0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Protecting the Active Directory - The Keys to the Kingdom
By: Navid Kagalwalla
August 7, 2020

Active Directory is a Microsoft technology developed as a directory service for Windows domain networks. It forms one of the most critical aspects of an organization's infrastructure. It is used to manage computers and other devices by logically dividing user accounts into groups and subgroups based on the level of access control required. Active Directory provides authentication, authorization, and configuration ...

White Box vs Black Box Penetration Testing
By: Harguilar Nhanga
August 6, 2020

In recent years, information is being exchanged at an unprecedented rate, and companies are always looking for a way to safeguard their digital data. They are often looking for ways to understand whether or not their systems are secure enough to withstand an attack. To find potential security holes (vulnerabilities) and determine the likelihood of potential compromise, they perform ...

Exploit Vulnerabilities Trends in 2020
By: Nievedha Karthikeyan
August 6, 2020

An exploit is a software or code sequence that takes advantage of an error or a vulnerability, typically for malicious purposes. The exploit provides a backdoor access to the network or computer through the installation of malware. An exploit, when identified, can be fixed with patches. Exploits that do not have existing patches are known as zero-day exploits. Exploits are usually ...

"Intermediate PC Security" Course Summary
By: Hiroshi Keing
August 5, 2020

What is PC security in a nutshell? PC security applies protection layers to an endpoint computer's underlying components within a corporate environment to protect and defend one of the largest attack surfaces in a company. PC security takes considerations from components that essentially do their processing. The basic input and output system (BIOS), which has threats that are ...

Ransomware Evolution and Prevention
By: Javier Olivo García Araque
August 5, 2020

Ransomware - everyone talks today about this threat. Some believe it is a new cyber-delinquency weapon, an APT development, or a simple virus that could access our computer if we visit suspicious sites on the internet or the deep web. But who says ransomware is a virus? Where did it appear the first time? Is it used only by ...

Why Learn Information Technology
By: Joshua Elijah
August 4, 2020

What is Information Technology? Information Technology (IT or InfoTech) has been around for quite a while now! However, as many people use computers in many different forms, some still don’t know the actual meaning of Information Technology and why it is important. As seen on Wikipedia, “Information technology is the use of computers to store, retrieve, transmit, and manipulate data ...

Executive Vulnerability Management - Course Review
By: Apurv Tiwari
August 4, 2020

The vulnerability management domain focuses on how organizations identify, analyze, and manage vulnerabilities in a critical service's operating environment. 1 Understanding how to identify, evaluate, and treat vulnerabilities is instrumental in the success of any organization. A successful vulnerability management program consists of 4 key elements: Vulnerability Assessment - Identifying weaknesses, risks, and exposures. Vulnerability Management tools - ...

Microsoft Windows Security Auditing Best Practices
By: Nihad Hassan
August 3, 2020

In today’s information age, IT security is a necessary issue to consider. Operating systems vendors have developed numerous built-in features to prevent, detect, and investigate security incidents that happened to their systems. Windows auditing policy is a part of this endeavor. Windows auditing is Microsoft's mechanism for tracking events on its Windows environment, knowing who triggers such events, where ...

Cybrary's Free Courses for August 2020
By: Leif Jackson
August 3, 2020

We're here to support you in your mission to learn and grow! Here are some new ways for you to learn what you need to succeed in the second half of 2020. We’ve added 7 courses (that are normally paid!) to your free membership for a limited time only! As part of our mission to provide the opportunity for personal ...

Machine Learning and Artificial Intelligence in Cybersecurity
By: Phillip Durst
July 31, 2020

Machine Learning and Artificial Intelligence Artificial Intelligence (AI) and Machine Learning (ML) are the hottest two topics in computer science today. So much so that, if you can think of a problem, someone has tried to solve that problem with AI and ML. In most cases, AI and ML are, in fact, the solution. Because of these ...