0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Database Differences: Microsoft SQL Server vs. Oracle Database
By: Olivia
January 7, 2021

It's no secret that today's businesses cannot function without data. Think about all the questions you ask yourself at work regularly, "What are my sales so far this month?" "How many customers purchased item X this year?". These questions are answered by data and can provide insights that differentiate a failing company and a successful business. That is why learning ...

How To Learn DevOps
By: Garrett Wilson
January 5, 2021

Upskill Battle: How to Learn DevSecOps As enterprises look to embrace new technologies, develop new software, and customize IT deployments, “upskilling” has become a priority. With skilled staff in high demand and their cost at a premium, this training approach focuses on improving current IT skillsets to help technology teams stay ahead of the curve. Applications have emerged as a particular ...

Cybrary's Free Courses | January 2021
By: Tatianna Harris
January 4, 2021

A new year means new free courses! Here's what's free in January. With recent events, such as the COVID-19 pandemic and the SolarWinds/SUNBURST cyber attack, cybersecurity remains a top priority for both enterprises and federal agencies. As organizations respond and look to hire more cybersecurity talent in 2021, we’re offering our January free courses to meet these industry’s needs. ...

Ping Using Python Script
By: klowe
December 31, 2020

Nowadays, people use scripts for automating almost every day-to-day task. It is essential to automate tasks to increase productivity and reduce the time taken to run the same job repeatedly. People use different scripting languages to automate their functions, including Bash, Python, Javascript and Go. Many simple tasks can be automated using these languages. As a security professional, the essential task ...

The Most Wanted Security Certifications
By: Garrett Wilson
December 29, 2020

Cybersecurity operations are changing. As companies deal with the dual challenges of surging remote work and the shrinking supply of traditional cybersecurity talent, they’re opting for another approach: New-collar cybersecurity professionals. Unlike their white and blue collar counterparts, new-collar staff combines knowledge training and practical technique to deliver both the hard and soft skills needed by organizations to defend digital assets. ...

Network Engineer - Unpacking the Interview
By: Garrett Wilson
December 28, 2020

Unpacking the Interview: Network Engineer Corporate networks have become increasingly complex as enterprises expand beyond office borders to include cloud-based connections, mobile devices, and always-on IoT technologies. The result is a rising demand for network engineers — today, network engineers number in the millions worldwide and commands starting salaries of more than $70,000. It makes sense: These IT pros are responsible ...

Is Network Engineering a Good Career?
By: Tatianna
December 28, 2020

Demand for employees in the information technology (IT) industry, including network engineers, is soaring, while candidates' supply runs relatively low. According to the US Bureau of Labor Statistics2 (BLS) 1 , employment in computer and IT fields is expected to grow 11 percent from 2019 to 2029, which is much faster than the average for all occupations. These occupations are ...

Thunderbird to Outlook PST Conversion to Migrate All Folders
By: changer
December 28, 2020

How Do I Convert Thunderbird Emails to Outlook? Use the Thunderbird to Outlook converter or use a manual approach for migrating emails from Thunderbird to Outlook. It will allow conversion of the Thunderbird MBOX to Outlook PST format in a few clicks. Why Export Thunderbird to Outlook 2016, 2013, 2010, and 2002? Thunderbird and Outlook are both popular email clients. Small ...

Top 15 Cyber Security Certifications for 2020
By: Suketh Evani
December 28, 2020

Many cyberattacks occur every day, and these incidents cause millions of losses and create a dire need for companies to enhance their security measures. The increased cyberattacks create a massive demand for certified cybersecurity professionals. This article will highlight the top 15 cybersecurity certifications for 2020 that can help individuals reach the expectations organizations are looking to build and develop ...

How To Recover Corrupted Data From Pen Drives
By: lauramathews
December 28, 2020

Whenever there is corrupted data on your pen drive, there is no need to worry about it. This article will teach you three ways to recover your corrupted data on USB sticks; stay tuned, and start learning! Users Query A user has stored all his important MS documents files on his pen drive. Yesterday, his boss asked him about one of ...