0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Get to Know Your Instructors: Rob Thurston
By: SLWelty
February 27, 2019

Fun Facts About Rob What course are you teaching? NMAP What's your favorite food? Mexican and Texas Barbeque, sometimes together What is your favorite hobby? I love running and golf (oops, that’s two) Social media handles? https://www.linkedin.com/in/therobthurston/ The Q & A Tell us about yourself: As I get older, I realize that I’m ...

Linux Keyboard Shortcuts
By: Tapan Jatakia
February 26, 2019

Linux Keyboard Shortcuts Linux Keyboard Shortcuts are a must for Linux Enthusiasts and Professionals. However, students studying Linux also could apply these to speed up their work process and understanding of Linux. User wanting to learn shortcuts & key combinations need to know the Pros and Cons first. Pros: Speedup ...

A Change Will Do You (and Us) Good
By: purvikshah
February 25, 2019

By : Christine SchaeferNotice anything new?At ThreatConnect, our philosophy since our founding has been that we would incorporate intelligence in all aspects of security operations including orchestration and workflow, as functionality within our Platform. We believe (and always have) that an intelligence-led defense benefits organizations and allows better predictive and proactive strategic decision-making.That said, like most, we are a ...

Scanning Fundamentals
By: Devansh Bordia
February 25, 2019

 Scanning is a process of actively gathering information about the target with the intent of determining the various services, process, open ports, a live host, Os, version running on the system. This phase involves sending specially crafted packets to the victim in order to know insights about the system environment and configuration.D uring this process, it ...

Synchronizer token pattern
By: Ace
February 25, 2019

In this post let’s discuss about using a synchronizer token pattern to prevent CSRF (CSRF meaning Cross-site request forgery.).  Synchronizer token pattern (STP) is a technique where a token, secret and unique value for each request, is embedded by the web application in all HTML forms and verified on the server side.  ...

I'm PMP Certified. What's Next?
By: ebiettchert11
February 23, 2019

So, you are PMP certified. What’s the next step? Aside from applying to a PMP certified position, you will need to periodically renew your credentials and attend professional development units. As it turns out, there are some recurring costs and tests even after you get certified. If you are still seeking certification, it’s important to know the process ahead ...

Today’s critical threats: A Cisco Security threat report
By: purvikshah
February 21, 2019

Author : Ben NahorneyFor more than a decade, Cisco’s security reports have been a definitive source of intelligence for security professionals interested in the state of the global industry. These comprehensive reports provided detailed accounts of the threat landscape and their organizational implications.Today we are publishing our second report for 2019: Defending against today’s critical threats. This whitepaper looks ...

Getting Certified? Why PMP Training is Good for Everyone
By: Tatianna
February 21, 2019

The Cost of PMP Training Project management professional (PMP) certification is one of the most sought-after designations across industries and geographies. Why? Because companies recognize the need for project management leaders capable of handling complex tasks with multiple moving ...

The Cost of CISSP Training for Practitioners and Businesses
By: Tatianna
February 20, 2019

The Cost of CISSP Training Certifications offer value for IT professionals. The industry is running short on highly-skilled technology staff, forcing companies to reconsider their priorities and ensure they’re hiring the best fit for long-term ROI. Certifications offer concrete proof ...

Restoring or exporting?
By: Tom_Cruiso
February 20, 2019

Restoring or exporting? Which one suits you better? Well, we are talking about your emails. We believe you are backing them up to some drive. We won’t ask you how because that depends on how and where you want it; and how your company gets the task done. Here we will be discussing ...