0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Building Botnets with VPS and Virtualization
By: Tatianna
January 15, 2019

A botnet is a network of devices running automated tasks as “bots”. Bots can carry out any type of complex task at high speeds indefinitely. Often times a botnet is used to carry out many tasks at once ...

Growing Importance of VMware Certifications in 2019
By: Vikrant Saran
January 15, 2019

VMware is one such technology which has gained immense popularity in the current times. And the coming year is going to create more opportunities for the people who have virtualizations skills in their resume. A few years ago a business growth would directly mean more investment and more hardware units put together; however, after the onset of ...

7 Reasons to Start Playing CTFs
By: emaragkos
January 14, 2019

"Start playing CTFs now!" is what I wish someone has told me a few years ago! In this article I present you 7 reasons why you should start playing CTFs right now. If you are not familiar with CTFs the following articles will help you. What the heck is a Capture the flag (CTF)? CTF Categories ...

Best Computer Forensic Analysis Tools
By: juliasowells
January 14, 2019

Computer forensics is of much relevance in today’s world. Though forensic analysis refers to searching and analyzing information to aid the process of finding evidence for a trial, computer forensic analysis is specially focussed on detecting malware . Computer forensic analysis tools help detect unknown, malicious threats across devices and networks, thus helping secure computers, devices and networks. ...

CompTIA Security+: The Gateway to Security Certifications
By: rwoerner2
January 12, 2019

This article originally published on the Bellevue University Cybersecurity blog by the current author and instructor of Cybrary's Security+ course , Ron Woerner. One of the greatest hindrances to mitigating cybercrime is the lack of qualified and skilled professionals trained in cybersecurity. Cybersecurity is a rising career field with a need for more security professionals in ...

Web App Pentesting Tools for Security Audits
By: Shaquib Izhar
January 11, 2019

Web App Pentesting: Tools and Techniques for Web Security Auditing  Every pentester has his own tools and techniques for web app security auditing. Sometimes it depends on the type of website being pentested. Here, ...

The Importance of Cybersecurity Program Management
By: hvigil48
January 10, 2019

The world of cybersecurity has changed drastically over the past several years and will continue to do so in the years ahead.  As cyber threat continues to grow in complexity and in numbers, organizations are faced with the new challenge ...

Networking Part 8: Signals, Frequencies, & Interference
By: Iselin
January 3, 2019

Frequencies, Interference, Signal Strength, Bounce, Channel Bonding Frequency Bands & channels A frequency band is a range of frequency that is divided into multiple channelsFrequency bands are most commonly found as 2.4 GHz and 5GHz. When you change from channel 1 to 5, you gradually increase the wave of frequencies you’re sending information on. 2.4GHz Channel 1 ...

How to get your dream job in IT or Cyber Security
By: ragediver24
January 2, 2019

Your dream job in IT or Cyber Security could be right around the corner... It seems like only yesterday I was getting out of the active duty Army and frantically searching through job sites, drafting my resumes, and signing up for every mailing list, job placement service, job board, etc. There are so many things I know now that ...

Top 7 IT Audit Findings for 2018
By: TONY
January 2, 2019

Human factor remains one of the weakest links in maintaining proper cyber-hygiene in an enterprise. Unfortunately addressing risks posed by humans via training and retraining is often sacrificed on the altar of acquiring fancy security tools… don’t get me wrong, there is nothing wrong with acquiring security tools excepting that they cannot by themselves atone for the information ...