0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Network Firewall: Most Frequently Asked Interview Questions
By: klowe
December 15, 2020

A network firewall is still considered the main security component in any network defense plan. A firewall is used to isolate internal networks from outside networks (e.g., the internet) and prevent malicious actors from accessing trusted networks. Firewalls are also used to protect individual endpoint devices from malicious software and misuse. They prevent endpoints from communicating with malware operators or ...

How to Dox
By: Jafar Hasan
December 9, 2020

This article is the second of a two-part series on Doxing. The first article can be found here. Doxing is essentially gathering sensitive information about a target that they generally wouldn't want or expect disclosed. These details include everything from their name, email address, ZIP code, and even home and work addresses. This article demonstrates some techniques to gather intelligence about ...

How To Learn IoT From Scratch
By: Michael Cunningham
December 9, 2020

Well, first, do your research. When researching, Google is your friend. Read articles about IoT and watch YouTube videos about it. Read more blogs about IoT. Do you have friends that work in the IT or telecommunication field? Don’t be afraid to ask them questions. For a focused approach, go to YouTube. Watch videos of the subjects required in IoT. ...

What Letters at End of Intel CPU Model Numbers Stand For
By: Rohin Jain
December 8, 2020

Like the curious type, some people may wonder what those random letters are at the end of Intel CPU model numbers and wonder why they are there? Intel is one of the leading CPU manufacturing companies. It is also the guiltiest for throwing seemingly random letters at the end of a product name, so it might be difficult to understand ...

Amazon Web Service (AWS) With Python
By: Phillip Durst
December 7, 2020

What is AWS? Amazon Web Service, or AWS, is Amazon’s cloud computing platform, and it is currently the most widely used cloud environment in the world. It includes a vast set of tools and functionalities and is used across industries, academia, and even government applications. AWS is the rising star of cloud computing, and it is very tempting for new ...

Stateful vs. Stateless Firewalls
By: Nilesh Mojidra
December 7, 2020

Protecting an organization's network becomes a top priority in today's information age. As more organizations are shifting their operations to become completely digital, the cost of a data breach can have tremendous effects on any business entity. According to Statista, the number of data breaches in the United States amounted to 1,473, with over 164.68 million sensitive records exposed, ...

Advanced Google Dorking Commands
By: Aditya010
December 4, 2020

Google hacking, also known as Google Dorking, is a computer hacking technique. It uses advanced Google search operators to find security holes in the configuration and code that websites use. It is also useful for retrieving hidden information not easily accessible by the public. Google Dorking involves using advanced operators in the Google search engine to locate specific text strings within ...

Introducing the New “Cisco Security Outcomes Study”
By: Mike Hanley
December 4, 2020

This blog was originally posted on cisco.com but has been reposted with permission by author. Uncovering today’s most impactful security practices Security teams today are facing extraordinary challenges – securing and supporting the rapidly accelerated “work from anywhere” model, protecting a workforce under stressors unlike anything we’ve seen before, and battling a threat landscape that’s constantly adapting to exploit cracks in the ...

Where To Start For AWS Certifications
By: Garrett Wilson
December 1, 2020

Conquering the Cloud: Where to Start for AWS Certifications Amazon Web Services (AWS) remains the undisputed leader of public cloud offerings. AWS holds the lead in the hotly-contested cloud market that includes top-tier challengers such as Google, from robust service infrastructure to speedy service deployment and a myriad of cloud-based applications designed to streamline enterprise operations Microsoft, and IBM. But as ...

Cybrary's Free Courses | December 2020
By: Tatianna Harris
December 1, 2020

'Tis the season for free courses! Here's December's holiday lineup, free all month long. We're spreading holiday security awareness to get you and your team in the right mindset. This year especially, with online purchasing expected to surge, keep up with security best practices to protect your data and your organization. For the entire month of December, we’ve made 7 ...