0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Burp Suite Tutorial (Part 1): Introduction to The Burp Suite Proxy
By: payloadartist
March 26, 2021

Burp Suite acts as a proxy that allows pentesters to intercept HTTP requests and responses from websites. Not just web applications, the Burp Proxy is capable of proxying through requests from almost any application like Thick Clients, Android apps, or iOS apps, regardless of what device the web app is running on if it can be configured to work with ...

Disaster Recovery as a Service (DRaaS)
By: Nihad Hassan
March 26, 2021

As the world moves steadily to adopt digital technologies in all aspects of life, most data in the world are now created digital and never go to papers. Nowadays’, organizations rely on documents, files, databases, applications, and data to function. If a business loses access to its data, it cannot continue operating. Data is now considered the blood of organizations; ...

Fighting the Good Fight: Cybrary & MITRE Join Forces to Battle the Cybersecurity Skills Gap with the Launch of MITRE ATT&CK Defender™
By: Amanda Davi
March 25, 2021

Although there’s still progress to be made, cyber professionals fighting the growing tide of new and advanced threats just got a new weapon in their security defense arsenal. Earlier today, Cybrary and MITRE Engenuity, MITRE's tech foundation for public good, announced an industry partnership to offer MITRE ATT&CK Defender™ (MAD), a new online training and certification product. Ralph Sita Jr., ...

Top Five Cybersecurity Challenges In 2021
By: Nihad Hassan
March 24, 2021

IT leaders increasingly appreciate the importance of cybersecurity to their organizations, the recent cyberattacks against high-profile organizations show the vital work that should be done to overcome and mitigate such attacks as possible. The ongoing spread of COVID19 disease has forced most organizations to adopt the work from home model. The massive shift of the workforce to become remote has increased ...

ISSEP Training Course Review
By: Shimon Brathwaite
March 24, 2021

What is the ISSEP training course? The ISSEP stands for Information Systems Security Engineering Professional, a concentration for the CISSP certification, the most popular and in-demand cybersecurity certification globally. The ISSEP certification is vendor-neutral specialty certification that demonstrates an individual’s proficiency in designing, creating, and implementing security for information systems, services, and applications. This course is designed to give students the ...

Top 11 Python Interview Questions
By: Nihad Hassan
March 23, 2021

There are many high-level programming languages; however, Python language gain increased popularity among cybersecurity professionals in recent years for many reasons like: Python programming is considerably easy to learn, comparable with Java and C, and its syntax is much simpler. Python is a free and open-source programming language so that anyone can play with its code. Python is supported ...

SIEM vs SOAR: What’s The Difference?
By: Owen Dubiel
March 23, 2021

Technology and cyber threats alike are advancing more every day. In the security community, we must strive to push forward with innovation to keep up with the latest threats. One way of accomplishing this is through the utilization of a SOAR (Security Orchestration automation & response) platform. It takes the traditional SIEM solution to the next level. Gone are the ...

Splunk Enterprise Certified Administrator Course Review
By: Shimon Brathwaite
March 22, 2021

What is Splunk? It's a software tool that makes machine data on multiple machines across the network available for analysis, better known as SIEM (Security Incident Event Management). It does this by collecting data, identifying patterns, providing metrics, diagnosing problems, and performing basic analytics on all the machines that have had the Splunk agent installed on them. This information ...

How To Become A Data Analyst
By: Matt Choi
March 22, 2021

The Data Analyst career path teaches students to determine how data can answer questions and solve problems. Students will learn how to examine data from multiple sources to provide security and privacy insights in the courses included. They will also learn to design and implement workflow processes, layouts, and custom algorithms for multifaceted, enterprise-level data sets used for data mining, ...

MacOS Terminal: Create a Bootable USB from an ISO Using "dd"
By: kedlogic
March 19, 2021

WHAT IS THE "dd" COMMAND? dd is a command-line utility for Linux and Unix systems whose primary purpose is to convert and create low-level file copy. The dd command's syntax differs from various other Unix programs, as it uses syntax option=value rather than the standard syntax -option value or -option=value formats. By default, the dd command reads from stdin ...