Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

April 24, 2019
By: Cad3lyst
4453

Steps I Took to Pass the CompTIA Security+ Exam
Introduction Hello friends. I wanted to share about my recent passing of the CompTIA Security+ exam and what I did in preparation. But before I do, I want to share some of my background to give you an idea of where I was coming from: I had approximately 2 years of IT work experience with about 1 year of that passively learning Cybersecurity through other learning platforms before starting the Cybrary SOC Analyst path in the fall of 2018. I only completed a few items in that ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 10, 2019
10845

By:
This blog originally appeared on the Cisco Security Blog Original Author : Ben Nahorney You may think that cybercrime takes place in hidden corners of the Internet, where the malicious actors lurk in dark web forums and utilize heavily encrypted networks that require complicated software and extensive authorizations just to access. Unfortuna ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 9, 2019
20492

By: WhiteHat4Ever
Malicious Tactics The purpose of this white paper is to increase awareness of malware and apply emphasis on recommended mitigation strategies and prevention of future attacks. Since malware is becoming an increasingly vast subject, the white paper addresses various types and gives details on many malware-related topics. What is malware? Ma ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 6, 2019
By: Vikrant Saran
9456

5 Basic Principles of Project Management that every project manager must know
Although there are some unique methods and patterns in which project managers work; however, across the globe, project managers are united by the principles that they follow in the projects they handle. Although, the nitty-gritty may differ; however, the basics or the fundamental principles remain the same. If you are a project manager or aspiring to be one and facing a myriad of issues in a new job role or unique challenges in the same role, you must be aware of the key pr ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 5, 2019
By: Dra4hos7
10215

Reverse Engineering for Beginners: Basic Programming Concepts
In this article we will look under the hood of the software. Newbies in reverse engineering will get a general idea of ​​the software research process itself, the general principles of building code, and how to read assembly code. Note The program code for this article is compiled using Microsoft Visual Studio 2015, so some features in newer versions may be used differently. IDA Pro is used as a disassembler. Andinitializing variables Variables – one of the main ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
April 2, 2019
5479

By:
Without a doubt, data is everywhere around us and we are always putting in an effort to increase the path as the world is interacting and improving more with the internet. Most of the industries have these days come to the conclusion that all the power behind data as well as understanding how it can improve as well as change not just how we d ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 29, 2019
6323

By:
Article posted courtesy of : Thycotic 1. Take the human element out of the equation whenever you can – Use a password manager that doesn’t require a user to remember their password to login to sensitive systems. 2. Remove unnecessary password rotations – I’m going to have to side with the NIST’s proposed password security policy ch ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 28, 2019
By: lowebrew
5664

The Hacker’s Workflow
The Hacker Workflow Cybersecurity professionals are outwitted all the time, resulting in breaches, data leaks, downtime, etc. Utilizing their tools, processes, and products help remediate and manage the threat of the hacker. However, it takes more, but what is that “more”? Education on best practices, hardening methods, and understanding of threats in the wild is a start. But what about getting inside the mind and workflow of a hacker? The Cyber kill chain, developed by ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel