Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

July 31, 2018
By: Ugra Narayan Pandey
4616

CASB Benefits in the Digital World in 2018
A security gateway is established between an organizational infrastructure and a cloud service provider. The name of this gateway is the cloud access security broker or CASB. Enterprises adopt CASB benefits to expand their policies of IT governance and comply with regulations to third-party storage and applications. There is a need for CASB cloud services if you have the following serious concerns or responsibilities: External as well as internal security threats Monitoring ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 30, 2018
6446

By: justin hansen
Are you a user of SQL Server 2008 or SQL Server 2008 R2? Are you planning to migrate to Amazon RDS as soon as Microsoft ends support for these SQL Server versions? Read this post, as you will learn two different ways to migrate from SQL Server 2008 to Amazon RDS. Microsoft will be stopping extended support for SQL Server 2008 and SQL Server 20 ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 29, 2018
6862

By: Terumo
If someone you don’t know approached you on the street and asked for your address, social security number, or ID number, would you give it? Since we consider it “personal” and a “huge violation of our privacy,” you probably wouldn’t, but since we don’t think our email has the same value as a social security number or ID n ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 28, 2018
By: bjacharya
3864

Cryptocurrency Lesson 2: Blockchain Types and Applications
A warm welcome to Lesson 2 of this Cryptocurrency mini-series. I hope that you’ve already seen my OP3N content of Lesson 1 on Cryptocurrency here. In lesson 1, there were some basics on Blockchain already mentioned. So, read that first. Now, let’s move with new content. In this lesson, I will introduce you to some basics of Blockchain, how it works, its types and where blockchain is used in today’s world. Blockchains Blockchains are Decentralized/Distributed ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 28, 2018
By: dks11
5456

Understanding Malware
Introduction Malware continues to be an issue with today’s ever-evolving technology.  It plagues everyone, from new users to advanced users; everyone can be affected by malware. The name comes from the words “malicious” and “software,” hence malware.  Many different forms of malware exist and target many different aspects of a system. Such types include  Viruses  Worms Trojans Rootkits Ransomware Backdoors Keyloggers  Adware  and many many ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 27, 2018
5662

By: dnieves
Welcome to hacking Windows 10 Home profiles! This walkthrough only applies to Win10 Home without any encryption software. Encryption software like Bitlocker or Bitcrypt will block this capability. Win10 Pro Edition without encryption software or on a domain may work, but it hasn’t been attempted yet. These issues don’t come up ofte ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 25, 2018
6734

By: Dr. Michael J. Garbade
The digital space has, in recent times, experienced an increase in the number of threats that have led to fraudulent activities. Scammers and hackers usually prey on gullible individuals, swindling them of their hard-earned money as they make vendor payments or online investments. Sunil Kumar, who is an experienced cybersecurity analyst and cu ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
July 24, 2018
By: Sean Mancini
4555

What are Linux Runlevels?
Linux and Unix utilize runlevels to enable certain functionalities from single user mode to GUI mode. These runlevels cater to different needs for system administrators and for troubleshooting. You can set a default runlevel to, say, boot the CLI instead of the GUI. On servers, you generally would use Runlevel 3, which is the multi-user mode that only gives you access to the GUI. But if you want to use the GUI, then you can raise your runlevel to Runlevel 5, which will enable ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel