0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

7 Types of Hackers You Should Know
By: GrayHat4Life
November 23, 2020

The term computer hacking is generally used to refer to one or more persons who break into secure computer systems for malicious purposes. However, this definition is not completely accurate. Many organizations employ hackers to test their computer network defenses' effectiveness and discover any security vulnerabilities or flaws in their IT systems and installed applications. Those people are legally authorized ...

Does Protection Help As Much As We Think In Security?
By: Wendy Nather
November 20, 2020

This blog was originally posted on cisco.com but has been reposted with permission by author. How do security programs prioritize their investment, resources, and effort? In the upcoming #SecurityOutcomes Study, Cisco used the NIST Cybersecurity Framework to understand this. Read more on this blog: I love it when data surprises me. In cybersecurity, we’re good at researching how things can go wrong, ...

Web Scraping Tools
By: Nihad Hassan
November 20, 2020

Data has become the driving force in today's information age that leads organizations' focus in all industries. Being able to collect and analyze data from the web plays a vital role in any organization's success. Today, even the smallest startup companies generate data. Any business that owns a website, has a social media presence, or accepts electronic payments from customers collects ...

Why Computing Is Important
By: Elvira Napwora
November 19, 2020

Why are computing skills necessary in the modern world? Information Technology (IT) has caused an unprecedented change in the world and revolutionized our view of life. Since the onset of IT in the third industrial revolution and up to the current fourth industrial revolution, endless opportunities have been introduced via computers. IT has become an important part of every business. ...

New Course: HealthCare Information Security and Privacy Practitioner (HCISPP)
By: Siddharth Bhardwaj
November 19, 2020

The use of electronic medical records is widespread and increasingly accepted by the public. Healthcare providers are charged with the critical responsibility of keeping their patients’ private data safe. Furthermore, with an increasing number of attacks, unique attack methods, and an ever-rising demand for profitable medical records on the dark web, security practitioners need to learn ways to shoulder this ...

Cybrary Ranked 90th Fastest-Growing Company in North America on Deloitte’s 2020 Technology Fast 500™
November 18, 2020

College Park, MD (November 18, 2020) — Cybrary, the world’s premier online cybersecurity career development platform, today announced it placed No. 90 on Deloitte’s 26th annual Technology Fast 500™, a ranking of the 500 fastest-growing technology, media, telecommunications, life sciences and energy tech companies in North America. Cybrary grew 1,284% during this period. Cybrary’s co-founder and President, Ralph Sita, credits the ...

The Most Valuable Cybersecurity Certifications
By: Garrett Wilson
November 17, 2020

Skills to Pay the Bills: The Most Valuable Cybersecurity Certifications Not all cybersecurity certifications are created equal. While some will help you get your foot in the door, others are designed for advanced infosec professionals. Their level of complexity doesn't always align with their level of compensation — meaning it's in your best interest to find the most valuable cybersecurity ...

Create Your Own Tools Using Bash Script
By: Karim Bakhsh Amiry
November 17, 2020

Have you ever thought of writing a program of your own or customizing a tool that you make use of regularly? To some, writing a program/tool is one of the scariest things they can imagine, especially with tons of code and the potential for errors. However, most people working in the IT industry may love to write a tool ...

Computer Network Types
By: Nihad Hassan
November 16, 2020

As the world continues to digitalize, computer networks' dependence as a backbone of any computing environment becomes the de facto standard. The network is the medium (whether it is wired or wireless) used to connect one or more computer systems and, often, to the internet. Computer networking brings huge benefits to its adopters. For instance, computers can share data and resources ...

How To Become A DFIR Engineer
By: Dustin Sachs
November 13, 2020

Digital forensics and incident response (DFIR) is an area of technology that has gained much attention in the last twenty years. From shows like CSI and NCIS, the field of digital forensics has been glamorized and depicted as a field that can solve mysteries and catch criminals in the span of 47 minutes. These shows' precision and technology would make ...