0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


Since the early days of computers, computer viruses have existed. However, according to discovery, the Creeper program was the first noted computer virus; it was first created in 1971 with no malicious intent and was used to prove the possibility of creating a self-replicating program. A computer virus is a malicious program with self-replication capability. Hence, it can replicate itself from ...


This is one of the most common questions asked by beginners who are starting out in ethical hacking or switching careers due to boredom or lack of interest in their work. It is a tough question. So first things first,_ anyone can learn ethical hacking at any time_, as long as you have the willingness to learn and have excellent ...


Most of a cybersecurity analyst’s work will be done before a cyberattack, focusing on implementing security controls to prevent the company from getting hacked. However, when a cyberattack does happen, an analyst must know how to assist in the investigation properly. This area of expertise is routinely referred to as computer forensics. Simply put, computer forensics is a branch of ...


There is far more to earning a CCSP certification than reading through the official study guide. Here is what candidates need to know before they commit. Summary: *Becoming a Certified Cloud Security Professional demonstrates the advanced technical skills and knowledge required to design, secure, and manage data systems and apps in modern cloud-based environments. However, before taking the exam, candidates must ...


The Certified Information Security Manager (CISM) certification is a highly regarded credential in cybersecurity. It validates your overall knowledge of management objectives around information security. Moreover, the CISM certification adds to your credibility and confidence when interacting with employers, peers, and regulators. Attaining the CISM designation requires you to take and pass a certification exam that shows you have a ...


GRUB stands for GRand Unified Bootloader and is a default bootloader used in Linux distributions. It is responsible for packing itself at boot time from BIOS and loading the Linux kernel into the memory. It then transfers the control to the operating system kernel. Today we will share three ways to restore the GRUB bootloader after losing it ...


Being able to browse the internet privately is a valid concern in the 21st Century. Many countries, such as China, have been very open about the fact that they monitor their citizens’ internet usage, going as far as blocking access to specific websites depending on what those governments think their citizens should access. Even for countries that don’t spy on ...


Successful organizations operate with a clear vision in mind; they select a predefined direction or route to reach their final destination, achieving business objectives. Without a roadmap, organizations will focus on solving their daily work problems, not fostering growth, and creating continued values for their stakeholders. As the world moves steadily to become completely digital, organizations worldwide integrate technology into their ...


CEH header What is Ethical Hacking? Ethical Hacking is an authorized attempt where the ethical or white-hat hacker tries to gain unauthorized access to computer systems, applications, or sensitive data. They imitate the various strategies or procedures that a malicious hacker might do to acquire the essential data. Usually, it is performed to identify security vulnerabilities so they can be resolved ...


How to prepare for a CISSP certification CISSP certifications are among the most sought-after in the cybersecurity space, but like any distinguished career path, earning one requires ample preparation Summary: Sitting a CISSP exam costs $749, and it is only possible to retake the exam four times in twelve months, with each attempt demanding a new payment. Aside from the need ...