-Council is a popular and highly regarded credential within the information security industry. Individuals who earn a CEH certification are dedicated, knowledgeable, ethical hackers. However, the process isn’t over after you receive the CEH credential. Every three years, you must renew your certification, and there are some requirements to do so. ...


Cybersecurity experts are increasingly sought-after nowadays, either Cybersecurity Analysts, Cybersecurity Consultants, or Cyber Security Manager. The main reason for this high demand is that cyberattacks have become so common that there is a cyberattack in the US every 39 seconds. Each attack can harm not only businesses but also millions of people. Another domain of sought-after cybersecurity experts is ethical hackers. ...


A Business Continuity Plan (BCP) is about finding ways to maintain important business operations during an emergency. This can be an earthquake, hurricane, cyberattack, or any other type of unexpected situation. In these types of situations, preparation is key. If you don't have a plan before the emergency happens, you'll likely make bad decisions because of the stress and urgency ...


As digital transformation continues to accelerate rapidly, more companies are shifting their data and work operations digitally. The rapid adoption of digital solutions has increased the number and sophistication of cyberattacks. Criminals have ridden the wave and shifted their criminal activities from the real world into cyberspace. According to Cybersecurity Ventures, the global cybercrime damage will reach $6 trillion US dollars ...


Cybersecurity Awareness Month: Building a comprehensive security training program With cybersecurity skills in short supply, investing in employees with comprehensive training and certification preparation has never been more crucial. Summary: With October being Cybersecurity Awareness Month, now is the perfect time for organizations to consider investing in their employees to improve their in-house cybersecurity capabilities. This guide looks at what it takes ...


Just like all living things need water to survive, all companies need cybersecurity to survive. As businesses and jurisdictions are more vulnerable to cyber-attacks, the news publishes information about organizations getting hacked daily. As a result, there is an increasing need for qualified people in cybersecurity to protect against this rising threat. Cybersecurity is a fast-moving, hands-on world with an ...


Take a look at IT security certifications that involve ethical hacking. You will likely notice that CompTIA’s PenTest+ and the EC-Council’s Certified Ethical Hacker (CEH) certifications are similar to each other. That can make it difficult to decide which one is the best option for you and your chosen career path. The obvious solution is to attain both, as nearly ...