Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

November 30, 2018
By: Vikrant Saran
5864

Is the CISSP Certification Worth it?
CISSP is considered as Internationally acknowledged benchmark for the information security professional. From the past two decades, it has gone through the test of times and proved its mettle. Stands for Certified Information Systems Security Professional and is expected to take a great deal of time and efforts from the aspirants by studying CBK – Common Body of Knowledge and completing other training to gain sufficient professional expertise and finally pass the exam. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 30, 2018
10364

By: Joshua Sodaghar
Open Source Intelligence (OSINT) is defined as intelligence collected from publicly available sources. In the intelligence community, the term “open” refers to overt, publicly available sources; it is not related to open-source software or public intelligence. This form of gathering and analysis of information is crucial to underst ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 29, 2018
3150

By: manishbhickta26
With the increase in data loss occurrences, there is a massive demand for data recovery solutions. In the world of internet, the supply of information is often surplus than needed. However, a large number of solutions and fixes on the internet—that promises to restore data and fix most drive issues—consists of myths; Myths that can perma ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 28, 2018
By: Yeridani
4120

Web Application Firewall
The new age security growing under different aspects, the spotlight are direct now to the Web Application Firewall (or WAF) filters for monitors, and blocks HTTP traffic to and from a web application, the proliferation of web application and the pervasiveness of mobile technology make web-based attacks even more attractive and even easier to launch and Web Application Firewall (WAF) is an intermediate tool between web server and users that provides comprehensive prote ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 27, 2018
By:
3302

Security in the Cloud
Cloud computing is not a new concept. Many companies are already knee deep in Cloud, it is generally presented as the next logical move, particularly to replace an organization’s Infrastructure. It’s also good for tech startups as it cuts out a cost on infrastructure in the early stages. The benefits of cloud are well known, however, this article explores the issues of cloud from a Security perspective. We try and present issues that are not well documented, and then ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 26, 2018
2057

By: Vikrant Saran
So, you always want to pursue Microsoft training and attain the certification; however, lack opportunities to enroll in one hinder your way. Now, with Microsoft official on-demand training can be a boon for you. This is the right method to fulfill all your upskilling goals. Get all the benefits of Microsoft Official Training at one place wi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 26, 2018
1558

By:
Imagine you wake up one morning and see the screen below on your PC. You press every button, turn it off and on again, and the screen remains the same. Yes, maybe you would want to cry! Guess that’s where the name came from…This is exactly what happened to Apple’s iPhone processor supplier. Taiwan Semiconductor Manufacturing Co. (TSMC) ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 24, 2018
By: Iselin
2954

Networking part 2 DNS DHCP MAC
Networking Part 2 DNS “The human name of IP addresses” Allows the computer to translate human names to IP addresses In order to make it easier to browse the web more efficiently, we translate our destination addresses to Domain Names. 172.217.20.46 is the address for www.google.com for instance, but they both represent the same destination. This is just to make it easier to remember web pages. It operates on port 53:TCP/UDP .com ← root domain (.org, .net .no .us) goog ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel