0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



“Machine Learning is focused on computers learning and acting like a human, and improve learning with time autonomously by feeding data and information in the form of observations and real-world interactions.” Machine Learning (ML) is considered an application of Artificial Intelligence (AI) that enables systems to automatically learn and improve without being explicitly programmed. An algorithm is a sequence of statistical ...


The digital transformation is moving steadily to occupy all aspects of life. People become dependent on technology to work, study, socialize, entertainment, online banking, or for shopping, to name only a few. This rapid acceleration of technology has shifted the world into what is now known as the information age. Nowadays, organizations of all types and across all industries ...


The General Data Protection Regulation (GDPR) is the most robust and comprehensive privacy global law and was enforced on May 25, 2018. GDPR replaces the previous data protection laws that were not comprehensive and did not cope with the advancement of Internet technologies and the increasing volume of personal data published online. GDPR applies to all EU (European Union) residents and ...


The Microsoft 365 Security Administration course from Cybrary is intended for students to develop them to take and pass the MS-500 certification exam. The course includes the four fields of the exam, giving students the expertise and abilities they need to earn their credentials. What is the MS-500 Certification? Students for this exam apply, maintain, and control security and compliance solutions ...


Tenable provides security teams with a ton of vulnerability data on all assets, but how much of this is actionable in its current state. Utilizing Tenable's two-way integration with Jira cloud empowers its users to create an intuitive dashboard that provides insight into their existing security stance. Also, the integration allows you to handle remediation in a streamlined, automated approach. ...


Cybrary’s new Goals feature makes it easy to measure and demonstrate the impact of cybersecurity training and skills development As organizations expand, business leaders are held accountable for their teams’ increased performance and overall development, but many struggle to ensure their teams are putting in the work necessary to develop their skills and add value to the business. Given the ...


Identifying the tactics, techniques, and procedures of modern ransomware attacks is pivotal in securing cyber defense architecture. Recent years have exposed new and more successful variants for this specific type of malware. Ransomware is a type of malware that encrypts the entirety of the target system and demands a paid ransom to restore its data. Figure 1 displays an example ...


Artificial Intelligence (AI) is an extensive branch of computer science that involves building smart machines capable of performing tasks that require human intelligence. AI enables computers and machines to mimic the perception, learning, problem-solving, and decision-making capabilities of the human mind. It is an intelligent entity which humans create to make machines capable of thinking and acting humanely. Few programmable functions ...


Linux is an operating system many people outside of security/IT have no experience with. For the most part, people either use windows and mac as their operating system, but this is not all that's out there. Linux, which shares several similarities with the Mac OS, is an operating system commonly used in corporate environments. If you plan to work in ...


In this course, Cybrary instructor Brian Dykstra, CEO of Atlantic Data Forensics, conducts an interesting and informative interview with Dr. Bradley Schatz. Dr. Schatz is the Advanced Forensics File Format (AFF4) co-author and creator of the forensics workflow toolkit, Evimetry. The format of this course is a five-part interview with Dr. Schatz. During the interview, Dr. Schatz answers a ...