0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cyber Criminology Classifications and Countermeasures
By: Nafeel Ahmed
May 12, 2020

What is cybercrime? A crime that involves using a computer and a network is classified as cybercrime, and people who commit these crimes are called cybercriminals. A cybercriminal can target individuals by targeting their property, the person himself, harming their mental health, and can even cause damage to governments. Anyone using a computer and a network can be targeted. What ...

What Programming Language Should I Learn For Cybersecurity
By: Joshua Elijah
May 11, 2020

Cybersecurity & Programming! Do they even relate? Programming causes panic to many people at first sight of humongous lines of code even to perform a straightforward task such as printing “Hello, world!” on the screen. But the moment you start your career as a cybersecurity professional, you realize that it offers a wide range of specializations. What is mostly overlooked ...

"401 Access Denied" New Podcast Launched
By: Shelby Welty
May 11, 2020

Thycotic and Cybrary have partnered to launch the new podcast "401 Access Denied", where world-class cyber security experts discuss the latest threats, Current Global Security Challenges and Share Advice in bi-weekly, interactive forum. Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, including 25 of the Fortune 100, today announced the launch of 401 Access ...

Agile Project Management: Course Review
By: Sheane Jayne
May 8, 2020

In every project, the common end-goal is to produce or create value for the organization. What kind of value you may ask? One that creates a beneficial business impact by giving clients what they want or by providing them with the right solutions to meet their current needs. One of the many courses that Cybrary recently rolled out recently ...

Cloud Certification and the Workforce
By: Doug Bonderud
May 8, 2020

Cloud Certification: Why Does it Matter for Your Workforce? Cloud computing has changed the future of IT. Research firm Gartner points to the “death of the data center” 1 over the next five years as companies make the shift from on-premises solutions to cloud-based initiatives, while DevOps highlights the rise of multicloud, multipurpose deployments capable of delivering both specific ...

What Jobs Can I Get With A Microsoft Certification?
By: Matt Choi
May 7, 2020

Earning a Microsoft Certification can help you land a new job and set your career on your desired path. Some may think that a Microsoft certification is only useful in the IT world or in roles where someone works with Excel. But, professionals with a Microsoft Certification excel in a variety of industries across all levels. What Jobs Can ...

NIST 800-53: Intro to Security and Privacy Controls Course Spotlight
By: Braam Broodyk
May 6, 2020

So you just landed that new gig as a Chief Information Security Officer (CISO) for a new organization, and you need to develop a roadmap to implement security controls, but which controls do you implement, and how do you prioritize? The Cybrary course NIST 800-53: Introduction to Security and Privacy Controls will provide you with an overview of the ...

Graphing Website Relationships for Risk Prediction: Identifying Derived Threats to Users Based on Known Indicators
By: Philip H. Kulp & Nikki E. Robinson
May 5, 2020

Abstract. The hypothesis for the study was that the relationship based on referrer links and the number of hops to a malicious site could indicate the risk to another website. We chose Receiver Operating Characteristics (ROC) analysis as the method of comparing true-positive and false-positive rates for captured web traffic to test the predictive capabilities of our model. Known threat ...

Is Cybersecurity Easy to Learn?
By: Joshua Elijah
May 5, 2020

With the Internet of Things (IoT), Big Data, and Cloud Computing, the need for experts who can secure data stored in data pools has escalated. These data, mostly Personally Identifiable Information (PII), if not secured, would cause data breach that could put any enterprise or individuals in immense danger. What is Cybersecurity? So what is Cybersecurity? Wikipedia defines ...

Securing Smart Cities without Limiting Innovation
By: Hugh Shepherd
May 4, 2020

The potential of smart cities is immense. The convergence of people and technology to efficiently deliver services to the public and solve the problems of urbanization is one of the ultimate aspirations for smart city deployments. But there are challenges to smart city deployments. The most likely solution is to enforce policy and security requirements to mitigate these risks. But ...