Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

June 14, 2019
By: David Balaban
5168

Choosing a File Storage System for Team Work
My team works with a big number of media data: video, rendering, photos, illustrations. To ensure the best teamwork, we need constant access to all these files. At some point, we no longer have enough storage place at our own server, and we started looking for cloud storage that satisfies all our needs. In this post, I will compare popular cloud storage services for business: DropBox, Google Drive, Citrix ShareFile, and Microsoft OneDrive. Let’s see our requirements for a ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 14, 2019
5392

By:
This blog originally appeared on the Cisco Security blog. Reposted with permission. There is no question that unwanted email is a source of annoyance. It is also the biggest source of cyber threats. In fact, just last month, spam accounted for 85 percent of all email sent. Plus, according to Verizon’s 2018 Data Breach Investigations Report ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 13, 2019
6073

By: Tapan Jatakia
What is Data Science? ‘The Amalgamation of AI+ML+Big_Data’ would be the sweetest and shortest answer. Formal Definitions: The application of tools, techniques, and methodologies of domains such as algorithms, machine learning, big data, and artificial intelligence in a systematic, disciplined and quantifiable manner which ultimat ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 13, 2019
By: TYEB
4496

Nmap Ndiff and Telegram for red teaming
What is Phactive Phactive is a little script written in bash, it’s to aid in a red team workflow, Since red team is mostly about continuous monitoring and simulation of a real life attack. unlike in Penetration testing where you just have to run a scan and submit a report the explain your findings, which can be accomplished with a short time missing out new risks and vulnerabilities. For example: During a penetration testing you can run an Nmap scan on port “22 ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 12, 2019
By: Vikrant Saran
1319

AWS Solutions Architect Certification Preparation, Salary, Skills & benefits: An Ultim ...
AWS Certified Solutions Architect career path is highly in-demand among IT professionals seeking a career in cloud and virtualization. Owing to its widespread demand among IT hiring managers, every IT professional wants to tread the path that AWS covers through the services and resources provided by Amazon services in breadth. Before we embark upon the informational journey of Amazon’s Solutions Architect features. Let us find out the role and responsibilities of Solutions ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 12, 2019
891

By: kunalgupta007
Now days we are dealing with lots of Security Incidents (which is Violation of Security Policy) and to deal with them we must follow some guidelines to address such security incident, here we will discuss Incident Response lifecycle that we (I am a Incident Handler) follow. You will have idea about what do we do in an overview perspective ins ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 12, 2019
610

By: limor2019
If you’re one of the few who haven’t yet tried out container orchestration, you might be new to the Kubernetes architecture. “Kubernetes is a portable, extensible open-source platform for managing containerized workloads and services, that facilitates both declarative configuration and automation.” Kubernetes, also popularly known as ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
June 12, 2019
By:
606

How to Ensure Application Security in DevOps: 5 Best Practices
The DevOps methodology empowers development and operations teams to collaborate rather than conflict with each other. Some of the benefits realized from a DevOps approach include more frequent software releases, shorter time to market, and fewer application failures in production. Despite these benefits, the focus on rapid development and compressed development cycles in DevOps acts as a barrier to ensuring watertight application security. The Software Engineering Institute ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel