Enjoy 0P3N?
Share now!
Facebook
Twitter
Google+
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

January 12, 2019
By:
2665

CompTIA Security+: The Gateway to Security Certifications
This article originally published on the Bellevue University Cybersecurity blog by the current author and instructor of Cybrary’s Security+ course, Ron Woerner. One of the greatest hindrances to mitigating cybercrime is the lack of qualified and skilled professionals trained in cybersecurity. Cybersecurity is a rising career field with a need for more security professionals in all industries and types of organizations. One of the greatest hindrances to mitigating cyber ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 11, 2019
2666

By: Shaquib Izhar
Web App Pentesting: Tools and Techniques for Web Security Auditing   Every pentester has his own tools and techniques for web app security auditing. Sometimes it depends on the type of website being pentested. Here, we’ll explore some common tools and techniques that can help us audit web application security.     D ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 10, 2019
1982

By: hvigil48
The world of cybersecurity has changed drastically over the past several years and will continue to do so in the years ahead.  As cyber threat continues to grow in complexity and in numbers, organizations are faced with the new challenge of having to defend their cybersecurity programs.  This is a relatively new threat in the cybersecurit ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 3, 2019
By: Iselin
6048

Networking Part 8: Signals, Frequencies, & Interference
Frequencies, Interference, Signal Strength, Bounce, Channel Bonding Frequency Bands & channels A frequency band is a range of frequency that is divided into multiple channels Frequency bands are most commonly found as 2.4 GHz and 5GHz. When you change from channel 1 to 5, you gradually increase the wave of frequencies you’re sending information on. 2.4GHz Channel 1 à 2.412 GHz 2.4GHz Channel 6 à 2.437 GHz Countries apply their own regulations to the allowable chan ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 2, 2019
By:
7136

How to get your dream job in IT or Cyber Security
Your dream job in IT or Cyber Security could be right around the corner… It seems like only yesterday I was getting out of the active duty Army and frantically searching through job sites, drafting my resumes, and signing up for every mailing list, job placement service, job board, etc. There are so many things I know now that I wish I had known then and could have saved 2013 me so much heartache and frustration. The military provides a service called the Transition As ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 2, 2019
4614

By: TONY
Human factor remains one of the weakest links in maintaining proper cyber-hygiene in an enterprise. Unfortunately addressing risks posed by humans via training and retraining is often sacrificed on the altar of acquiring fancy security tools… don’t get me wrong, there is nothing wrong with acquiring security tools excepting that they cann ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
January 1, 2019
4467

By: Priyank Gada
Introduction So in the previous few articles, we have been talking about 5G and we know a lot about 5G. We have also talked a lot about communication standards and their evolution, we know a lot about 5G – 5G NR and now let’s check if our current devices are 5G supported and can you enjoy 5G on your current smartphone. 5G Chipsets and Sma ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email
December 31, 2018
By: ginasilvertree
2778

Resumes and Cover Letters: 7 Tips for Building Strong Resumes and Cover Letters
Writing strong resumes and cover letters may not be as hard as you think. With a plethora of free templates and tools out in the world, there’s no need to start from ground zero. Choose simple templates (see more on keeping things simple below) from a trusted site and start working on your resume and cover letters today. And follow these seven tips to add strength and finesse to your documents. Let’s get started! #7 – Make Your Contact Information Easy to Find When com ...
  • Facebook
  • Twitter
  • Google+
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel