0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

How To Enhance Linux Skills By Using Virtual Labs
By: David Boucher
August 19, 2020

Introduction to virtual labs For anyone looking to develop their technical skills, there are a variety of methods available: Training courses Conferences and webinars Technical books, manuals, or other publications Technical websites, blogs, and forums Studying to achieve certification Projects that require new skills Hands-on practice in a lab All of these are useful, but due to the practical nature ...

What Should I Learn for Cybersecurity
By: Joshua Elijah
August 17, 2020

Why learn Cybersecurity? As technology advances, it becomes crucial for cybersecurity experts to keep up with the growing pace of cybercrime. Thus, with newer standards of security, there arises a need to develop newer skill sets for cybersecurity professionals. However, this ever-changing nature of cybersecurity means that the experts can enjoy a great deal of success and wealth. Because businesses ...

Understanding Infrastructure Security
By: Vivek Soni
August 17, 2020

What is Infrastructure? All assets, whether physical or intangible, that may impact the economy, safety, health, and well-being of an enterprise, can be referred to as its infrastructure. The infrastructure is of the utmost value to an enterprise, and its destruction could have a debilitating impact. The critical infrastructure may include its data center, network devices, servers and workstations, and ...

DevSecOps Pipeline: Delivery
By: Phillip Kulp, Ph.D
August 14, 2020

Over the coming weeks, Cybrary will be posting a series of blogs that correspond with the newly released course, DevSecOps Fundamentals. This post is the fifth in a series covering core principles to assist in the automation of a secure pipeline. Securing the Development Cycle What Are We Defending? ...

Distinguishing Between the Security Architect and Security Engineer
By: Josh Lambert
August 14, 2020

Sometimes, the term engineer and architect are used interchangeably, especially in cybersecurity job postings. I submit that within the technology domains, especially cybersecurity, there is a distinction between the role of engineer and architect. The etymology of engineer points to someone who designs maintains, troubleshoots, and cares for an engine. I equate an engine to a cybersecurity capability within the ...

"Everyday Digital Forensics" Course Summary
By: Divya Lakshmanan
August 13, 2020

Overview The competency to navigate through the world of digital forensics is in much demand now. With the swarm of resources available at the click of a button, how does one pick where to start? Here is a suggestion - Cybrary has released a new course titled "Everyday Digital Forensics." Courses in digital forensics start with detailing facts about file systems ...

What Do I Need to Learn Cybersecurity
By: Miguel Angel Saiz
August 13, 2020

Nowadays, computing has occupied all aspects of our lives, and businesses have increased their dependence on IT solutions. What is Cybersecurity? Cybersecurity is the practice of protecting networks, systems, and programs from attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information and interrupting normal business processes. Why is cybersecurity important? Currently, the world is hyperconnected, which is why ...

CISSP Roles and Responsibilities
By: Charles Owen-Jackson
August 13, 2020

What are the roles and responsibilities of a CISSP? Implementing security programs as a certified information system security professional Cybersecurity leadership roles are increasingly relying on people with both technical and managerial skills and experience. It’s also a highly regulated sector that demands a thorough knowledge of all the key domains of information security. In today’s enterprise environment, cybersecurity leadership roles ...

Course Spotlight: Fundamentals of Vulnerability Management
By: Vijayashree Krishnaraj
August 12, 2020

As cyber-attacks are increasing day by day, the organization's responsibility to safeguard itself increases as well. One of the important things to consider to maintain the required risk score, which indicates the extremity of a risk due to some factors and to reduce the susceptibility to cyber-attacks is Vulnerability Assessment and Management. Throughout three modules, with on-demand learning videos and ...

Strategies To Win A CTF: How To Approach A Jeopardy Style CTF
By: Nafeel Ahmed
August 12, 2020

What is a CTF? CTF stands for Capture The Flag. It is a kind of competition or game which hackers enjoy to compete and play. Hackers are either competing to win a prize in a big competition (e.g., Google CTF) or practicing to polish their skills. There are three main and most popular types of CTF categories. What are the ...