Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

March 6, 2019
By: [GDT] Brad Davenport
1643

Cybrary’s breadth of content, a boon to Dev(Sec)Ops practices
Our Engineers and Devs have learned a great deal during the short time they’ve been afforded access to the multitude of resources housed within the virtual walls of Cybrary Business. Many solution integrators would probably agree, embarking on a voyage into the next generation of IT is an endeavor fraught with paradoxes. If I make the system open, it will be more vulnerable. If I more fully document features, there’s less time for enhancement. If I delay a releas ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
886

By: farazde
Ever heard about router on a stick? It literally does not mean that a router should be placed on a stick. It means that a router and switch are connected via a single physical interface configured as 802.1q trunk. The switch has multiple VLANs configured and the router is taking care of the routing between the different VLANs. To make it und ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
716

By:
Applications working on SQL database platform are easy to use but they have risk of data loss because of SQL MDF File. Despite Database Administrator maintains the SQL database it is prone to corruption as it is highly affected by external factors. Operating system errors, abrupt system shutdown and changes made by user affect the SQL databa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
By:
331

Intelligence limited only by your architectural imagination
By Richard Arneson, GDT Imagine a world where you come home and toss your car keys, jacket, clothes, wallet, et al., into a bin that would smartly send each to where it belongs—closet, key hook, shoved under the bed, etc. The next morning, when you’re getting ready for the new day, everything is exactly where it should be. No more fishing around for items vying to make you ashamedly late for your 8 AM meeting. Sound too good to be true? Well, it is, at least at home. B ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 2, 2019
By: farazde
3250

Configuring a LAN with DHCP and VLANs – PART I
While working on things which require time and more practice, sometimes you forget the baby steps you take along the way. That’s what happened when one of my colleagues asked a very simple question. I had to brainstorm different ideas in my mind before I finally had the answer. To explain the idea in a better way, learning by doing is the best approach. My colleague wanted to know how the users on the LAN are assigned an IP Address. He logged onto each device on the networ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 28, 2019
3346

By: Iselin
Machine learning- Data mining, optimization, statistics, algorithms, limitations, and software… Wait, a machine that learns? That’s correct. Machine learning is the science behind making computers act like humans and learn norms or rules based on data! In-depth, Machine Learning uses mathematical algorithms to parse data, learn from it ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 28, 2019
4175

By: Hunterkl5
Back in November of 2017, I graduated from University with a 2:1 in Computer and Information Security. I was looking forward to the prospects of a career in an interesting and continually changing field. However, this was not to be, after discovering that a lot of Graduate opportunities within the UK’s industry that I was applying to we ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 27, 2019
By: Uladzislau Murashka
3532

Vulnerability Assessment: How quickly assess networks
Today we going to speak about how quickly execute security scanning and assessment of big networks, which tools we will need and in which cases it may be required. In which cases do we need to scan big networks Some compliance’s like PCI DSS or HIPAA may require to execute security scans against huge networks and subnets, including testing of isolated environment and network segmentation at all. This process may require lots of time but here all will depend on your ex ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel