0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


How winning at team dynamics facilitates stronger cybersecurity leadership > This series is sponsored by Cybrary for Teams- helping organizations close the cybersecurity skills gap and build a workforce capable of tackling the challenges of today, and tomorrow. Request your demo to explore all expanded training options. > Among the most pervasive misconceptions about cybersecurity is that it’s purely the domain ...


Do you want to get into Cyber Security, but not quite sure where to start? What routes to take? What help is out there to venture on to this path? Well, read on as this blog will outline just that. It can be a confusing time to choose the right training providers, which courses to start from, and who to use, ...


Companies hosting their hardware, software, and servers are slowly but surely becoming something of the past. Businesses are increasingly relocating their mission-critical infrastructure into the cloud. With this move, they transfer some of their security, risk, and compliance responsibilities to cloud service providers like Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), and Salesforce, to name a few. Azure ...


Could you go back years ago to a time where you could not send emails and text messages, or post online? It feels strange to imagine one's life without all these things, most importantly, without the internet that makes it possible. So, what is the Internet? The Internet is a worldwide system of connected computer networks, "a network of networks, "in ...


False promises It all started when high tech became cool. When it suddenly was possible to brag with one’s computer in “normal” social circles. Similar to the late seventies and early eighties, when showing a pair of Macintosh mono amplifiers, coupled with Nestorovic Labs New Yorker speaker boxes (that together cost as much as a Porsche), to one’s friends was ...


Overview: Cybrary’s course on Privileged Access Management (PAM) Fundamentals is a solution that helps any organization to use an existing Active Directory environment to restrict privileged access. It is a Beginner level course with no prerequisites required. This course covers all phases of the PAM in detail and shows how they’re applied in real-world situations. In this course, you will ...


Businesses are confronted with new cybersecurity threats every day, while simultaneously facing a growing need and shortage of cybersecurity experts. Many businesses are building successful cybersecurity teams by training their own IT personnel, however, trained personnel aren’t enough to be competitive in today’s business market. Cybersecurity workers must also be certified as experts in their fields. What are ...


The average computer user knows their way around essential Microsoft functions. Having a more comprehensive knowledge of Microsoft's programs can help advance a student's career and give them skills to complete more common tasks quicker and more accurately. What Is Microsoft Certification? Microsoft Certification "validates IT professional and developer technical expertise through rigorous, industry-proven, and industry-recognized exams," according to Microsoft. Obtaining ...


Shortage of Skills There is a steep trajectory of growing demand for cybersecurity skills in recent years. According to a report by New America 1 , in 2015, the global shortage of resources was forecasted to be 1.5M by 2020. However, in a recent article published by Infosecurity Magazine 2 , that number has climbed to 4M – exceeding estimates ...


Due to the COVID-19 pandemic, a US Military branch approached Cybrary in search of a partner to provide learning opportunities for its newly remote workforce to replace its in-classroom training. This US military group had a critical need for hands-on learning focused on networking, threat hunting, and cyber threat intelligence. This effort was to support the onboarding and development of their ...