0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

An Introduction To CCNA (Courses by individuals)
By: Cybrary Staff
February 9, 2022

How becoming a Cisco Certified Networking Associate can jumpstart a career in IT As one of the most prevalent entry-level IT certifications globally, there are good reasons for earning Cisco’s CCNA certification. Summary: With the global adoption of Cisco’s products and services, IT professionals who can demonstrate competence in deploying and managing various technologies are growing in demand. The Cisco Certified Networking ...

Threats On A Home Network And The Importance Of VPNs
By: Shimon Brathwaite
February 7, 2022

header If you have Wifi capabilities at home, then you have a home network. Home networks consist of devices connected to our routers, such as smartphones, laptops, gaming consoles, and smart devices. A home network provides you with many conveniences, but it can also present an opportunity for hacks. Unlike corporations that invest large sums of money in securing their networks, ...

How to ensure certifications meet job requirements
By: Cybrary Staff
February 4, 2022

There are now dozens of widely recognized certifications aligning with a myriad of job areas in cybersecurity and information technology (IT), from regulatory compliance to networking. Although none of these certifications are legally mandated, that does not mean they are not important. In fact, professional certifications have come to play a vital role in the constantly evolving threat landscape, where ...

Aligning Cyber Skills With The MITRE Framework: An Introduction
By: Cybrary Staff
February 4, 2022

How to align cyber skills with the MITRE ATT&CK Framework By encompassing the full lifecycle of cyberattacks, the MITRE ATT&CK framework helps security teams take an offensive stance in protecting their organizations. Summary: From conducting initial reconnaissance to compromising targets, the MITRE ATT&CK framework encompasses the entire lifecycle of cyberattacks. By aligning cybersecurity training with the framework, organizations can better protect themselves ...

Top Five IT Risk Management Software
By: Nihad Hassan
February 4, 2022

The continual advance in digital technologies has transformed most organizations' business processes to become digital. The introduction of IT solutions to businesses has brought many advantages, such as increased efficiency and productivity, improved customers engagement, reduced cost, open new markets, and facilities collaboration with third-parties vendors, to name only a few. Despite the great benefits of applying digital technology, its ...

Incident Response: Benefits and Why Your Company Should Have A Plan
By: Divya Bora
February 3, 2022

header WHAT IS INCIDENT RESPONSE? Incident Response is defined as the process used by an organization to control and respond to a cyberattack like data breaches and leaks. It also consists of ways to manage the damage or consequences. It aims to effectively manage the damage caused by the incident to the organization. In addition, it takes care of other essential ...

What Is The MITRE Framework, and Why Does It Matter?
By: Cybrary Staff
February 2, 2022

The MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) framework is a curated knowledge base for cybersecurity professionals. Summary: As businesses take a more offensive stance against cyberattacks, there is a growing emphasis on documenting and emulating adversarial behavior. As a curated knowledge base and model for cyber behavior, the MITRE ATT&CK framework is being widely adopted to enhance intrusion detection ...

A Guide To CTFs For A Cybersecurity Analyst
By: Shimon Brathwaite
February 1, 2022

Cybersecurity analyst is one of the most common types of cybersecurity jobs, and they fall into two categories. There are blue teams (defensive) and red teams (offensive) security analysts. The first one works primarily to defend the system by resolving security vulnerabilities, while the other discovers security vulnerabilities by attacking computer systems. Now you can learn a lot about doing ...

Everything You Need To Know About Malware Threats
By: Prasanna Peshkar
January 31, 2022

Malware is a type of computer program or software developed to cause damage to the computer. It is also called malicious software, which can harm files, swipe private data, and more. This article will discuss Malware and different types of malware threats. The rise of computer and internet technology has transformed our lives, and it has changed the course of ...

High-Profile Cyber Events Of 2021
By: Cybrary Staff
January 28, 2022

The year in review: A look back at some high-profile cyber events of 2021 Like the year before, 2021 was a record-breaking year for cyber events, with billions of records being compromised. Here are some of the most prominent incidents. Summary: By September 2021, the number of data breaches had already exceeded the total number of those from the year before, with ...