Cybrary Pro Day is here!

0P3N Blog

Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.

GDPR Compliance Checklist
By: Nihad Hassan
April 22, 2021

The General Data Protection Regulation (GDPR) is considered the most important data protection regulation globally. It was issued to protect the EU citizens' data when stored or processed across the world. GDPR became enforceable in May 2018; since then, it has become the main legal framework that any global organization must be subject to when handling citizens' data in ...

Crowdstrike Falcon Sensor Awareness for Linux
By: Owen Dubiel
April 22, 2021

CrowdStrike is a leading endpoint security solution that continues to grow its foothold as a top contender for an all-encompassing EDR tool. For the most part, CrowdStrike uses its sensors seamlessly with features like auto-update uninstall protection and reduced functionality mode. Specifically, reduced functionality mode (RFM) is designed to protect your machine and any processes running from breaking if, for ...

What to do: SQL Server Database Not Accessible After Restore
By: robinshanab
April 21, 2021

Every SQL Administrator at some point has experienced an error on their SQL Database, which states that 'SQL server database is not accessible after restore.' Multiple reasons can lead to this error. Here we're going to go through the top 4 reasons for this error and how you can resolve this issue. 1. Restoring the Database through backup with No-Recovery ...

Lean Six Sigma Green Belt Certification Basics
By: Shimon Brathwaite
April 20, 2021

What is a lean Six Sigma green belt? An IASSC Certified Lean Six Sigma Green Belt (ICGB) is a professional who is well versed in the elements of Lean Six Sigma methodology. Someone who has achieved this certification leads improvement projects or serves as part of a team whose goal is process improvement. Lean Six Sigma improves performance by ...

Top Programming Languages For Cybersecurity
By: Shimon Brathwaite
April 20, 2021

Knowing how to program is extremely useful for anyone working in Cybersecurity. Cybersecurity professionals are expected to create computer scripts to automate administration or write scripts to help perform actions that are too difficult to do manually. This is especially true while performing a penetration test, where you are routinely expected to create scripts to do your job effectively. Since ...

Cisco Certifications For Cybersecurity
By: Shimon Brathwaite
April 20, 2021

Cisco has been a leader in Information Technology and Networking for over 30 years. Most corporations still rely on Cisco technology, and having a solid understanding of them can be an asset for any technology professional. Not only has Cisco made advancements in technology, but in their information security training and certification programs. The importance or effectiveness of cybersecurity certifications ...

Bypass Logins Using SQL Injection
By: Sahad Mk
April 19, 2021

This tutorial will explain how to bypass the login form and how it works using SQL injection. An SQL injection is a type of attack where you input an SQL query into a web form to extract information from the database. SQL stands for Structured Query Language and is used to control the databases of web applications. You can bypass ...

File Integrity Monitoring Tools
By: Nihad Hassan
April 16, 2021

The number of cyberattacks is increasing rapidly, especially after the start of the COVID-19 pandemic, which leads to a spike in cyberattacks worldwide. According to the FBI, there were about 4,000 cyberattacks a day since the beginning of the COVID-19 pandemic. This represents a 400% increase from the previous year before the coronavirus crisis. The most notable cyberattack type was ransomware. ...

Are Rules And Regulations Keeping Up With AI Advancements?
By: Gabriel Schram
April 16, 2021

Artificial Intelligence (AI) capabilities are continuously growing beyond the scope of existing laws and legislation. This issue has caused concern over the need for constant regulation that fluctuates with the rate of AI. Developing a solution to this problem has proven difficult with the global reach of AI combined with conflicting interests for its uses and potential. AI and its ...

Top 3 IT Governance Frameworks
By: Nihad Hassan
April 15, 2021

Information technology (IT) is defined as the use of computing devices and the internet to store, transmit and retrieve digital data. No matter the size of an organization, utilizing IT has become vital to facilitate business operations, enhance relationships between customers and business partners, and increase the security of confidential information and trade secrets. Information technology is an integral part of ...