0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How Your Identity is Being Threatened by the Digitalized World
By: evanmorris
March 6, 2019

Today, cyber threats are looming larger than physical threats such as terrorism. According to research that was conducted by the Unisys Security Index™ in 2017 this is true for both developed and developing nations. This is because we're now embracing more digital devices and services in both our work and personal lives. As such, most of us ...

Cybrary's breadth of content, a boon to Dev(Sec)Ops practices
By: [GDT] Brad Davenport
March 6, 2019

Our Engineers and Devs have learned a great deal during the short time they've been afforded access to the multitude of resources housed within the virtual walls of Cybrary Business . Many solution integrators would probably agree, embarking on a voyage into the next generation of IT is an endeavor fraught with paradoxes. If I make the system ...

Configuring a LAN with DHCP and VLANs – PART II
By: farazde
March 6, 2019

Ever heard about router on a stick? It literally does not mean that a router should be placed on a stick. It means that a router and switch are connected via a single physical interface configured as 802.1q trunk. The switch has multiple VLANs configured and the router is taking care of the routing between the different ...

How to Repair and Rebuild SQL Database Manually
By: sandycullen
March 6, 2019

Applications working on SQL database platform are easy to use but they have risk of data loss because of SQL MDF File. Despite Database Administrator maintains the SQL database it is prone to corruption as it is highly affected by external factors. Operating system errors, abrupt system shutdown and changes made by user affect the SQL database, so ...

Intelligence limited only by your architectural imagination
By: rarneson
March 6, 2019

By Richard Arneson, GDT Imagine a world where you come home and toss your car keys, jacket, clothes, wallet, et al., into a bin that would  smartly  send each to where it belongs—closet, key hook, shoved under the bed, etc. The next morning, when you’re getting ready for the new day, everything is exactly where it should ...

Retaining IT Talent
By: Tatianna
March 4, 2019

Tackling Cybersecurity Turnover: Best Practices to Retain Top Talent The cybersecurity workforce gap is growing: Recent research shows a shortfall of nearly three million skilled professionals worldwide. More worrisome? Almost 60 percent of companies surveyed said this gap puts them at “moderate or extreme” risk of cyber attacks.For organizations fortunate enough to have dedicated, experienced IT teams ...

Configuring a LAN with DHCP and VLANs – PART I
By: farazde
March 2, 2019

While working on things which require time and more practice, sometimes you forget the baby steps you take along the way. That’s what happened when one of my colleagues asked a very simple question. I had to brainstorm different ideas in my mind before I finally had the answer. To explain the idea in a better way, learning by ...

Creating a Cybersecurity Team
By: Tatianna
March 1, 2019

Experts, Assemble! Creating Your IT “Dream Team” Cybersecurity is a team sport. Even the best infosec experts can’t manage network, cloud computing, and mobile device security on their own — but attempting to tackle complex cybersecurity issues with a team of generalists also hampers success.What does this mean for your organization? That handling key cybersecurity challenges — such as ...

How Cybrary Helped Renew My Love For Cyber Security, And Helped To Solidify My Career Goals.
By: Hunterkl5
February 28, 2019

Back in November of 2017, I graduated from University with a 2:1 in Computer and Information Security. I was looking forward to the prospects of a career in an interesting and continually changing field. However, this was not to be, after discovering that a lot of Graduate opportunities within the UK's industry that I was applying to were highly ...

Vulnerability Assessment: How quickly assess networks
By: Uladzislau Murashka
February 27, 2019

Today we going to speak about how quickly execute security scanning and assessment of big networks, which tools we will need and in which cases it may be required. In which cases do we need to scan big networks Some compliance's like PCI DSS or HIPAA may require to execute security scans against huge networks and subnets, including testing of ...