0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Cybrary's Free Courses for August 2020
By: Leif Jackson
August 3, 2020

We're here to support you in your mission to learn and grow! Here are some new ways for you to learn what you need to succeed in the second half of 2020. We’ve added 7 courses (that are normally paid!) to your free membership for a limited time only! As part of our mission to provide the opportunity for personal ...

Machine Learning and Artificial Intelligence in Cybersecurity
By: Phillip Durst
July 31, 2020

Machine Learning and Artificial Intelligence Artificial Intelligence (AI) and Machine Learning (ML) are the hottest two topics in computer science today. So much so that, if you can think of a problem, someone has tried to solve that problem with AI and ML. In most cases, AI and ML are, in fact, the solution. Because of these ...

A Beginner's Guide to the Bash Terminal
By: Ayokunle Oladapo
July 31, 2020

What is Bash? Bash (Bourne Again Shell) is the command language interpreter or shell for the GNU/Linux operating system. It was named after Stephen Bourne, who was the author of the Bourne shell (sh). The Bash shell can be found on most GNU/Linux systems and, recently, on most Unix systems. What is a Shell? A shell is simply a program that ...

How To Learn Network Operational Management
By: Casey Gager
July 30, 2020

Cybersecurity is a diverse and growing field. There are many paths a professional may take to becoming a cybersecurity expert. Also, there are distinct practice areas within the world of cybersecurity. One person may be an expert in technical aspects of cybersecurity, while another person's specialty may focus on compliance. Regardless of the cybersecurity professional's role, understanding how information technology ...

Top Cyber Threats in 2020
By: Divya Bora
July 30, 2020

What is a cyber-threat? You have probably heard the term cyber threat, as it is being used nowadays due to increased reliance on technology, but what does it actually mean? Cyber-threat refers to a malicious act that seeks to damage data, steal data, or disrupt digital life in general; such as computer viruses, data breaches, Denial of Service (DoS) attacks, or ...

Implementing Data Protection by Design
By: Dr. Edward Amoroso
July 30, 2020

Optimizing prevention, detection, and response in the cybersecurity challenges of tomorrow Data protection used to be relatively easy. Traditional firewalls would keep most of the external threats from getting into the company network, while antivirus software installed on endpoints would usually take care of those which did make it through. Additional layers of security, such as intrusion detection and prevention ...

How Can We Use AI In Cybersecurity To Detect Threats And Exploits
By: Manik
July 29, 2020

For years, we have dreamed of the moment that we see unbelievably advanced technology, like flying cars, time machines, and many others, just like in the movies. Slowly, but surely, we take a step closer to that future. Many have dreams and hopes, and out of them, one stands above all. That reigning aspect would be none other than "Artificial ...

What to Do if You are a Victim of a Phishing Email
By: Gabriel Fernando
July 29, 2020

In this present day, you may receive phishing emails often, and some of us may even fall for such scams. Email Phishing attacks are by far the most common social attacks employed by cybercriminals and are on the rise. Phishing can also happen via text messages. The term phishing was coined because the scammers cast out a lure so that ...

Data Destruction Policy
By: Nihad Hassan
July 28, 2020

As the world continues to digitalize, the dependence on papers and photographs has become its lowest. Digital transformation has changed how we study, work, shop, communicate, travel, bank, and even how we take care of our health. Nowadays, most information is created digitally and does not go onto paper at all. Organizations of all types, both public and private, utilize computer ...

Office 365 Migration Course Review
By: Miguel Saiz
July 28, 2020

In the middle of the current pandemic, it has been proven that cloud services are a great tool to guarantee business continuity. Because Office 365 runs in the cloud, servers aren't needed for storage regarding websites, emails, or documents. Removing onsite servers will reduce both energy costs and the need for office space to store server hardware, which makes the cost ...