Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

"Azure Functions" Course Review
By: Makeia Jackson
July 3, 2020

Are you new to the Microsoft Azure cloud and need to know about Azure Functions? Maybe you have heard of Azure but work with AWS, GCP, or some other cloud computing service? Whichever one it may be, Cybrary has you covered. In their one-hour course, you will learn how to develop Azure Functions. Cybrary's instructor Toddy Mladenov will cover in-depth ...

Cisco SecureX: Security for the Accelerated IT Agenda
By: Dr. Gee Rittenhouse
July 2, 2020

This blog was originally authored by Dr. Gee Rittenhouse and reposted with permission. For some time, we have been talking about how the digital transformation would be an accelerant that would cause companies to rethink old models, customer experiences and the workplace. It was always thought to be a milestone in the future that businesses would take incremental steps towards. ...

Talent Retention for Top Cybersecurity Talent
By: Phillip Durst
July 2, 2020

The number of certified cybersecurity professionals is not growing to meet demands, as an estimated three and a half million cybersecurity positions will go unfilled by 2022. The lack of talent to hire is not the only threat companies face when staffing for cybersecurity. Retaining cybersecurity talent is a new challenge, and traditional retention strategies often do not work ...

Managing Team Dynamics in Cybersecurity
By: Dr. Edward Amoroso
July 1, 2020

How winning at team dynamics facilitates stronger cybersecurity leadership > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Among the most pervasive misconceptions about cybersecurity is that it’s purely the domain ...

The Path to Cyber Security
By: Tahir Ibrahim
July 1, 2020

Do you want to get into Cyber Security, but not quite sure where to start? What routes to take? What help is out there to venture on to this path? Well, read on as this blog will outline just that. It can be a confusing time to choose the right training providers, which courses to start from, and who to use, ...

"Azure Policies" Course Review
By: Makeia Jackson
July 1, 2020

Companies hosting their hardware, software, and servers are slowly but surely becoming something of the past. Businesses are increasingly relocating their mission-critical infrastructure into the cloud. With this move, they transfer some of their security, risk, and compliance responsibilities to cloud service providers like Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Salesforce, to name a few. Azure ...

IoT & Cybersecurity: Should You Really Use IoT Systems?
By: Meriem OUADAH
June 30, 2020

Could you go back years ago to a time where you could not send emails and text messages, or post online? It feels strange to imagine one's life without all these things, most importantly, without the internet that makes it possible. So, what is the Internet? The Internet is a worldwide system of connected computer networks, "a network of networks, "in ...

How to Make People Take IT Security Seriously
By: Milan Cetic
June 30, 2020

False promises It all started when high tech became cool. When it suddenly was possible to brag with one’s computer in “normal” social circles. Similar to the late seventies and early eighties, when showing a pair of Macintosh mono amplifiers, coupled with Nestorovic Labs New Yorker speaker boxes (that together cost as much as a Porsche), to one’s friends was ...

"Privileged Access Management Fundamentals" Course Review
By: Saif Raza Raja
June 29, 2020

Overview: Cybrary’s course on Privileged Access Management (PAM) Fundamentals is a solution that helps any organization to use an existing Active Directory environment to restrict privileged access. It is a Beginner level course with no prerequisites required. This course covers all phases of the PAM in detail and shows how they’re applied in real-world situations. In this course, you will ...

The Importance of Cybersecurity Certifications and CEUs
By: Phillip Durst
June 26, 2020

Businesses are confronted with new cybersecurity threats every day, while simultaneously facing a growing need and shortage of cybersecurity experts. Many businesses are building successful cybersecurity teams by training their own IT personnel, however, trained personnel aren’t enough to be competitive in today’s business market. Cybersecurity workers must also be certified as experts in their fields. What are ...