0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Is Ethical Hacking In Demand?
By: Divya Bora
August 31, 2021

CEH header What is Ethical Hacking? Ethical Hacking is an authorized attempt where the ethical or white-hat hacker tries to gain unauthorized access to computer systems, applications, or sensitive data. They imitate the various strategies or procedures that a malicious hacker might do to acquire the essential data. Usually, it is performed to identify security vulnerabilities so they can be resolved ...

(Requirements For A CISSP Certification): What Do You Need To Prepare For A CISSP Certification
By: Charles Owen-Jackson
August 31, 2021

How to prepare for a CISSP certification CISSP certifications are among the most sought-after in the cybersecurity space, but like any distinguished career path, earning one requires ample preparation Summary: Sitting a CISSP exam costs $749, and it is only possible to retake the exam four times in twelve months, with each attempt demanding a new payment. Aside from the need ...

The Basics of the Dark Web
By: Prasanna Peshkar
August 30, 2021

There's a lot of talk, notions, and sleight-of-hand about the dark web. Usually, when the dark web is mentioned, users assume that it is essentially about illegal exercises. Although there's some truth to this, the dark web has many unique and wonderful things, too. To access these amazing resources, one should understand how to access and manage the dark web ...

Is CCSP Certification Worth It?
By: Shelby Welty
August 30, 2021

Earning the Certified Cloud Security Professional (CCSP) certification is a proven way to advance your information security career. The credential proves that you have the skillset needed to design, manage, and secure important data, infrastructure, and applications in the cloud by using the policies and procedures and best practices developed by (ISC)2. The International Information System Security Certification Consortium, or (ISC)2, ...

How To Recognize A Phishing Email?
By: Shimon Brathwaite
August 25, 2021

Phishing attacks are one of the biggest attack vectors used against companies in the 21st Century. A phishing attack is a type of social engineering where an attacker sends a fraudulent message designed to trick a human victim into revealing sensitive information to the attacker or download malicious software on the victim’s infrastructure. Phishing attacks are responsible for approximately 32% ...

IPsec vs SSL vs VPN
By: Nihad Hassan
August 25, 2021

More companies have opted to use the remote-work model in recent years, especially during the COVID-19 pandemic. Organizations worldwide increasingly embraced remote work because of its flexibility and increased productivity, without forgetting it can save a lot of costs – such as costs of buying or renting facilities. To work, employees need to have access to their enterprise resources. The internet ...

(Best CISSP Training) Top Tips To Help You Pass The CISSP Exam
By: Charles Owen-Jackson
August 24, 2021

Top tips to help you pass the CISSP exam Passing a CISSP exam requires a lot of hard work, but the efforts are more than worth it at a time when cybersecurity professionals are in short supply. Preparing for and ultimately passing the certified information systems security professional (CISSP) exam is the most difficult task in that it requires careful planning ...

Best Practices For Privileged Access Management
By: Divya Bora
August 24, 2021

PRIVILEGED RISKS AND THREATS Some of the most frequently occurring top-privilege related risks and challenges are: Risk due to over-provisioning of privileges Overly restricted privilege accounts can disrupt the user workflow, resulting in frustration and impeding productivity. IT admins generally provision end-users with a great set of privileges as end-users enjoy the excess privileges. Since an employee’s role often ...

Top Programming Languages For Malware Analysis
By: Shimon Brathwaite
August 23, 2021

Malware Analysis is the process of studying malware to determine its function, origin, and potential impact. A common use case is for companies that develop anti-virus/anti-malware solutions. They need to have an in-depth understanding of several different malware samples to find indicators that they can use to detect them. Also, companies like Virustotal have built their entire business around being ...

Top Six Network Security Tools
By: Nihad Hassan
August 23, 2021

Cyberattacks are increasing rapidly in terms of number and sophistication. According to Cyber Security Ventures, the global cost of cybercrime is projected to reach $10.05 trillion by 2025 annually. A cyberattack can have severe consequences on the affected business. The most significant impact is losing business reputation and customers' trust and losing revenue and sales without forgetting the massive fines ...