0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

What is DoD 8140?
By: Jenna Crawford
May 21, 2020

The Department of Defense Directive 8140 (DoD 8140), also known as the Information Assurance Workforce Improvement Program or Cybersecurity Workforce Improvement Program, was designed based on the National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE) framework. This directive is an update and expansion of the previous DoD Directive 8570. DoD 8140 outlines the necessary training ...

The Importance of Asset Security
By: Hiroshi Keing
May 20, 2020

What is Asset Security? Asset Security Fundamentals is a set of techniques and tools to allow organizational assets, confidentiality, integrity, and availability whenever it's used. As a security professional or IT manager, this course teaches us to develop fundamental skills, facilitating the attendees' professional growth in cybersecurity, IT, or management. The topics explored include: A) Using corporate investment protection for ...

Can I Learn IoT On My Own?
By: Michael Cunningham
May 20, 2020

Can I learn IoT alone? Learning is never alone. From the time you are born, you are learning. Those first steps you took were unaided, and your parents and grandparents helped show you what balance is. You naturally moved your feet and built up those muscles you needed to take that first step. Learning is the same in everyday life. ...

"Introduction to Excel" Course Review
By: S.E. Williams
May 19, 2020

Cybrary is offering an Introduction to Excel course by instructor Milan Cetic. This course can help information technology professionals, as every IT person will need a robust tool to conduct analysis, tracking, and reporting. In this course, you will learn the basic features of the program and how to use them to create nearly any type of tool ...

ICS & SCADA Systems: What Are They & How Do We Defend Them?
By: Jenna Crawford
May 19, 2020

The first time I heard the SCADA acronym, it was associated with the Stuxnet worm that was discovered in 2010. If you haven’t heard about Stuxnet, it was a cyber worm that struck and crippled an Iranian nuclear facility that contained centrifuges used to manufacture weapons-grade uranium 1 . The system targeted by Stuxnet was a Supervisory Control and Data ...

How To Capture A Wireless Router’s Credential Using ARP Poisoning Tutorial
By: Karim Bakhsh Amiry
May 18, 2020

Outline Get the concept of how the attack works Set up the environment Make the target clear Start the process Wait for the target to establish a connection to an insecure network The username and the password are captured automatically and displayed on the console How does the attack work? In a computer network, ARP poisoning is a technique where ...

DevSecOps: What Are We Defending?
By: Phillip Kulp, Ph.D
May 18, 2020

Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released course, DevSecOps Fundamentals. This post is the second in a series that covers core principles to assist in the automation of a secure pipeline. The series of blog posts will follow the agenda: Securing the Development Cycle [[read previous ...

Is Cloud Computing Certification Worth It?
By: Tatianna Harris
May 15, 2020

For students looking to start a career as a developer, it’s easy to feel inundated with certification options. It can also feel challenging to know which certifications will best help your career and which will give you the most useful and marketable skills. When it comes to cloud computing, students may be wondering if earning a cloud computing certification is ...

How Strong is Your Least Privilege Program?
By: Thycotic
May 15, 2020

This blog post is brought to you by Thycotic * Our new co-published report with Cybrary explores least privilege strategies and why companies need to make it a priority. Most organizations struggle with complexity and user complaints when implementing a least privilege security strategy 67% say least privilege is either a top or urgent priority for their ...

Cybrary Scholars Program Recipients Announced
By: Shelby Welty
May 14, 2020

Cybersecurity Professionals Impacted By COVID-19 Awarded Learning Resources and Mentorship to Further Career Development With the launch of the Cybrary Scholars Program last month in response to the current health crisis and resulting economic impacts, we sought to offer a glimpse of hope to those impacted by COVID-19 and who seek careers in the Information Technology (IT) and cybersecurity fields. ...