0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Why The CEH Certification Is Good For Ethical Hacking?
By: Shimon Brathwaite
April 23, 2021

Being a computer hacker has become one of the most profitable ways to make money online in the 21st century. There is a new cyberattack approximately every 39 seconds. The fact that it can be done from any part of the world against someone on the other side of the world is something we have never seen before. Fortunately, people ...

Cybersecurity Audit Tips And Tricks
By: Darcy Kempa
April 22, 2021

Occupational tips and tricks are often the results of many years of personal experience. Over an employee’s lifetime, personal successes and failures are analyzed to identify what worked and what did not. They can then use the successful tips or tricks to improve performance, reduce waste, or save time. The following cybersecurity audit tips and tricks are ...

GDPR Compliance Checklist
By: Nihad Hassan
April 22, 2021

The General Data Protection Regulation (GDPR) is considered the most important data protection regulation globally. It was issued to protect the EU citizens' data when stored or processed across the world. GDPR became enforceable in May 2018; since then, it has become the main legal framework that any global organization must be subject to when handling citizens' data in ...

Crowdstrike Falcon Sensor Awareness for Linux
By: Owen Dubiel
April 22, 2021

CrowdStrike is a leading endpoint security solution that continues to grow its foothold as a top contender for an all-encompassing EDR tool. For the most part, CrowdStrike uses its sensors seamlessly with features like auto-update uninstall protection and reduced functionality mode. Specifically, reduced functionality mode (RFM) is designed to protect your machine and any processes running from breaking if, for ...

What to do: SQL Server Database Not Accessible After Restore
By: robinshanab
April 21, 2021

Every SQL Administrator at some point has experienced an error on their SQL Database, which states that 'SQL server database is not accessible after restore.' Multiple reasons can lead to this error. Here we're going to go through the top 4 reasons for this error and how you can resolve this issue. 1. Restoring the Database through backup with No-Recovery ...

Lean Six Sigma Green Belt Certification Basics
By: Shimon Brathwaite
April 20, 2021

What is a lean Six Sigma green belt? An IASSC Certified Lean Six Sigma Green Belt (ICGB) is a professional who is well versed in the elements of Lean Six Sigma methodology. Someone who has achieved this certification leads improvement projects or serves as part of a team whose goal is process improvement. Lean Six Sigma improves performance by ...

Top Programming Languages For Cybersecurity
By: Shimon Brathwaite
April 20, 2021

Knowing how to program is extremely useful for anyone working in Cybersecurity. Cybersecurity professionals are expected to create computer scripts to automate administration or write scripts to help perform actions that are too difficult to do manually. This is especially true while performing a penetration test, where you are routinely expected to create scripts to do your job effectively. Since ...

Cisco Certifications For Cybersecurity
By: Shimon Brathwaite
April 20, 2021

Cisco has been a leader in Information Technology and Networking for over 30 years. Most corporations still rely on Cisco technology, and having a solid understanding of them can be an asset for any technology professional. Not only has Cisco made advancements in technology, but in their information security training and certification programs. The importance or effectiveness of cybersecurity certifications ...

Bypass Logins Using SQL Injection
By: Sahad Mk
April 19, 2021

This tutorial will explain how to bypass the login form and how it works using SQL injection. An SQL injection is a type of attack where you input an SQL query into a web form to extract information from the database. SQL stands for Structured Query Language and is used to control the databases of web applications. You can bypass ...

File Integrity Monitoring Tools
By: Nihad Hassan
April 16, 2021

The number of cyberattacks is increasing rapidly, especially after the start of the COVID-19 pandemic, which leads to a spike in cyberattacks worldwide. According to the FBI, there were about 4,000 cyberattacks a day since the beginning of the COVID-19 pandemic. This represents a 400% increase from the previous year before the coronavirus crisis. The most notable cyberattack type was ransomware. ...