Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 26, 2018
By: Iselin
3490

Networking Part 6: VLAN Port Configuration, Port Filtering, Filtering Criteria & VTP
Networking Part 6 VLAN & Port Configuration, VLAN & Port Filtering, VLAN Filtering Criteria & VTP Virtual Local Area Network Our virtual segment of the network within an already made LAN A VLAN allows us to take the infrastructure for one local area network and make multiple virtual local networks. These help us to segment different broadcast domains which operate in the data link layer. It’s important to take note that different VLANs can’t talk to each othe ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 25, 2018
1800

By: ram
Keyboard Kata While you may not able to type well, one thing that can make you more productive  is using keyboard shortcuts. I’m a Windows user, and these shortcuts apply to Microsoft products. (This leaves an opportunity for another Cybrarian will make a post about other OSs.) First, I’ll give several shortcuts that I use a who ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 25, 2018
1989

By: snrtherock
Hi, In this article, you can see the listed basic checklist to start with the Web Application Testing. There is lot more vulnerabilities are there and those will be updated in the future post. Here are the basic Web Application Vulnerability checklist for absolute beginners. Click-jacking Plain-text communication Password Hashing Email Addr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 25, 2018
By: Veselina Dzhingarova
2419

Networking and Security in the Cloud Computing Era: How to Get Started
Cloud computing has really changed the way businesses do a lot of things. Instead of relying on on-site physical servers and internal networking, corporations can now have more cloud storage space and computing power. The lack of steep initial investment makes cloud computing more accessible to small and medium enterprises too. The move to cloud computing also poses a number of new challenges to tackle. Businesses need to adjust the way they handle networking and information ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 24, 2018
By: Iselin
1160

Networking part 5 Protocols & Transmission
Protocols & Transmission User Datagram Protocol Transporting packages from one place to another like a stream of water. UDP is a transmission protocol that doesn’t check if the data got there- it is a connectionless protocol. UDP does not offer validation or any verification of data packets, which makes it very vulnerable to data corruption. This means that it’s very necessary that the packets sizes/byte indexes are small and that they have to make sense in the right ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 21, 2018
17774

By: ginasilvertree
If you’re new to the world of cyber security, you may be wondering what the “2019 (and beyond)” job outlook holds. Or, if you’ve been in the cyber security space for a few years, you might also be wondering could be down the road of your career path. After all, who doesn’t want to know what the future has in store regarding ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 20, 2018
7749

By: jwhite2018
As an assistant mentor on Cybrary, I get asked a lot “how much Linux do I need to study security?” What I really hear is “Hey, I get it: more is better, but do I really need to be a deeply skilled/certified  Linux admin with years of hands-on experience before I can even start on my Security+ or the CEH?” In othe ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 19, 2018
By: Iselin
3591

Staying Safe Online
Understanding the internet In order to make something safe and secure, one needs to be aware of the threats. In this article I will explain my personalized steps to greatly increase your online security. Passwords This cannot be mentioned enough. The very first thing we do after installing a system on a platform is to create a good and strong password. We need a barrier to keep intruders out from systems they are not supposed to be on. So how do I make a good one? Well, the ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel