0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Configuring a LAN with DHCP and VLANs – PART I
By: farazde
March 2, 2019

While working on things which require time and more practice, sometimes you forget the baby steps you take along the way. That’s what happened when one of my colleagues asked a very simple question. I had to brainstorm different ideas in my mind before I finally had the answer. To explain the idea in a better way, learning by ...

Creating a Cybersecurity Team
By: Tatianna
March 1, 2019

Experts, Assemble! Creating Your IT “Dream Team” Cybersecurity is a team sport. Even the best infosec experts can’t manage network, cloud computing, and mobile device security on their own — but attempting to tackle complex cybersecurity issues with a team of generalists also hampers success.What does this mean for your organization? That handling key cybersecurity challenges — such as ...

How Cybrary Helped Renew My Love For Cyber Security, And Helped To Solidify My Career Goals.
By: Hunterkl5
February 28, 2019

Back in November of 2017, I graduated from University with a 2:1 in Computer and Information Security. I was looking forward to the prospects of a career in an interesting and continually changing field. However, this was not to be, after discovering that a lot of Graduate opportunities within the UK's industry that I was applying to were highly ...

Vulnerability Assessment: How quickly assess networks
By: Uladzislau Murashka
February 27, 2019

Today we going to speak about how quickly execute security scanning and assessment of big networks, which tools we will need and in which cases it may be required. In which cases do we need to scan big networks Some compliance's like PCI DSS or HIPAA may require to execute security scans against huge networks and subnets, including testing of ...

Why Corporations Need to Give their Employees Personal VPNs
By: sambocetta
February 27, 2019

Last year, the Cybersecurity Strategy Report was released by the House Energy and Commerce Committee’s Subcommittee. In a nutshell, the report found that the majority of current IT strategies major corporations are using are not working, and lays out various measures that can be used to strengthen them.   ...

Get to Know Your Instructors: Rob Thurston
By: SLWelty
February 27, 2019

Fun Facts About Rob What course are you teaching? NMAP What's your favorite food? Mexican and Texas Barbeque, sometimes together What is your favorite hobby? I love running and golf (oops, that’s two) Social media handles? https://www.linkedin.com/in/therobthurston/ The Q & A Tell us about yourself: As I get older, I realize that I’m ...

Linux Keyboard Shortcuts
By: Tapan Jatakia
February 26, 2019

Linux Keyboard Shortcuts Linux Keyboard Shortcuts are a must for Linux Enthusiasts and Professionals. However, students studying Linux also could apply these to speed up their work process and understanding of Linux. User wanting to learn shortcuts & key combinations need to know the Pros and Cons first. Pros: Speedup ...

A Change Will Do You (and Us) Good
By: purvikshah
February 25, 2019

By : Christine SchaeferNotice anything new?At ThreatConnect, our philosophy since our founding has been that we would incorporate intelligence in all aspects of security operations including orchestration and workflow, as functionality within our Platform. We believe (and always have) that an intelligence-led defense benefits organizations and allows better predictive and proactive strategic decision-making.That said, like most, we are a ...

Scanning Fundamentals
By: Devansh Bordia
February 25, 2019

 Scanning is a process of actively gathering information about the target with the intent of determining the various services, process, open ports, a live host, Os, version running on the system. This phase involves sending specially crafted packets to the victim in order to know insights about the system environment and configuration.D uring this process, it ...

Synchronizer token pattern
By: Ace
February 25, 2019

In this post let’s discuss about using a synchronizer token pattern to prevent CSRF (CSRF meaning Cross-site request forgery.).  Synchronizer token pattern (STP) is a technique where a token, secret and unique value for each request, is embedded by the web application in all HTML forms and verified on the server side.  ...