Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 27, 2018
By:
3211

Security in the Cloud
Cloud computing is not a new concept. Many companies are already knee deep in Cloud, it is generally presented as the next logical move, particularly to replace an organization’s Infrastructure. It’s also good for tech startups as it cuts out a cost on infrastructure in the early stages. The benefits of cloud are well known, however, this article explores the issues of cloud from a Security perspective. We try and present issues that are not well documented, and then ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 26, 2018
1961

By: Vikrant Saran
So, you always want to pursue Microsoft training and attain the certification; however, lack opportunities to enroll in one hinder your way. Now, with Microsoft official on-demand training can be a boon for you. This is the right method to fulfill all your upskilling goals. Get all the benefits of Microsoft Official Training at one place wi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 26, 2018
1471

By:
Imagine you wake up one morning and see the screen below on your PC. You press every button, turn it off and on again, and the screen remains the same. Yes, maybe you would want to cry! Guess that’s where the name came from…This is exactly what happened to Apple’s iPhone processor supplier. Taiwan Semiconductor Manufacturing Co. (TSMC) ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 24, 2018
By: Iselin
2880

Networking part 2 DNS DHCP MAC
Networking Part 2 DNS “The human name of IP addresses” Allows the computer to translate human names to IP addresses In order to make it easier to browse the web more efficiently, we translate our destination addresses to Domain Names. 172.217.20.46 is the address for www.google.com for instance, but they both represent the same destination. This is just to make it easier to remember web pages. It operates on port 53:TCP/UDP .com ← root domain (.org, .net .no .us) goog ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 23, 2018
By: Iselin
3989

Networking Part 1 IP Default gateway APIPA
Networking Part 1 IP Addresses “The virtual name and address of a device” IP addresses are logical addresses that are used for identifying devices on a network. IP addresses can be found where devices are connected to a network. For example, a phone, a computer, a router or a switch. It can either be static (Manually set and can not be changed automatically) or dynamic (automatically assigned by a DHCP). We have two versions of IP addresses called IPv4 and IPv6. IPv4 IPv ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 21, 2018
4828

By: Tatianna
This blog is sponsored by Thycotic Cybersecurity has again been a major focus in the past year as the compromise of elections and voting machines is on the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 13, 2018
9376

By: Vikrant Saran
VMware is one of the most in-demand technologies in virtualization and cloud computing sphere. Owing to its rising demand in the IT industry and other enterprises, jobs in virtualization is very high. VMware provides an excellent feature to the users. As cloud computing and virtualization has solved many issues of an organization with an ease ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 9, 2018
By:
8871

Passwords Aren’t Enough: History of Passwords, Malware and More
Passwords are secure keys that we have to remember to access some document securely, online or offline. Sometimes they may be the only obstacle between a hacker and you. Today, password security is employed by all major sites across the internet and even in the local accounts of your PC, Laptop or Phones. Although there are many methods of cracking a password being developed every day, all of these squares down to two basic types: Brute-Force Dictionary There is also anoth ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel