0P3N Blog

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Infrastructure Services: Course Review

By: Aditya Kanala
July 24, 2020
What are Infrastructure Services? Infrastructure services are information systems provided as a service, where the provider helps maintain them. Using them spares the cost, complexity, and risk of clients maintaining their internet platform. A few examples of Infrastructure Services are: Communication Services: These include services related to daily communication, such as emails, messaging, voice services, and other tools. Networking: This ...

How to Investigate Phishing Emails

By: Karim Bakhsh Amiry
July 24, 2020
Once upon a time, there was a guy called Ahmad. Ahmad was an employee in an organization, and one day he received an email with an attachment to fill for financial purposes from the finance manager. He just pressed the download button on file to fill it, but something unusual happened. The screen went off and then totally locked with ...
What is AFF4? Advanced Forensic File format 4 (AFF4) is an open-source file format used for storing digital evidence. M.I Cohen, Simson Garfinkel, and Bradley Schatz first published the format design in "Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information, and forensic workflow." 1 AFF4 is gaining popularity thanks to the speed at ...

What to Learn in Information Technology

By: Kimberly Collins
July 23, 2020
Information Technology is no longer confined to the devices we use, getting on the internet, or strictly being a programmer or developer. In the diverse field of Information Technology, determining which path to take is akin to any modern form of a right of passage, deciding what best suits one's individual needs with what is currently in demand. So that ...
Do you know, hacker attacks occurs every 39 seconds? Yes, you read that right. And according to a recent web development statistic, nearly 64% of companies have experienced web-based attacks to date. Cyber-attacks are now an international concern, as high-profile breaches have given rise to many serious concerns. Without any doubt, programming is an integral part of cybersecurity, especially as ...
OSINT, Open-Source Intelligence Technique, is an approach used to collect public information using publicly available data, for this reason, the term “open-source.” OSINT has become a “buzzword,” but the technique has been used for centuries. Collecting information to have an advantage or make decisions is essentially the basis of any human relation. In this article, we have a small ...

"Intermediate Data Security" Course Review

By: Siddharth Bhardwaj
July 21, 2020
If you are new to information security, data security policies adopted by corporate firms can be confusing. You may have already heard a lot about PCI-DSS, HIPAA, etc. but still get your concepts mixed up. Whichever of these is your problem, and Cybrary is always here to help. In this "Intermediate Data Security" course, you will be able to learn ...

Where To Learn Cybersecurity Online?

By: Karim Bakhsh Amiry
July 21, 2020
Many things are getting, or about to get, technological around us. When the matter of technology pops out, one of the most important things that are worth considering is Cybersecurity. Cybersecurity is a vast field, which does not only have fans among IT workers, but most non-IT workers are interested in it as well. There are two significant ways in which ...

DevSecOps: Pipeline Development

By: Philip Kulp
July 20, 2020
Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released course, DevSecOps Fundamentals. This post is the fourth in a series covering core principles to assist in the automation of a secure pipeline. Securing the Development Cycle What Are We Defending? ...

"Intermediate Printing Security" Course Summary

By: Adhirath Kapoor
July 17, 2020
Cybersecurity Engineers all over the world are trying hard to secure critical IT Infrastructures. From computers to networks, Cyber Rangers are on a quest to harden their security. Despite all the attempts, the malicious actors of technology can trespass and are wreaking havoc in cyberspace. Why? Because some of the devices inside the networks are still not secure and are ...