0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

DoS vs. DDoS: Which Attack Is More Dangerous And Why?
By: Evan Morris
February 17, 2021

With technological advancements growing rapidly, cyberattacks have also grown dangerously powerful. The reason being, cyberattacks are growing in both quantity and range of technology that can be weaponized. Cybersecurity has become one of the important focal points for organizations with cybercriminals trying out novel technologies to facilitate their dangerous attacks — big or small. Among the popular cyberattacks, the Distributed Denial ...

California Consumer Privacy Act (CCPA) Course Review
By: Prasanna Peshkar
February 16, 2021

Setting up an efficient compliance program can be a difficult task. It’s far from simple to know what industry leaders, CISOs, or compliance officers expect to execute to get their business set for the CCPA. This California Consumer Privacy Act (CCPA) course from Cybrary explores the privacy requirements placed by the CCPA and how students can support their companies to ...

Coming Soon: New Look, New Experience
By: Cybrary Announcement
February 16, 2021

Learn smarter, not harder, with an improved experience At Cybrary, we’re constantly striving to evolve our cybersecurity professional development platform to better meet your needs. Our mission is to put you one step closer to achieving your cybersecurity career goals. We know it’s hard to make time to develop your cybersecurity skills and can be even harder to find the tools ...

Implementing The FSSCC & NIST CSF Cybersecurity Risk And Maturity Assessment
By: S.E. Williams, MDI, MS, Cybersecurity
February 15, 2021

Background The Federal Financial Institutions Examination Council (FFIEC) is an official partnership of financial inter-agency regulatory organizations. An example of the FFIEC members includes, but is not limited to, the Federal Reserve System (FRB), the Nation Credit Union Administration (NCUA), the Federal Deposit Insurance Corporation (FDIC), and the Office of the Comptroller of the Currency (OCC). 1 ...

How To Learn Information Technology Skills
By: Hiroshi Keing
February 12, 2021

What are IT skills? The first step is understanding what skills are needed before finding which part we are going to learn. Information Technology skills are sets of abilities that allow us to carry everyday activities using computers, software, Smart devices such as smartphones & tablets, and more. Trinity College of San Sebastián’s definition of technology skills is: “To develop abilities to ...

Business Continuity Planning During The COVID-19 Pandemic
By: Nihad Hassan
February 11, 2021

The element of surprise is often part of an attacker's strategy; therefore, it is not uncommon for a disastrous attack to occur without any warning. For example, it is difficult to predict ransomware or an APT attack. Most incidents are unique, and the organizations must have the proper plans to recover quickly, minimizing downtime. Without a contingency plan, surviving from ...

Unpacking the Interview: Cybersecurity Incident Handler
By: Cami Ragano
February 11, 2021

Unpacking the Interview: Cybersecurity Incident Handler Hacking happens. As techniques evolve and malicious actors look for new ways to compromise corporate systems, it's a matter of "when" — not "if" — companies experience a serious security incident. To help mitigate the impact and reduce the risk of potential future compromise[1], many companies turn to cybersecurity incident handlers. These IT professionals are ...

How To Survive Cybersecurity Breaches/Incidents
By: Happi Yvan
February 10, 2021

In an era where technology is invading almost every area of our lives, professional to personal, the amount of data collected by companies and organizations of all sizes is alarming. Humans have become intertwined with technology; from software to hardware, holdable to wearables to insertables, technology is all but inextricable. They, however, do all have one thing ...

Penetration Testing and Ethical Hacking Course Review
By: Prasanna Peshkar
February 9, 2021

With the world turning into one small connected city because of the internet and the fact that most of the work is done using computer systems, it is crucial to guarantee security in such circumstances. All the necessary documents, data, and information are saved in a computer these days, secured with the utmost care. Following this, there are huge requirements ...

Highest Paying Cloud Certifications
By: Shelby Welty
February 9, 2021

Big Money: The Highest Paying Cloud Certifications Money matters. While many IT professionals enjoy the operational challenges and career opportunities that come with being on the front lines of enterprise technology evolution, enjoyment doesn't pay the bills. Competitive compensation is critical for technology staff to feel financially secure and fundamentally appreciated for their skills. So how do IT pros find the ...