Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 26, 2019
By: R Marthon
1451

Pass the Cisco CCNA Security 300-209 Exam
Cisco 300-209 is a test that will assess your knowledge of the implementation of Cisco Secure Mobility Solutions (SIMOS) in many different virtual private networks (VPNs) offered by the Cisco IOS and Cisco ASA platforms. Having a Cisco certification can be very beneficial, as many hiring agents use these certifications to find an appropriate candidate. If you obtain this credential, you will express your level of technical information. Did you know that many appoint managers ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 25, 2019
1754

By: Solene Gabellec
This blog was originally posted on Knogin blog by author Anna Codina. Reposted with permission. (By the way! If you’d like to keep a hard copy of this guide, you can also download the Ultimate Cybersecurity Quick Guide for Students for ease of use.)   Different Ways You Could be Compromised In the digital world, data is the most va ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 24, 2019
1798

By: gagan1999
Kali Linux1 is a Debian-based Linux distribution. Which is meant to advance Penetration Testing and Security Auditing. Kali has hundreds of tools that are meant for various information security tasks. For example, Penetration Testing, Security research, Computer Forensics, and Reverse Engineering. Kali Linux is developed, funded, and maintain ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2019
By: SLWelty
1797

Our World in Transition and Our Future Demands
This blog was originally posted on Cisco Security Blog by author John Stewart. Reposted with permission. October is Cybersecurity Awareness Month and for me, it’s a time to reflect on where we’ve been and how far we’ve come, study the trends and challenges we face today, and look ahead to the next generation of opportunities facing not only the security community but society at large. In my more than 30 years in the security industry, it’s been interesting to see how ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2019
By: techalphy
1158

How to Recover Purged Emails from Outlook 2016 / 2013 PST File
“I was working with Outlook and noticed that more than half of the storage space is consumed. So, I decided to delete a few emails. While deleting emails, I accidentally deleted some important emails. Now, I want to know how can I recover purged emails in Outlook 2016 account. Is there any easy way to retrieve purged emails from Outlook account back. Please suggest me a trustworthy and instant way to implement the task.” Begin FREE Intro to IT and Cybersecurity Course > ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 22, 2019
1178

By: jasminen
> Education/Experience in Cyber Security: “Doctorate of Business Administration, ​Marketing Concentration,​ North Central University, San Diego, California Masters of Science in Interactive Media & Communications​, Quinnipiac University, Hamden, Connecticut Bachelors of Science in Information Systems​, The University of ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 21, 2019
936

By: Corey Holzer, Ph.D. CISSP
In the introduction for the Intro to SQL course, Instructor Kitt Parker describes his experience with programming languages like C++, Python, etc. Instructor Parker explains how working with databases will usually bring a developer back to the database manager’s structured query language or SQL. While working on the course’s study guide, ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 20, 2019
By: David Balaban
1365

Practical Security: A Story About Patch Management
Probably, all SOC (security operations center) analysts are dreaming of seeing their detecting rules identify and block the sophisticated techniques of pro-government APT groups, and investigations lead to the discovery of exploits that use zero-day vulnerabilities. Start FREE Virtualization Management Course >> Unfortunately (or fortunately), the majority of incidents are much less romantic: again and again. Attackers try to use non-renamed PsExec for malware distribution. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

Cybrary|0P3N

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel