0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

GDPR, Cookie Consent, and User Privacy
By: Nihad Hassan
May 3, 2021

The General Data Protection Regulation (GDPR) is the most robust and comprehensive privacy global law and was enforced on May 25, 2018. GDPR replaces the previous data protection laws that were not comprehensive and did not cope with the advancement of Internet technologies and the increasing volume of personal data published online. GDPR applies to all EU (European Union) residents and ...

MS-500: Microsoft 365 Security Administration Course Review
By: Prasanna Peshkar
April 28, 2021

The Microsoft 365 Security Administration course from Cybrary is intended for students to develop them to take and pass the MS-500 certification exam. The course includes the four fields of the exam, giving students the expertise and abilities they need to earn their credentials. What is the MS-500 Certification? Students for this exam apply, maintain, and control security and compliance solutions ...

Tenable Jira Cloud Integration
By: Owen Dubiel
April 28, 2021

Tenable provides security teams with a ton of vulnerability data on all assets, but how much of this is actionable in its current state. Utilizing Tenable's two-way integration with Jira cloud empowers its users to create an intuitive dashboard that provides insight into their existing security stance. Also, the integration allows you to handle remediation in a streamlined, automated approach. ...

Introducing Goals: Connecting team learning to on-the-job outcomes
By: Cybrary Announcement
April 28, 2021

Cybrary’s new Goals feature makes it easy to measure and demonstrate the impact of cybersecurity training and skills development As organizations expand, business leaders are held accountable for their teams’ increased performance and overall development, but many struggle to ensure their teams are putting in the work necessary to develop their skills and add value to the business. Given the ...

Ransomware Prevention Strategies
By: Gabriel Schram
April 27, 2021

Identifying the tactics, techniques, and procedures of modern ransomware attacks is pivotal in securing cyber defense architecture. Recent years have exposed new and more successful variants for this specific type of malware. Ransomware is a type of malware that encrypts the entirety of the target system and demands a paid ransom to restore its data. Figure 1 displays an example ...

Types of Artificial Intelligence
By: Divya Bora
April 27, 2021

Artificial Intelligence (AI) is an extensive branch of computer science that involves building smart machines capable of performing tasks that require human intelligence. AI enables computers and machines to mimic the perception, learning, problem-solving, and decision-making capabilities of the human mind. It is an intelligent entity which humans create to make machines capable of thinking and acting humanely. Few programmable functions ...

Why You Should Learn Linux For Cybersecurity
By: Shimon Brathwaite
April 26, 2021

Linux is an operating system many people outside of security/IT have no experience with. For the most part, people either use windows and mac as their operating system, but this is not all that's out there. Linux, which shares several similarities with the Mac OS, is an operating system commonly used in corporate environments. If you plan to work in ...

Evimetry: Interview with Dr. Bradley Schatz Course Review
By: Hugh Shepherd
April 26, 2021

In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, conducts an interesting and informative interview with Dr. Bradley Schatz. Dr. Schatz is the Advanced Forensics File Format (AFF4) co-author and creator of the forensics workflow toolkit, Evimetry. The format of this course is a five-part interview with Dr. Schatz. During the interview, Dr. Schatz answers a ...

Best Free Security Software to Use In 2021
By: Nihad Hassan
April 26, 2021

In today's digital age, people are utilizing technology in all aspects of life. In work, study, socializing, entertainment, in addition to online banking and shopping, technology has become an integral part of our life. The rapid advancement of the internet and communication technologies means most people utilize at least one computing device. For example, according to Statista, the number ...

Introduction to Data Exfiltration
By: Nihad Hassan
April 23, 2021

Digital transformation is rushing to occupy all life aspects. In today's digital age, organizations of all types and across all industries utilize digital solutions to facilitate work operations. Nowadays, most information is created digitally and never finds its way into papers. According to Statista, total data created, captured, copied, and consumed worldwide is forecast to increase rapidly and already reached ...