Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary 0P3N is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; Cybrary 0P3N provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

Profile image for willguibr
January 17, 2017
By: Willian
121

Best Security Podcasts for 2017
Estimated reading time: 4 minutes It’s time to get into gear for 2017. One of the most important aspects of being a security professional is staying up to date with trends, best practices, and current events. News websites and other social media websites are great ways to keep up, but people often forget the value that podcasts bring to the table. So if you are looking for resources of information that can provide you fresh and unbiased opinions in security, this comp ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for faustino50
January 17, 2017
127

By: Faustino50
Estimated reading time: 2 minutes Hello everyone, I am new on 0P3N, but I love contributing to the community. Let’s dive into the topic! How can we protect our online privacy through internet browsers with simple plugins and search engine settings? Here’s where it gets good 😉 Firefox/Chrome/Opera HTTPS Everywhere: This plugin is create ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for chanaykay
January 16, 2017
3374

By: Chanaykay
Estimated reading time: 1.5 minutes Hello everyone, Most people think that they know SQL injection. Some people may think that SQL injection is limiting in how it passes the login form. But, SQL injection covers a large area of research. First, let’s take a look it what SQL injection is. Well, SQL injection is a way or technique that ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for superfigjam
January 15, 2017
By: Muhammad Ali Hassan
2497

Visibility is the New Stealth!
Estimated reading time: 1 minute As technology advances so is the surveillance and invasion of our privacy. For a few decades, tech giants, people, human rights activists, and several other groups have been trying to come up with a way to avoid or block surveillance and hence there are a number of inventions to handle that matter. However, the more we try to evade, the more we put ourselves in perspective. Consequently, more focus is then put on the ones who try to block &# ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for theillusivecoywolf
January 14, 2017
By: coywolf
3097

Admin Arsenal – A Godsend for Small and Medium Sized Businesses
Estimated reading time: 3 minutes If you work for a small or medium sized business I can assure you that finding a reliable and cost-effective systems management solution is no easy task. If working as a Cyber Security Analyst has taught me one thing, it is that you can only protect what is visible and known. If I know my network, including the various systems, users, and applications communicating across the wire, I have a better chance at protecting my company’s ent ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for roninsmurf
January 13, 2017
3241

By: RoninSmurf
Estimated reading time: 1 minute This is a very quick guide for installing the Social Engineering Toolkit (or SET) onto an OS X machine. This is also going to be the first in a series of hacking related articles. What is SET? The Social Engineering Toolkit is a software tool that is offered by TrustedSec for free. This program is also bundled ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for groupflexi
January 13, 2017
4830

By: Priyank Gada
Estimated reading + viewing time: 7 minutes What is a Non-Certified Unethical Hacker? I was chatting with my friend who has done CEH, ECSA, CHFI, and others. He told me that certifications are important. I have not done any certifications but I have learned so much from websites like Cybrary, YouTube, etc. So, he challenged me to complete som ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
Profile image for sconnect
January 12, 2017
By: S-Connect
3285

2017 Cyber Security Trends
Estimated reading time: 4 minutes Since 2016 has ended, multiple industries commence on fine-tuning their business strategies for 2017. Cyber criminals are making exactly the same strategies so they can work smarter. Criminals are getting smarter by exploring new practices, building organizations, bringing human expertise for more sophisticated and specialized cyber attacks. It’s like we have action and then reaction cycle, enterprise organizations are planning or implemen ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

Best Security Podcasts for 2017
Views: 121 / January 17, 2017
How to Protect Online Privacy
Views: 126 / January 17, 2017
SQL Injection: Best practices and projects
Views: 3371 / January 16, 2017
Visibility is the New Stealth!
Views: 2496 / January 15, 2017
Skip to toolbar
Cybrary works best if you switch to our Android-friendly app
Continue

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel