Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 13, 2018
By: Devendra
8164

Ultimate Guide to Getting a VMware Engineer Job
VMware is one of the most in-demand technologies in virtualization and cloud computing sphere. Owing to its rising demand in the IT industry and other enterprises, jobs in virtualization is very high. VMware provides an excellent feature to the users. As cloud computing and virtualization has solved many issues of an organization with an ease. One of the topmost demand is seen in salaries. The pay is hefty for people who are experienced in virtualization. In terms of salary ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 9, 2018
8386

By:
Passwords are secure keys that we have to remember to access some document securely, online or offline. Sometimes they may be the only obstacle between a hacker and you. Today, password security is employed by all major sites across the internet and even in the local accounts of your PC, Laptop or Phones. Although there are many methods of cr ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
November 6, 2018
10195

By: Ace
Using NMAP to identify OS and services on the vulnerable machine (Windows 2000 server) Nmap is a free and open source for network discovery and security auditing. Firstly we have to setup the virtual environments of vulnerable machine (Windows 2000) and kali Linux on the VM virtual box. And we have to set their IP’s as in a same network ran ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 24, 2018
By: kumarsandeep43
13967

Outlook Internal Error Message?
MS Outlook Shows Error Message Internal Error Code= 0000000E MS Outlook has two types of data files OST and PST. While PST is stored online on server the OST or (Offline Storage Table) is stored on the local computer which is a replica of PST. Both are important for smooth functioning of MS Outlook. Problem in OST can harm PST file too at time of synchronization, so immediate action should be taken to repair Outlook OST file. Common error thrown by Outlook OST is “Internal ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 23, 2018
By: masjter_ZA
15488

Linux Basics Terminal Commands
“Terminal commands” Terminal commands: Command Line Interface What is a command? A command is a software program that when executed on the CLI (command line interface) in the terminal, performs an action on the computer. When you type in a command, a process is run by the operating system that can read input, manipulate data and produce output. A command runs a process on the operating system, which then causes the computer to perform a job. NB: Commands are CA ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 23, 2018
8990

By: cynosurekp
It’s just Fake News… If you are a person who follows news from social media as most people do, you are exposed to a daily dose of Fake News. Fake News, misinformation, junk, deliberately distributed deception and (the newest addition) “fake memes” are various names given to contrived material that is presented to be factually ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 11, 2018
17756

By:
Content originally published on my Medium blog. Cyber Liability insurance is often referred to as the Wild Wild West of insurance, mainly because the forms and coverages differ so greatly from one to the next. It’s incredibly difficult for owners and c-level executives to differentiate one policy from the next and frequently their broker is ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
October 11, 2018
By: abrockwa
7033

Expansion on Data Privacy and Protection Laws (CCSK Prep)
Authored in partnership with Raj Dhaliwal, Juris Doctor. Introduction While studying for the Certificate of Cloud Security Knowledge (CCSK), offered by the Cloud Security Alliance (CSA), one of the main domains of focus is “Legal Issues: Contracts and Electronic Discovery,” which includes international law and breach disclosure laws. The CCSKv4 exam itself does not lean very heavily on this specific section (and especially not the details in this article), however, it is ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel