0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Course Review: Certification in Risk and Information Systems Control (CRISC)
By: Andreea Alexandra Bancu
June 12, 2020

What is CRISC? Why take a CRISC course during preparation for the final exam? The Certification in Risk and Information Systems Control (CRISC) is for IT and business professionals who develop and maintain information system controls, and whose job revolves around security operations and compliance. It is developed by a team of risk management industry-leading professionals. The CRISC certification is ...

Email Forensics: What to Look For, and How to Avoid Email Phishing
By: Jose Alfredo Llerena
June 12, 2020

One of the most widely used techniques for performing a scam is phishing. This is usually done by tricking a user into providing personal information or clicking a link to a webpage, which is fraudulent. Two very common examples: 1) The one where the user supposedly won the lottery, or someone wants to donate money, so the sender asks for personal ...

What Should I Learn To Get Into Cybersecurity
By: Suketh Evani
June 11, 2020

Cybersecurity is a field that has grown a lot in the last decade. This does not come as a surprise, due to the increase in the frequency of cyber-attacks and the need to address these attacks, which cause millions in losses. In the contemporary world, where information is everything, we humans depend a lot on electronic devices to maintain data ...

Google Hacking Tips and Tricks
By: Kartik Agrawal
June 11, 2020

The Google search engine is the most powerful search engine. Google has many options within its search engine. Suppose one wants to find all of the admin portals, of all of the websites present in the Google database, or one would like to see all of the public webcams; one can do this using Google Dorks. Many cool things can ...

18 Things You Can Do to Remove MySQL Bottlenecks Caused by High Traffic
By: Peter Zaitsev
June 11, 2020

This blog was originally posted on Percona Blog by author Peter Zaitsev. Reposted with permission. This is a three-part blog series. Part two is located here, and part three can be found here. There was no reason to plan for it, but the load on your system increased 100%, 300%, 500%, and your MySQL database has to support it. This is a ...

DevSecOps Pipeline: Planning and Awareness
By: Philip Kulp
June 10, 2020

Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released course, DevSecOps Fundamentals. This post is the third in a series covering core principles to assist in the automation of a secure pipeline. Securing the Development Cycle [read previous post] What Are We Defending? [[read previous ...

Getting Started With Check Point
By: Sheane Jayne
June 10, 2020

Technical learners or professionals look forward to new hardware products to explore and test. Excitement usually kicks in when unboxing the new Check Point Gateway. Following a user guide and eager to get started, all initial setups are done. The device is up and running – what next? A great place to start is the Check Point Jump Start course. ...

Which Cisco Certification is in Demand?
By: Garrett Wilson
June 9, 2020

In the last several years, technology has advanced at speeds that are hard to keep up with. That may be the reason that there is a global shortage in qualified IT professionals. Worldwide, there are more IT job openings than there are professionals to fill them, and organizations are trying to find employees to fill their most in-demand positions. Many organizations ...

Using the NICE Framework for Early Career Planning
By: Jay James
June 9, 2020

Getting Started "The secret of getting ahead is getting started" – Mark Twain. The problem, for many starting in the cybersecurity field, is knowing where to start. Thousands of blog posts, articles, websites, and videos of the vast realm of cybersecurity careers can quickly become overwhelming. There are three high-level steps to help quiet the noise and create a starting point: __Step ...

CIS Top 20 Security Controls Course Review
By: Hugh Shepherd
June 8, 2020

Cybrary’s course on the CIS Top 20 Critical Security Controls is an exceptional training experience. This course provides an overview of the CIS Top 20 Critical Security Controls v7.1. These controls can be used in conjunction with other frameworks, such as NIST’s Cybersecurity Framework and Risk Management Framework, to help provide defense-in-depth best practices. Developed by the Center for Internet ...