0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Why Learn Information Technology
By: Joshua Elijah
August 4, 2020

What is Information Technology? Information Technology (IT or InfoTech) has been around for quite a while now! However, as many people use computers in many different forms, some still don’t know the actual meaning of Information Technology and why it is important. As seen on Wikipedia, “Information technology is the use of computers to store, retrieve, transmit, and manipulate data ...

Executive Vulnerability Management - Course Review
By: Apurv Tiwari
August 4, 2020

The vulnerability management domain focuses on how organizations identify, analyze, and manage vulnerabilities in a critical service's operating environment. 1 Understanding how to identify, evaluate, and treat vulnerabilities is instrumental in the success of any organization. A successful vulnerability management program consists of 4 key elements: Vulnerability Assessment - Identifying weaknesses, risks, and exposures. Vulnerability Management tools - ...

Microsoft Windows Security Auditing Best Practices
By: Nihad Hassan
August 3, 2020

In today’s information age, IT security is a necessary issue to consider. Operating systems vendors have developed numerous built-in features to prevent, detect, and investigate security incidents that happened to their systems. Windows auditing policy is a part of this endeavor. Windows auditing is Microsoft's mechanism for tracking events on its Windows environment, knowing who triggers such events, where ...

Cybrary's Free Courses for August 2020
By: Leif Jackson
August 3, 2020

We're here to support you in your mission to learn and grow! Here are some new ways for you to learn what you need to succeed in the second half of 2020. We’ve added 7 courses (that are normally paid!) to your free membership for a limited time only! As part of our mission to provide the opportunity for personal ...

Machine Learning and Artificial Intelligence in Cybersecurity
By: Phillip Durst
July 31, 2020

Machine Learning and Artificial Intelligence Artificial Intelligence (AI) and Machine Learning (ML) are the hottest two topics in computer science today. So much so that, if you can think of a problem, someone has tried to solve that problem with AI and ML. In most cases, AI and ML are, in fact, the solution. Because of these ...

A Beginner's Guide to the Bash Terminal
By: Ayokunle Oladapo
July 31, 2020

What is Bash? Bash (Bourne Again Shell) is the command language interpreter or shell for the GNU/Linux operating system. It was named after Stephen Bourne, who was the author of the Bourne shell (sh). The Bash shell can be found on most GNU/Linux systems and, recently, on most Unix systems. What is a Shell? A shell is simply a program that ...

How To Learn Network Operational Management
By: Casey Gager
July 30, 2020

Cybersecurity is a diverse and growing field. There are many paths a professional may take to becoming a cybersecurity expert. Also, there are distinct practice areas within the world of cybersecurity. One person may be an expert in technical aspects of cybersecurity, while another person's specialty may focus on compliance. Regardless of the cybersecurity professional's role, understanding how information technology ...

Top Cyber Threats in 2020
By: Divya Bora
July 30, 2020

What is a cyber-threat? You have probably heard the term cyber threat, as it is being used nowadays due to increased reliance on technology, but what does it actually mean? Cyber-threat refers to a malicious act that seeks to damage data, steal data, or disrupt digital life in general; such as computer viruses, data breaches, Denial of Service (DoS) attacks, or ...

Implementing Data Protection by Design
By: Dr. Edward Amoroso
July 30, 2020

Optimizing prevention, detection, and response in the cybersecurity challenges of tomorrow Data protection used to be relatively easy. Traditional firewalls would keep most of the external threats from getting into the company network, while antivirus software installed on endpoints would usually take care of those which did make it through. Additional layers of security, such as intrusion detection and prevention ...

How Can We Use AI In Cybersecurity To Detect Threats And Exploits
By: Manik
July 29, 2020

For years, we have dreamed of the moment that we see unbelievably advanced technology, like flying cars, time machines, and many others, just like in the movies. Slowly, but surely, we take a step closer to that future. Many have dreams and hopes, and out of them, one stands above all. That reigning aspect would be none other than "Artificial ...