Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews, official Cybrary posts, and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

December 18, 2018
By: predictorx
3069

Relevance of Simple Predictive Models
Simple Predictive Models: Despite the explosion of interest in complex predictive models such as SVN (Subversion, i.e. version control system), random forests and deep learning, much benefit may be derived from relatively simple models such as linear or logistic regression and simple (bivariate) curve-fitting. Simple models are easy to construct (linear models have been a part of spreadsheet software such as Excel for years), explain, and justify. Further, not every business ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 18, 2018
5074

By: hempelge
TLS (Transport Layer Security) was developed as a descendant of SSL in order to provide a secure channel between two communicating peers (i.e., web browsers and servers). The main intent of TLS is to authenticate peers, prevent eavesdropping, and tamper-proof communications by validating the authenticity of messages. The protocol aims to auth ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 17, 2018
13201

By: ginasilvertree
According to the careertech.org website, “A career-ready person effectively navigates pathways that connect education and employment to achieve a fulfilling, financially-secure and successful career.” This site also notes that a career is more than just a job and career readiness has no defined endpoint. Further, to be career ready in an ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 6, 2018
By: Iselin
9085

Networking Part 4: Convergence, STP, Switching Loops, NAT & PAT
Convergence «When settings are synchronized in a network» When all routers in the same internetwork have same topology and information, having caught up with each others.  Routing tables and the most useful paths are being exchanged along with other information. Also known as the Network routing «Nirvana». Switching loops «When loops form and can eventually shut down our network» A Switching loop or bridge loop occurs when a device is being sent a packet and it broadc ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 5, 2018
By: robinshanab
6660

Microsoft Excel Recovery Software – Your Top 5 Vetted Options
Summary: Despite working with one of the most widely used spreadsheet software, the users of Microsoft Excel face troubles such as frequent corruption and excel file damage. Thus, it is a must to backup the files regularly and also keeps tabs on the latest and most efficient Excel recovery software available in the market for disaster situations. The millions of people worldwide use Microsoft Excel to perform to perform tasks such as storing information in an organized manne ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 5, 2018
11725

By: Iselin
Routing Metrics “Qualities used to determine best path” • Hop count: how many other routers does a signal need to pass? • Maximum Transmission Unit (MTU): The maximum size of a single packet we can send. Bandwidth and ports limit how much data can be pushed through • Casts: reliability, Roundtrip, cost etc. • Latency: The amount o ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
December 4, 2018
7644

By: Joe (Research Director)
Just the Facts Monday night (for me, I’m in England at the moment), the question/answer site Quora.com reported a data breach potentially affecting 100 million accounts (for those who read my last article, this is about a 1.5 on the Thriller scale). According to their release, the following information was obtained by attackers: Name ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
November 30, 2018
By: Joe (Research Director)
5490

Marriott Reports the Loss of 500 Million Customer Records in Massive Data Breach
Good news Dell! You are no longer the cybersecurity nightmare of the week. Bad news 500 million people! You are now the victims of a truly magnificent data breach.   First, just the facts. On 30 November, 2018, Marriott International issued a press release informing the world that they had discovered a data breach affecting up to 500 million customers. The release contained the following salient details:   On 8 September, 2018, an internal security tool began issuing ale ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should accessible for everyone, everywhere. Everyone deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is the world's largest community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel