Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

March 6, 2019
By:
790

How Your Identity is Being Threatened by the Digitalized World
Today, cyber threats are looming larger than physical threats such as terrorism. According to research that was conducted by the Unisys Security Index™ in 2017 this is true for both developed and developing nations. This is because we’re now embracing more digital devices and services in both our work and personal lives. As such, most of us have started wondering what are the latest security threats lurking around Today’s Major Security Threats As we look aroun ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
972

By: Raul Cândido
It may seem like a big leap, perhaps even impossible, for a baker to become a Digital Forensic Specialist. I come from a family of bakery workers, my father and six of his brothers have been confectioners or bakers for over 50 years. Growing up in this nest it was natural that when the time came I would follow my family’s traditional ca ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
552

By: Iselin
The Fourth Industrial Revolution (4IR) is the new wave of technology. From the very beginning back in the 18th centuries in Europe America, all the way to 2019 where the future is now. There is no secret, the world is changing- rapidly. Children get handed devices with code longer than their life’s age and expected to understand how to mana ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
By: [GDT] Brad Davenport
711

Cybrary’s breadth of content, a boon to Dev(Sec)Ops practices
Our Engineers and Devs have learned a great deal during the short time they’ve been afforded access to the multitude of resources housed within the virtual walls of Cybrary Business. Many solution integrators would probably agree, embarking on a voyage into the next generation of IT is an endeavor fraught with paradoxes. If I make the system open, it will be more vulnerable. If I more fully document features, there’s less time for enhancement. If I delay a releas ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
By: farazde
281

Configuring a LAN with DHCP and VLANs – PART II
Ever heard about router on a stick? It literally does not mean that a router should be placed on a stick. It means that a router and switch are connected via a single physical interface configured as 802.1q trunk. The switch has multiple VLANs configured and the router is taking care of the routing between the different VLANs. To make it understand better, the following topology will be considered. There are two objectives: All the hosts in different VLANs should receive ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
273

By:
Applications working on SQL database platform are easy to use but they have risk of data loss because of SQL MDF File. Despite Database Administrator maintains the SQL database it is prone to corruption as it is highly affected by external factors. Operating system errors, abrupt system shutdown and changes made by user affect the SQL databa ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 6, 2019
202

By:
By Richard Arneson, GDT Imagine a world where you come home and toss your car keys, jacket, clothes, wallet, et al., into a bin that would smartly send each to where it belongs—closet, key hook, shoved under the bed, etc. The next morning, when you’re getting ready for the new day, everything is exactly where it should be. No more fishi ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
March 2, 2019
By: farazde
2680

Configuring a LAN with DHCP and VLANs – PART I
While working on things which require time and more practice, sometimes you forget the baby steps you take along the way. That’s what happened when one of my colleagues asked a very simple question. I had to brainstorm different ideas in my mind before I finally had the answer. To explain the idea in a better way, learning by doing is the best approach. My colleague wanted to know how the users on the LAN are assigned an IP Address. He logged onto each device on the networ ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel