0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

Laying the Groundwork: Three IT Training Paths to Help Build Your Career
By: SLWelty
February 10, 2020

Technology professionals are in demand as companies look to manage increasing IT complexity, optimize tech performance and deliver consistent ROI. For organizations, this presents a challenge as the need for skilled personnel outstrips available supply. But as noted by Information Week , there’s an industry shift underway as enterprises pivot toward “certified and soft skill-rich” candidates ...

3 Common Cybersecurity Career Paths and How to Get There
By: SLWelty
February 7, 2020

Today’s information technology and cybersecurity industries are exploding with job openings. In fact, there are more available positions in these fields than there are qualified professionals to fill them. There is no better time to begin a cybersecurity career than right now. Whether you are just out of college, or you are transitioning from another IT role, getting started in ...

Expanding Your Expertise: Three Courses to Specialize Your Career (and Boost Your Salary)
By: SLWelty
February 5, 2020

Demand for skilled IT professionals is exploding — companies can’t find enough skilled, entry-level staff and the problem is getting worse. Adoption of “new collar” approaches that prioritize skillsets and industry certifications over traditional post-secondary programming are beginning to bridge the gap, but the increasing scale and scope of technology presents a new challenge: Finding intermediate IT pros with the ...

From Privacy to Trust and ROI
By: SLWelty
January 31, 2020

This blog was originally posted on Cisco Security Blog by author Robert Waitman. Reposted with permission. As we embark on a new decade, data privacy has become top-of-mind for business executives and consumers worldwide. Data breaches frequently expose the personal data of millions, and many companies have not done enough to protect themselves from intentional ...

Letter To The Community: Cybrary's Next Chapter
By: SLWelty
January 27, 2020

Dear Cybrarians, Prior to launching Cybrary, Ralph and I had worked more than 10 years in the traditional brick-and-mortar classroom business. During that time we uncovered the countless issues that have been plaguing the industry, the most egregious of which was the high cost of training. Years of allowing for $3000-$5000 classes created high barriers to entry, and a general lack ...

Cloud G Suite to Office 365 Migration - Complete Tutorial
By: Frosty Orange
January 17, 2020

How to Migrate G Suite (Google Apps) to Office 365? In this post, we will describe two methods to perform cloud to cloud migration from Google G Suite to Microsoft Office 365 domain. This includes a complete guide to migrate emails, contacts, calendars, and documents from one domain to another without losing any information. Microsoft provides users with a ...

6 Information Security Predictions for the Year 2020
By: Emily Daniel - Data Scientist & Tech Expert at Shufti Pro
January 5, 2020

Entering into the year 2020, the ‘main thing’ while navigating the technology world is ‘Cyber Security.’ Innovations exploding in different areas of life and industries are giving rise to various challenges, among which cybersecurity is at the top of the list. With the advent of technological advancements such as Artificial Intelligence, 5G, quantum computing, IoT (Internet of Things), autonomous vehicles, ...

HIPAA Training: Worth it for a Healthy Career Outlook?
By: jasminen
January 3, 2020

Data privacy and security is now paramount for organizations to ensure they’re meeting both legislative standards and compliance requirements. This is especially critical for any business that handles protected health information (PHI) either directly or in partnership with another enterprise — data storage, handling, and eventual destruction are all governed by the Health Insurance Portability and Accountability Act (HIPAA).While many ...

How Online Face Recognition - Ensures High-end Security and Convenience
By: Gabriel Luke
December 18, 2019

Biometrics are becoming a cutting edge technology in the field of information security and data privacy. Biometrics entertain identification against unique human features. Biometrics being an emerging technology comes up with convenience identity recognition by replacing traditional passwords authentication with advanced identification systems. Begin FREE Intro to IT and Cybersecurity Course >> ...

By: jasminen
December 2, 2019

This blog was originally posted on Cisco Security Blog by author Ben Nahorney. Reposted with permission. Online advertising is an integral part of today’s internet experience. In many ways, ads are the lifeblood behind many websites, providing the necessary funding to keep sites running, as well as supporting the creation of new content. While it ...