0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

"Everyday Digital Forensics" Course Summary
By: Divya Lakshmanan
August 13, 2020

Overview The competency to navigate through the world of digital forensics is in much demand now. With the swarm of resources available at the click of a button, how does one pick where to start? Here is a suggestion - Cybrary has released a new course titled "Everyday Digital Forensics." Courses in digital forensics start with detailing facts about file systems ...

What Do I Need to Learn Cybersecurity
By: Miguel Angel Saiz
August 13, 2020

Nowadays, computing has occupied all aspects of our lives, and businesses have increased their dependence on IT solutions. What is Cybersecurity? Cybersecurity is the practice of protecting networks, systems, and programs from attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information and interrupting normal business processes. Why is cybersecurity important? Currently, the world is hyperconnected, which is why ...

CISSP Roles and Responsibilities
By: Charles Owen-Jackson
August 13, 2020

What are the roles and responsibilities of a CISSP? Implementing security programs as a certified information system security professional Cybersecurity leadership roles are increasingly relying on people with both technical and managerial skills and experience. It’s also a highly regulated sector that demands a thorough knowledge of all the key domains of information security. In today’s enterprise environment, cybersecurity leadership roles ...

Course Spotlight: Fundamentals of Vulnerability Management
By: Vijayashree Krishnaraj
August 12, 2020

As cyber-attacks are increasing day by day, the organization's responsibility to safeguard itself increases as well. One of the important things to consider to maintain the required risk score, which indicates the extremity of a risk due to some factors and to reduce the susceptibility to cyber-attacks is Vulnerability Assessment and Management. Throughout three modules, with on-demand learning videos and ...

Strategies To Win A CTF: How To Approach A Jeopardy Style CTF
By: Nafeel Ahmed
August 12, 2020

What is a CTF? CTF stands for Capture The Flag. It is a kind of competition or game which hackers enjoy to compete and play. Hackers are either competing to win a prize in a big competition (e.g., Google CTF) or practicing to polish their skills. There are three main and most popular types of CTF categories. What are the ...

AWS Certified Engineering Career Paths
By: Charles Owen-Jackson
August 11, 2020

How to become an AWS-certified engineer Which AWS certifications can help you further your career in cloud computing? With more business operations taking place in hosted environments, cloud-computing skills are in enormous demand. Whether you’re looking to advance your career or jump into a new space, choosing the right certification can open the path to many exciting and highly profitable ...

UAV Forensics Analysis
By: Navid Kagalwalla
August 11, 2020

Digital Forensics’ Latest Challenge: UAVs Unmanned Aerial Vehicles (UAVs), also referred to as drones, are aircraft piloted by remote control or on-board computer designed for use in several environments such as security, disaster response, construction monitoring, agricultural mapping, and even recreation. According to a Gartner forecast [1], drones' production and shipment for personal and commercial use is growing rapidly with ...

What is a Side Channel Attack?
By: Adhirath Kapoor
August 7, 2020

To the eyes of the uninstructed, the term cryptography seems like an entity involving numerical calculations and common algorithms like DES, RSA, and the others. Initially, the cryptographic algorithms appear to be implemented inside a black box, but in reality, the black box plays a very important role. With most algorithms becoming more secure and almost impossible to break, malicious ...

Top Microsoft Cloud Certifications To Advance Your Cybersecurity Career
By: Charles Owen-Jackson
August 7, 2020

Whether you're a newcomer to the cloud or looking to level up your skills and advance your career, obtaining the right certifications can make all the difference. They open the door to lucrative new opportunities, with certified professionals often reaching six-figure salaries. A great way to prove your expertise is to follow one of the new role-based Azure Certification Paths ...

Protecting the Active Directory - The Keys to the Kingdom
By: Navid Kagalwalla
August 7, 2020

Active Directory is a Microsoft technology developed as a directory service for Windows domain networks. It forms one of the most critical aspects of an organization's infrastructure. It is used to manage computers and other devices by logically dividing user accounts into groups and subgroups based on the level of access control required. Active Directory provides authentication, authorization, and configuration ...