Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

October 23, 2019
By: SLWelty
2173

Our World in Transition and Our Future Demands
This blog was originally posted on Cisco Security Blog by author John Stewart. Reposted with permission. October is Cybersecurity Awareness Month and for me, it’s a time to reflect on where we’ve been and how far we’ve come, study the trends and challenges we face today, and look ahead to the next generation of opportunities facing not only the security community but society at large. In my more than 30 years in the security industry, it’s been interesting to see how ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 23, 2019
1314

By: techalphy
“I was working with Outlook and noticed that more than half of the storage space is consumed. So, I decided to delete a few emails. While deleting emails, I accidentally deleted some important emails. Now, I want to know how can I recover purged emails in Outlook 2016 account. Is there any easy way to retrieve purged emails from Outlook acc ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 22, 2019
1215

By: jasminen
> Education/Experience in Cyber Security: “Doctorate of Business Administration, ​Marketing Concentration,​ North Central University, San Diego, California Masters of Science in Interactive Media & Communications​, Quinnipiac University, Hamden, Connecticut Bachelors of Science in Information Systems​, The University of ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 21, 2019
By: Corey Holzer, Ph.D. CISSP
976

How to Use the Right Tool for the Job
In the introduction for the Intro to SQL course, Instructor Kitt Parker describes his experience with programming languages like C++, Python, etc. Instructor Parker explains how working with databases will usually bring a developer back to the database manager’s structured query language or SQL. While working on the course’s study guide, his discussion reminded me of a personal experience with PHP and SQL. This illustrates his point and reinforces the adage “Use the ri ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 20, 2019
By: David Balaban
1426

Practical Security: A Story About Patch Management
Probably, all SOC (security operations center) analysts are dreaming of seeing their detecting rules identify and block the sophisticated techniques of pro-government APT groups, and investigations lead to the discovery of exploits that use zero-day vulnerabilities. Start FREE Virtualization Management Course >> Unfortunately (or fortunately), the majority of incidents are much less romantic: again and again. Attackers try to use non-renamed PsExec for malware distribution. ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 19, 2019
1526

By: jasminen
> Interests in Cyber Security: “I am very interested in cybersecurity because cybersecurity involves not only businesses and governments. Your computer, tablet, and phone may contain information that hackers and other criminals want to have, such as the email address, name, and date of birth of others. Anything that relies on the In ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 18, 2019
1403

By: SLWelty
This blog was posted by Thycotic Security. National Cybersecurity Awareness Month is in full swing! As champions, we’re committed to helping you stay cyber safe this month and all year round. So, we’ve pulled together some tips to keep you cyber aware. Strong Passwords: The Foundation of your Personal Cyber Security Strategy Passwords are ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
October 16, 2019
By: Chang Tan Lister
2496

5 Useful Methods of Using a Double TCP-to-Reverse-SSH Tunnel
Throughout the day, I had some infuriating internet outages that forced me to create persistent ssh tunnels with autossh (Linux only), so I can get my tunneled connection back when Cox goes back up. We are covering 5 different ways to use a double TCP-to-Reverse-SSH tunnel productively:   Remote Access To A Linux Machine at Home Remote Access To Your Nessus Web Application Scanner Remote Access To A Windows 10 Password Cracking Machine Diagnosing ISP outages Controllin ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge

 

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel