Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

January 18, 2019
By: Michael_AU
3357

My IT Learning Journey
So, here it is my first Cybrary post. The purpose of this is to document my learning journey but first some background for anyone who is interested. I am an automotive technician (fancy name for motor mechanic) by trade and a teacher (K-12 + VET) by profession. I’ve had many different types of jobs but being a mechanic and a teacher are the main two. Ever since the early 1990s and Windows 3.1, I’ve been interested in computers but never actually obtained any cert ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 18, 2019
2559

By: dks11
Today, everything, and everyone is digital. From the young teens all having the newest smartphone, to just about everything (including refrigerators and baby monitors…) being connected in the IOT (internet of things), technology is ruling our lives and connecting it and every little way. The IOT The IOT alone is a vast network connecting va ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 17, 2019
2924

By: Vikrant Saran
Project management is the process of planning, managing and executing the required work in a specified time to achieve the organizational goals. There are certain guidelines that one would need for the successful completion and execution of a project. Working as per the deadlines, managing the resources and organizing the tasks at every stage ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 16, 2019
By: Falko
1931

Security with Host-based Intrusion Detection System (HIDS)
I’ve been thinking for some time what topic could be interesting for you (the general Cybrary population) out there. After a few days I decided to introduce you one of my favorite tools. I’ll tell you a few words about Host-based Intrusion Detection System named OSSEC. What is HIDS? Maybe you are already familiar with NIDS (Network-based intrusion detection system) which is much easier to find in companies. NIDS is a system for monitoring, analyzing and securing ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 15, 2019
By: Vikrant Saran
1675

Growing Importance of VMware Certifications in 2019
VMware is one such technology which has gained immense popularity in the current times. And the coming year is going to create more opportunities for the people who have virtualizations skills in their resume. A few years ago a business growth would directly mean more investment and more hardware units put together; however, after the onset of virtualization technologies and the possibility of virtual infrastructure and networking, more and more enterprises are going virtual ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 14, 2019
2073

By: emaragkos
“Start playing CTFs now!” is what I wish someone has told me a few years ago! In this article I present you 7 reasons why you should start playing CTFs right now. If you are not familiar with CTFs the following articles will help you. What the heck is a Capture the flag (CTF)? CTF Categories The history of CTFs 1) Explore a whole ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 14, 2019
1703

By:
Computer forensics is of much relevance in today’s world. Though forensic analysis refers to searching and analyzing information to aid the process of finding evidence for a trial, computer forensic analysis is specially focussed on detecting malware. Computer forensic analysis tools help detect unknown, malicious threats across devices and ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 14, 2019
By: ginasilvertree
1555

Career Networking Online: 4 Steps to Improve Your IT/Cyber Security LinkedIn Profile
We know you’re busy studying on Cybrary and maybe working, raising a family, doing laundry, and watching last season’s Game of Thrones episodes. However, if you’re looking for a job (which many Cybrary students are), it’s important to carve out a little time this week to update and improve your LinkedIn profile. To respect to your busy-ness, we’ve put together a list of 4 steps you can easily apply this week to beef up your profile and stand out from the crowd a bi ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel