0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Are We Doing Our Part to Reduce Risk Properly?
By: robsmith2
July 3, 2019

The hardest part of any security professionals’ job, cyber or otherwise, tends to be dealing, in some cases, with a limit budget and management group that does not fully comprehend the value that the security professional’s role plays in the organization. Many smaller organizations with funding restrictions often view Cyber Security practices as a constraint on ...

Get to Know Your Instructor: Abdulrahman Alnaim
By: SLWelty
July 2, 2019

onethird] [/onethird Fun Facts About Abdulrahman! What course do you teach? Cybersecurity Kill Chain™ What is an interesting fact about you? I love and enjoy the marine life and stay close to it as much as I can. For ...

Securing Your Network against Passive Reconnaissance
By: kenunderhill
July 2, 2019

Passive reconnaissance is an important tool for penetration testing and the beginning point of many data breaches. The process involves gathering available public information that could be used to compromise the organization. This section explores passive reconnaissance, how it applies to compromise networks, and how an organization can protect themselves from passive reconnaissance. Passive reconnaissance is a key ...

Hitting Revenue Goals: The ROI for Your Team’s Training
By: lpark
July 1, 2019

Updated October 2019 It is important to provide training for organization members to help achieve revenue goals, with a positive return on investment (ROI) for the team’s training. The revenue goals are important for an organization because it drives profits for the team, creates revenue for its stakeholders, and allows the business to continue offering the service. By ...

Why Training is Important for Every Organization
By: lpark
June 29, 2019

Updated October 2019 Training your employees is extremely important for any type of organization. It does cost time and money - however, it can cost an organization up to three times an employee’s salary to lose them in the first year due to subpar training. Benefits of training include : Addressing opportunities ...

Creative Wardriving
By: Ki
June 28, 2019

With wardriving being around for some time, so there has been opportunities for new, innovative approaches of wardriving to develop. With the ultimate purpose of creating an accurate map of wireless networks, wardriving techniques have developed along with new technologies. This section explores the mechanics of wardriving, new developments in the technique, and ways to protect against modern ...

Top Cyber Security Threats for 2019: Shadow IT
By: lpark
June 26, 2019

Shadow IT is a cybersecurity innovation and a natural product of cloud computing services. While shadow IT networks can pose a serious security risk, they can also provide benefits in organizational efficiency. This section explores the concepts and practical applications of shadow IT networks. Into the Shadowlands No, not the 1993 movie with Anthony Hopkins… ...

Azure Blueprint Service, The new way to automate your subcription
By: vinothdarwin123
June 25, 2019

Article by Vinoth Darwin What is an Azure Blueprint: Blueprints, in the traditional sense, are used by architects and engineers to design and build new things. They are used to ensure that the final products are built to specifications and in compliance with certain standards and requirements. Same way, Azure Blueprints helps you deploy and update cloud ...

Top Cyber Security Threats for 2019: Cryptojacking
By: lpark
June 23, 2019

Cryptojacking is an attack used to illicitly generate cryptocurrency. Coin mining clients are installed covertly on target devices and run as a hidden background process. Preventing cryptojacking means securing network communications and performing regular vulnerability analysis.Cryptocurrency provides many new opportunities through legitimate and illicit means. As profitable cryptocurrency mining ventures require access to powerful hardware, cryptojacking has emerged ...

IT Certifications for Cybersecurity Professionals: Part 2
By: mketner1
June 22, 2019

TL;DR: IT certifications are absolutely necessary for many positions in the cybersecurity industry. This section further explores some of the most valuable IT certifications for cybersecurity professionals. The certifications detailed below can be found and expanded on via their official online channels. Not all IT certifications can be applied towards cybersecurity, but many network administration and ...