0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


I think everyone has heard the word SERVER, at least once in their lifetime. Since every one of us is in lockdown, I decided, "why not start my home server to store and access my music or files?" So we are going to learn how to set up our very own server for free. We are going to learn how to ...


“Follow the white rabbit.” It’s one of the most iconic scenes in 1999’s The Matrix. Trinity hacks Neo’s terminal and types the message to him. Many at the time asked if the scene was even possible. The next question invariably is, “How can I learn to do that?” The short answer: Yes, it is possible ...


Every business should have a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP). These plans are essential to keeping a business in operation during interruptions such as natural disasters, breaches, and pandemics. According to FEMA, roughly 40 to 60 percent of small businesses never reopen their doors following a major incident 1 , because there was no BCP ...


New initiative aims to help industry professionals scale skill sets Cybrary, the world's largest online cybersecurity career development platform, today announced that it will be extending exclusive offers to all individual and corporate Information Systems Security Association (ISSA)® members, including discounts for Cybrary’s Insider Pro and Cybrary for Business subscriptions. The new offerings aim to provide organizations the tools ...


The below meme about computer addresses gives a peek into what we are going to discuss today. It’s fascinating to have multiple addresses, but why do we need them? The first two addresses in the meme above are IP addresses, and the last one is a MAC (Media Access Control) address. If we look at the OSI layers from top ...


What is CMMC? CMMC stands for Cybersecurity Maturity Model Certification. This certification was enacted by the DoD (Department of Defense) in 2020. There are various levels of CMMC certification, ranging from basic cybersecurity to advanced. There is no self-certification for CMMC. All companies that have associated business with the DoD must be certified. The level of CMMC certification will depend ...


Cisco certifications are globally recognized and respected in the IT industry. Recruiters and hiring managers who interview candidates for IT positions often look first at the certifications, such as those from Cisco, that job applicants have to narrow down their searches. When you’re backed by the validation that Cisco certifications provide, it’s a big plus when looking for new job ...


SOC Analyst. SOC Specialist. SOC Engineer. SOC Manager. If anyone enters these titles into Indeed, LinkedIn, Career Builder, or any other primary job search website, individuals will get thousands of results for Security Operation Center (SOC) positions all over the country. One issue is that the majority of these positions' skillset requirements vary vastly from job to job. Those wanting ...


Using emails as an attack vector remains the most popular method for getting into a network. Despite all the efforts and large percentage of IT budgets being spent in protecting the systems, companies are breached day in and day out. Daily, we hear of small to large corporations, even critical infrastructures, being breached. One might think that IT has them ...


The Department of Defense Directive 8140 (DoD 8140), also known as the Information Assurance Workforce Improvement Program or Cybersecurity Workforce Improvement Program, was designed based on the National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE) framework. This directive is an update and expansion of the previous DoD Directive 8570. DoD 8140 outlines the necessary training ...