0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What to Do if You are a Victim of a Phishing Email
By: Gabriel Fernando
July 29, 2020

In this present day, you may receive phishing emails often, and some of us may even fall for such scams. Email Phishing attacks are by far the most common social attacks employed by cybercriminals and are on the rise. Phishing can also happen via text messages. The term phishing was coined because the scammers cast out a lure so that ...

Data Destruction Policy
By: Nihad Hassan
July 28, 2020

As the world continues to digitalize, the dependence on papers and photographs has become its lowest. Digital transformation has changed how we study, work, shop, communicate, travel, bank, and even how we take care of our health. Nowadays, most information is created digitally and does not go onto paper at all. Organizations of all types, both public and private, utilize computer ...

Office 365 Migration Course Review
By: Miguel Saiz
July 28, 2020

In the middle of the current pandemic, it has been proven that cloud services are a great tool to guarantee business continuity. Because Office 365 runs in the cloud, servers aren't needed for storage regarding websites, emails, or documents. Removing onsite servers will reduce both energy costs and the need for office space to store server hardware, which makes the cost ...

Big Data Analytics in Cybersecurity
By: Phillip Durst
July 27, 2020

What is Big Data? “Big Data” has become a bit of a catch-all term for really big sets of complex data. Complicated enough that traditional methods of analysis fail, and more information is presented than a human analyst could ever dream of processing. The idea of Big Data is important in modern business because businesses are inundated with ...

Azure or AWS: Which is Easier to Learn?
By: Matt Choi
July 27, 2020

Cloud adoption continues to rise as companies look for ways to empower remote workers, secure key documents anywhere, anytime, and deliver scalability on-demand. To streamline migration and make the best use of new cloud solutions, companies are looking for trained IT professionals — experts with the skills and certifications to solve challenges in-situ and seize opportunities at scale. They’re also looking ...

Managing Cybersecurity Challenges with Remote Teams
By: Tatianna Harris
July 27, 2020

How enterprise security leaders are protecting their remote distributed teams Although remote work is certainly nothing new, the onslaught of the Covid-19 pandemic caught many businesses off-guard. For them, managing remote teams with so little time to prepare has proven challenging, bordering on burdensome. In a matter of days, they had to issue company-owned laptops, deploy new virtual machines, and ...

Infrastructure Services: Course Review
By: Aditya Kanala
July 24, 2020

What are Infrastructure Services? Infrastructure services are information systems provided as a service, where the provider helps maintain them. Using them spares the cost, complexity, and risk of clients maintaining their internet platform. A few examples of Infrastructure Services are: Communication Services: These include services related to daily communication, such as emails, messaging, voice services, and other tools. Networking: This ...

How to Investigate Phishing Emails
By: Karim Bakhsh Amiry
July 24, 2020

Once upon a time, there was a guy called Ahmad. Ahmad was an employee in an organization, and one day he received an email with an attachment to fill for financial purposes from the finance manager. He just pressed the download button on file to fill it, but something unusual happened. The screen went off and then totally locked with ...

The Evimetry Filesystem Bridge: Making Your AFF4 Forensic Images Available
By: Chelsea Faye
July 23, 2020

What is AFF4? Advanced Forensic File format 4 (AFF4) is an open-source file format used for storing digital evidence. M.I Cohen, Simson Garfinkel, and Bradley Schatz first published the format design in "Extending the advanced forensic format to accommodate multiple data sources, logical evidence, arbitrary information, and forensic workflow." 1 AFF4 is gaining popularity thanks to the speed at ...

What to Learn in Information Technology
By: Kimberly Collins
July 23, 2020

Information Technology is no longer confined to the devices we use, getting on the internet, or strictly being a programmer or developer. In the diverse field of Information Technology, determining which path to take is akin to any modern form of a right of passage, deciding what best suits one's individual needs with what is currently in demand. So that ...