0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

End User Physical Security
By: Adnan Khan
July 16, 2020

At the height of technology advancement and automated technology, it is easy to get complacent about the security aspect. Whether it is the distraction caused by social media or it is in our human nature to be psychologically manipulated by social engineering methods, as an End User, we may end up assuming we have less of a part to play ...

"Intermediate SQL" Course Review
By: Muhammad Bilal
July 15, 2020

SQL – The language of databases SQL stands for “Structured Query Language,” often pronounced as “Sequel,” and it was developed for the sole purpose of interfacing with databases and sharing a vision of well-structured data in the era of technology. This course has been designed to improve your basic understanding of the concepts of well-structured data and the purpose of ...

World, Meet Cisco Secure
By: Gene Hall
July 15, 2020

This blog was originally posted here and reposted with permission. Not just secure, it’s “Cisco Secure” We just announced a major milestone with our new platform,Cisco SecureX.At the heart of our approach to Cisco SecureX is a simple idea: security solutions should be designed to act as a team. They should learn from each other. They should listen and respond ...

Ransomware: A Cyber Threat
By: Manik
July 15, 2020

The immense damages and losses within cyberspace have caught the attention of many all over the globe. With the pandemic upon us, the tremendous shift to working online drastically increases the possibility of more severe incidents of cyberattacks. With so many questions and doubts settling inside many minds, it is time to answer them all. The initial question always comes ...

Why Enterprise Security Leaders Should Inspire Continuous Learning
By: Dr. Edward Amoroso
July 15, 2020

Continuous learning means more effective cybersecurity in the modern enterprise As in many industry sectors, the only constant in cybersecurity changes. Obtaining technical certifications and degrees isn’t enough to call yourself an expert. That’s not to suggest they’re not important – they most certainly are – but such credentials are only the beginning. Cyber professionals need to support a culture ...

What is DevOps Training?
By: Jitendra Singh
July 14, 2020

A recent surge in understanding and adoption of DevOps culture has created a high demand for skilled DevOps practitioners. However, there is a shortage of workforce having the relevant skills of DevOps. Therefore, many organizations harness this opportunity and have prepared training courses to train freshers and experienced IT professionals in DevOps practices and tools. Please read our post on ...

Best Certifications for Transitioning from Cybersecurity Technical to Management Roles
By: Jay James
July 14, 2020

At some point in a cybersecurity professional's career, they may decide to leap into a leadership role. Many run into the issue that there is no clear path to management. Should one pursue an MBA? What skills should one develop? What leadership position best fits one's skillset? If there is no opportunity for promotion, where should one look for the ...

"Vault Fundamentals" Course Review
By: Saif Raza Raja
July 14, 2020

Cybrary's course on "Vault Fundamentals" discusses a very interesting and comprehensive solution to every organization. It is a tool for securely accessing secrets that you want to have tightly controlled access and recording a detailed audit log. These secrets include such things as API keys, passwords, or Certificates. This course covers all phases of the Vault Fundamentals in detail and ...

Can I Learn Cybersecurity On My Own?
By: Joshua Elijah
July 13, 2020

Why learn Cybersecurity? With the great increase in cyber-crimes and cyber-threats, there has been a great hike in the demand of cybersecurity experts. It is estimated that there will be around a 300% to 450% increase in cybersecurity positions in the coming years. However, most people have a perception that Cybersecurity is a difficult topic and tough to get into. The ...

Top 5 OSINT Techniques Cybersecurity Professionals Must Know
By: Nihad Hassan
July 13, 2020

Open-source intelligence (OSINT) refers to all information available publicly and legally about an individual or organization. In practice, OSINT information includes both online and offline (e.g., paper newspapers and magazines, other media types such as radio and TV broadcasts) public resources. However, with the proliferation of the internet and the widespread use of social media platforms among the public, most ...