0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.



Cybersecurity has grown in popularity and notoriety dramatically in the last few years. Thanks to events like the suspected hacking of the US election, data breaches of companies like Google, Facebook, etc., and the constant threat of computer viruses, cybersecurity has exploded as an industry. The cybersecurity market is expected to grow by 35X over the next 13 years, and ...


CCNA header WHAT IS CCNA? Cisco Certified Network Associate is an entry-level information technology (IT) based networking certification issued by Cisco. It was designed to authenticate the person's knowledge of fundamental networking concepts, usually required for some IT positions. It is a perfect fit for aspiring network professionals. It is usually recommended for entry-level candidates, so the exam is not difficult ...


How offensive security penetration testing helps uncover new threats Having an expert well-versed in offensive security penetration testing can proactively reduce risk by uncovering vulnerabilities before attackers do. Summary: The most dangerous cyberthreats are those carried out by skilled attackers, such as those sponsored by rival states and organized crime. Conventional security measures cannot counter these threats, hence the need for a ...


The Certified in Risk and Information Systems Control (CRISC) credential is a vendor-neutral certification that demonstrates proficiency in information system control and risk management. ISACA developed CRISC for IT professionals who help organizations with information systems by implementing controls and mitigating business risks. Why Is CRISC Important? As more and more of our personal and work lives become digital, protecting data ...


Computer networks are the backbone of our modern digital society. Everything around us is run -or supported somehow- using a computer network. For government and business organizations, computer networks become a crucial enabler of digital transformation, in addition to providing other numerous benefits, such as: Resources Sharing: Computer networks allow sharing computer resources (programs, hardware devices such as printers and scanners) ...


print security header Printing Security is the branch of cybersecurity that comprises printing jobs that follow industry-specific standards to prevent tampering and forgery of printed information. It applies to hardware and network component setups and aims to prevent unauthorized access to information. Security printing is used to print watermarks, stock certificates, banknotes, passports, identity cards, and tamper-evident labels. Security printing software and ...


The IT industry is saturated with an alphabet soup of professional certifications. There are credentials for everything, covering security, networking, privacy, governance, penetration testing, etc. There are numerous possibilities of certificates to pursue, but only a limited number of resources (e.g., time, money, and motivation) can be utilized to earn them. For individuals just entering IT or already mid-career, there most ...


To properly understand this article, one needs to understand the different types of digital signatures. The first type of digital signature, also called an electronic signature, is what one may use to sign an online contract; it’s simply a signature signed by typing it out, writing it with a touchscreen, or uploading a photo to the contract. A common company ...


A primer for OSCP training: 5 essential skill areas to cover before starting As with any widely recognized industry certification, OSCP training takes time and effort, but choosing suitable course materials can make all the difference. Summary: The journey to becoming an Offensive Security Certified Professional (OSCP) is long and difficult, going far beyond simply passing an exam. Those who demonstrate ...


Data has become the lifeblood of organizations in today's information age. No matter the type and industry, organizations cannot operate without data. As a result, computer networks became an integral component for any organization that utilizes technology to facilitate exchanging data. They provide: Numerous benefits for adopters Ranging from increasing work efficiencies Facilitating sharing of computer resources ...