0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Intermediate Endpoint Security Course Summary
By: Staford Titus S
September 3, 2020

Establishing impenetrable security is by no means an easy task. Hence, several avenues for erroneous decisions are possible. According to HelpNetSecurity, about 68% of organizations were victims of endpoints attacks in 2019. This brings to light the failure to realize the potential vulnerabilities caused by overlooked entities such as endpoints. Milan Cetic, the course instructor, hopes to educate the importance ...

Focusing Skill Development Priorities Based on Current Cybersecurity Trends
By: Jenna Crawford
September 3, 2020

Organizations today are faced with a threat landscape that continues to evolve, including cyber-attacks that have become much more sophisticated. Cybercriminals are highly motivated and tend to use a wide range of tactics, tools, and techniques to achieve their goals. IBM Security (2020) found that the average time it took for organizations to identify a data breach attack was 207 ...

Course Spotlight: Cloud Governance Principles
By: Matt Duda
September 2, 2020

As a Cybrary user, I bet you'd agree that the cloud is the most disruptive technology many current IT professionals will encounter over the course of their entire careers. The benefits of embracing the cloud are many, and to compete successfully in today’s marketplace being 'in the cloud' must be a part of an organization’s approach to IT. But, as ...

Cybrary's Free Courses | September 2020
By: Tatianna Harris
September 1, 2020

We're here to support you in your mission to learn and grow! The month's free courses are centered around forming a solid foundation. Here is what's available to you to learn for free in 2020. We’ve made 7 courses (that are normally paid!) completely FREE for the entire month of September. Now, your free membership for a __*limited time ...

Red Team vs. Blue Team
By: Ryan Wilson
September 1, 2020

What is the Red Team? Red teaming can be defined as approaching an environment from an adversarial or attacker perspective, to proactively test security controls in the environment, with the overall objective of increasing an organization’s security posture. Red teaming is a form of ethical hacking and shares some similarities with penetration testing. A red team exercise is also known ...

Where To Learn IoT
By: Michael Cunningham
August 31, 2020

Welcome to my fourth blog dealing with the Internet of Things. It is terrific to see you have shown such an interest in IoT. Well, now, we explore an essential area: Where to learn IoT. Let us break it down into a few things to explore. Online vs. Brick and Mortar. The first question is simple: how much time each ...

Security and Privacy of Drones
By: Navid Kagalwalla
August 28, 2020

A drone, also known as a UAV (unmanned aerial vehicle), is an aircraft piloted by remote control or onboard computers. With the advent of the concept of smart cities, drones are expected to play a huge role in the delivery of products and merchandise, enabling the reduction of greenhouse gases and introducing cutting edge navigation techniques which cut waiting times ...

Why Learn AI
By: Apurv Tiwari
August 26, 2020

To have a meaningful discussion regarding Artificial Intelligence (AI), one must first understand what exactly Artificial Intelligence is. What does it aim to solve? What are its constituents? When was AI invented? What kind of research and development has gone into it? What are the current and projected trends surrounding the technology? Let's try answering all of these questions. AI stands ...

Do You Need Programming for Cybersecurity?
By: Staford Titus S
August 26, 2020

Prelude You are almost about to call it a day when you hear the unusual, but equally recognizable noise made by the Security Analytics Dashboard when a critical alert is triggered. The warning displays that malware has surfaced abruptly on a system in the network, previously considered near-impenetrable. You take measures to isolate the malware within an island network. Upon ...

Enhance your AWS Skills by using Virtual Labs
By: Sudeep Phal
August 25, 2020

Working remotely is now the "new normal." As a result, The cloud market is growing day by day. There is a large spike in cloud adoption, with Amazon Web Services (AWS) being the market leader (at 32.4% of the global market), followed by Microsoft's Azure (at 17.6%), and Google's Cloud Platform (GCP) (at 6%). After the hard impact around the ...