0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Penetration Testing and Ethical Hacking Course Review
By: Prasanna Peshkar
February 9, 2021

With the world turning into one small connected city because of the internet and the fact that most of the work is done using computer systems, it is crucial to guarantee security in such circumstances. All the necessary documents, data, and information are saved in a computer these days, secured with the utmost care. Following this, there are huge requirements ...

Highest Paying Cloud Certifications
By: Shelby Welty
February 9, 2021

Big Money: The Highest Paying Cloud Certifications Money matters. While many IT professionals enjoy the operational challenges and career opportunities that come with being on the front lines of enterprise technology evolution, enjoyment doesn't pay the bills. Competitive compensation is critical for technology staff to feel financially secure and fundamentally appreciated for their skills. So how do IT pros find the ...

How To Protect The SOC From Social Engineering Attacks
By: Nihad Hassan
February 8, 2021

The number of cyberattacks has increased rapidly, in both quantity and sophistication, during the last few years. The coronavirus pandemic has led to a significant shift in the workforce working from home, which resulted in a massive increase in cyberattacks. No one is immune to cyberattacks; organizations of all types and sizes continue to fall victim to cyberattacks despite all ...

Unpacking the Interview: CISO
By: Shelby Welty
February 4, 2021

The Chief Information Security Officer (CISO) role is ever-changing. As noted by Tech Republic, 62% percent of companies now employ CISOs. Security Boulevard reports that these infosec professionals are now being tapped for both the hard skills of their security expertise and the soft skills required to effectively create and communicate business-driven cybersecurity strategies across front-line staff members C-suites ...

SQLI: The good, the bad, the basics
By: Raymond Evans
February 3, 2021

In my last blog post, I discussed the basics of Cross-Site Scripting (XSS). For this post, we will be discussing the basics of SQL Injections (SQLI). This post will cover what SQL is, what SQLI is, identify it, and exploit it. First, let's discuss what SQL is. SQL stands for Structured Query Language and is used to store, manipulate, and ...

How Long Does It Take To Learn IoT
By: Michael Cunningham
February 3, 2021

In this world of cyberlearning, brick and mortar schools and hybrids schools. It is tough to nail it down. It goes back to what I have stated many times before. Brick & Mortar schools will take much longer when compared to online. To watch all the IoT training videos on YouTube will take six weeks to two months. At least ...

Information Security Fundamentals
By: Anya Mudryakova
February 1, 2021

Unpacking the Interview: Information Security Fundamentals Companies are dealing with a massive uptick in cyberattack vectors — the second quarter of 2020 alone saw massive spikes in Powershell and mobile malware attacks, while familiar threats such as phishing continue to plague corporations' email accounts. The result is an infosec landscape that requires the skill and insight of trained and certified information ...

Free Cybrary Courses - February 2021
By: Shelby Welty
February 1, 2021

February Free Courses Launch Today! Each month, since July 2020, we have offered a carefully currated set of courses completely free. As "New Year, New You" fades into the background we aim to help you maintain the mindset of continuous learning and meet the cybersecurity industry’s need for skilled professionals. Make 2021 your year for career growth with our most ...

Security Considerations For Code Signing
By: Divya Bora
January 29, 2021

Code signing is defined as a process of digitally signing executables and scripts to confirm the software author and guarantee that the code has not been altered or corrupted since it was signed. Code signing certificate software helps digitally sign data that is available online and plays a crucial role in preventing third party access while downloading software online. TYPES OF ...

Cybersecurity in Connected Autonomous Vehicles
By: Hugh Shepherd
January 28, 2021

Autonomous vehicles (AV) are becoming mainstream in our society. Globally there's an ongoing development and testing of autonomous vehicles in several countries, setting the stage for widespread adoption of self-driving cars. It is projected that, by 2025, there will be 8 million autonomous or semi-autonomous vehicles on the road, and by 2030, more than 18 million. The estimated autonomous vehicle ...