Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Is Microsoft Certification Worth It?
By: Shelby Welty
June 26, 2020

The average computer user knows their way around essential Microsoft functions. Having a more comprehensive knowledge of Microsoft's programs can help advance a student's career and give them skills to complete more common tasks quicker and more accurately. What Is Microsoft Certification? Microsoft Certification "validates IT professional and developer technical expertise through rigorous, industry-proven, and industry-recognized exams," according to Microsoft. Obtaining ...

Developing Strong Cybersecurity Workforce Skills
By: Josh Lambert
June 26, 2020

Shortage of Skills There is a steep trajectory of growing demand for cybersecurity skills in recent years. According to a report by New America 1 , in 2015, the global shortage of resources was forecasted to be 1.5M by 2020. However, in a recent article published by Infosecurity Magazine 2 , that number has climbed to 4M – exceeding estimates ...

Cybrary Partners With a US Military Branch To Build Custom Training Programs
By: Wesley Samuel III
June 25, 2020

Due to the COVID-19 pandemic, a US Military branch approached Cybrary in search of a partner to provide learning opportunities for its newly remote workforce to replace its in-classroom training. This US military group had a critical need for hands-on learning focused on networking, threat hunting, and cyber threat intelligence. This effort was to support the onboarding and development of their ...

Introduction to TLS 1.3
By: Vedant Jain
June 24, 2020

Introduction to TLSv-1.3 It's officially getting the Green Signal by the IETF (Internet Engineering Task Force), and it contains major improvements within the following three areas: Area of Privacy (Focused). Area of Performance. Area of Security. Let's look at each one. Unlike with TLSv-1.2, there appears to be some built-in motivation to upgrade, particularly with the Performance Booster, which in itself ...

Thycotic Extends PAM Cloud Leadership with Acquisition of Onion ID
By: Kali Linette
June 24, 2020

In June, we announced our Onion ID acquisition and added three new Access Controller solutions to our Privileged Access Management portfolio: Cloud Access Controller, Database Access Controller, and Remote Access Controller. These Access Controllers allow you to embed security controls within the four highest-risk layers of any modern organization’s infrastructure: Clouds, Data, and Devices. Clouds: We now empower CISOs to ...

How to Learn Information Technology Online
By: Karim Bakhsh Amiry
June 23, 2020

Capturing the attention of many individuals across the world, the vast field of Information Technology, or "IT" has grown into one of the most sought out majors. Whereas, not being able to put time into joining the IT learning centers is a challenge that many people face. Fortunately, we have information about a wide range of topics on the internet ...

"Simplify to Secure" Cybersecurity Report From Cisco Secure
By: Tom Condrasky
June 23, 2020

Having a difficult time balancing simplicity in security? You’re not alone. In our latest cybersecurity report, “Simplify to Secure,” we explore the consequences of stringing together point cybersecurity products and the complexity this can cause in your organization – along with the impacts on the effectiveness of the security ecosystem you’ve built. Quickly deploying a new technology without considering how it ...

Course Review: Sumo Logic Cloud-Native Machine Data Analytics Service Fundamentals
By: S.E. Williams
June 23, 2020

Overview Cybrary is currently offering an overview course of the Sumo Logic Cloud-Native Machine Data Analytics Service Fundamentals. That is a very long title with a lot of benefits to unpack! First, the course is geared towards anyone interested in using data analytics or machine learning to help manage cyber threats in a network. The Sumo Logic ...

DevSecOps: The Essential Guide For Fortifying The Software Development Life-cycle
By: Nadine Habaybeh
June 22, 2020

The rapid increase in the number and popularity of various development platforms has resulted in a substantial surge in cyber attacks. The conventional approach of initiating security testing at the later stages of software development is no longer feasible. From the very first stage and in each stage thereafter, security validations should be integrated into the development process to save ...

Navigating Conflict Resolution in Cybersecurity Leadership
By: Tatianna Harris
June 22, 2020

How great conflict resolution skills help cybersecurity leaders drive better results > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Conflict is the very essence of cybersecurity. With cyberattacks having the ...