Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary 0P3N is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; Cybrary 0P3N provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

Profile image for olynch
November 24, 2017
By: Olivia
514

UNM4SK3D: Uber, GitHub, and White House
#hacked  Shut up and drive. More like, “Shut up and don’t tell users we were hacked.” It has been discovered the ride service with the already questionable reputation, Uber, suffered a massive data breach in 2016. What’s worse, they paid the hackers $100,000 to keep quiet.  According to Bloomberg, the data of 57,000,000 drivers and customers was stolen, which the company failed to warn those affected about, but also paid the hackers to “delete t ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for vikash71
November 24, 2017
452

By: vikash71
The different types of training delivery modes are Classroom, Live Virtual, On-Demand, Bootcamp and One-on-one Training. You may choose any one of these as per your convenience and availability, as all of these training modes have proved to be highly effective and fruitful. Classroom Training This is one of the best choices for those looking f ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for leribeiro82
November 23, 2017
1160

By: Leandro Ribeiro
As you may (or may not) know, in these days Cyber Extortion is a frequent problem. There is news about this issue each day. In May, I went to Vancouver, Canada, and during the connection between Houston and Vancouver, I met a U.S. lady aged about 70 years. During the flight, we talked about many things and she asked me about my travels to Va ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bmfmancini
November 22, 2017
By: Sean Mancini
2697

Encryption In-Depth: Keyfiles
You may have seen some applications that have encryption options such as Kepass or Veracrypt where you can create a “keyfile”. But what is a keyfile and what is its purpose? A keyfile is a file with an encryption key that is randomly generated either by entering random text and numbers or moving a mouse around the key values that are generated are then outputted to a file used to decrypt the files. You can think of this as an alternative to a passphrase. See ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for olagunj2
November 22, 2017
By: Jide Olagundoye
1138

Digital Transformations Need to be Part of Business Strategy
For a business to succeed, you must embed DX into business. The strategy for the use of information technology (IT) is no longer something that can be delegated as the sole concern of the IT department. It must be firmly rooted in the business strategic plan (strategic plan). Many businesses are now embracing the objective of transforming their operations through the effective use of technology. This can only be done effectively when both IT and service heads understand w ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for aman2406
November 21, 2017
2193

By: Aman2406
Data breaches were never contemplated as a fortune but some of them are palatable as compared to others. We can digest that our servant got hacked instead of our banks. And the most troublesome breaches would be related to our personal information which involves insurance records, medical history, banking details, social security number and mu ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for aman2406
November 20, 2017
2162

By: Aman2406
On 6th August 1991, a powerful invention came into existence, the Internet. Since its introduction, it has made a huge impact on the society, which later demanded the invention of WI-FI in the year 1997. The invention was responsible for wireless standardization which was introduced by a community called IEEE802.11. They introduced WI-FI for H ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for bmfmancini
November 19, 2017
By: Sean Mancini
4248

Why You Should Get Your Hands on a YUBIKEY
I have covered the importance of MFA (Multi-Factor Authentication) aka 2-factor security with more and more vendors such as Gmail, Outlook, and others now supporting MFA there is no reason not to have it enabled. MFA  is the answer to a lot of security issues when it comes to authentication. One of the common complaints with MFA is that it is not always user-friendly and can be hard to setup for the average user. Google has the authenticator app available on the play store ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel