0P3N Blog
Cybrary’s Open Blog is a user contributed cybersecurity knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.


What is CMMC? CMMC stands for Cybersecurity Maturity Model Certification. This certification was enacted by the DoD (Department of Defense) in 2020. There are various levels of CMMC certification, ranging from basic cybersecurity to advanced. There is no self-certification for CMMC. All companies that have associated business with the DoD must be certified. The level of CMMC certification will depend ...


Cisco certifications are globally recognized and respected in the IT industry. Recruiters and hiring managers who interview candidates for IT positions often look first at the certifications, such as those from Cisco, that job applicants have to narrow down their searches. When you’re backed by the validation that Cisco certifications provide, it’s a big plus when looking for new job ...


SOC Analyst. SOC Specialist. SOC Engineer. SOC Manager. If anyone enters these titles into Indeed, LinkedIn, Career Builder, or any other primary job search website, individuals will get thousands of results for Security Operation Center (SOC) positions all over the country. One issue is that the majority of these positions' skillset requirements vary vastly from job to job. Those wanting ...


Using emails as an attack vector remains the most popular method for getting into a network. Despite all the efforts and large percentage of IT budgets being spent in protecting the systems, companies are breached day in and day out. Daily, we hear of small to large corporations, even critical infrastructures, being breached. One might think that IT has them ...


The Department of Defense Directive 8140 (DoD 8140), also known as the Information Assurance Workforce Improvement Program or Cybersecurity Workforce Improvement Program, was designed based on the National Institute of Standards and Technology (NIST) National Initiative for Cybersecurity Education (NICE) framework. This directive is an update and expansion of the previous DoD Directive 8570. DoD 8140 outlines the necessary training ...


What is Asset Security? Asset Security Fundamentals is a set of techniques and tools to allow organizational assets, confidentiality, integrity, and availability whenever it's used. As a security professional or IT manager, this course teaches us to develop fundamental skills, facilitating the attendees' professional growth in cybersecurity, IT, or management. The topics explored include: A) Using corporate investment protection for ...


Can I learn IoT alone? Learning is never alone. From the time you are born, you are learning. Those first steps you took were unaided, and your parents and grandparents helped show you what balance is. You naturally moved your feet and built up those muscles you needed to take that first step. Learning is the same in everyday life. ...


Cybrary is offering an Introduction to Excel course by instructor Milan Cetic. This course can help information technology professionals, as every IT person will need a robust tool to conduct analysis, tracking, and reporting. In this course, you will learn the basic features of the program and how to use them to create nearly any type of tool ...


The first time I heard the SCADA acronym, it was associated with the Stuxnet worm that was discovered in 2010. If you haven’t heard about Stuxnet, it was a cyber worm that struck and crippled an Iranian nuclear facility that contained centrifuges used to manufacture weapons-grade uranium 1 . The system targeted by Stuxnet was a Supervisory Control and Data ...


Outline Get the concept of how the attack works Set up the environment Make the target clear Start the process Wait for the target to establish a connection to an insecure network The username and the password are captured automatically and displayed on the console How does the attack work? In a computer network, ARP poisoning is a technique where ...