Enjoy 0P3N?
Share now!
Facebook
Twitter
LinkedIn
Email

Cybrary’s Open Blog is a user contributed cyber security knowledge base that brings together content highlighting the latest tools, exploits, technologies and insights in the industry.
 
Featuring tutorials, op-eds, research papers, user guides, cheat sheets, product reviews and more; The Open Blog provides the cyber security community a growing resource of content that can help professionals at all levels in their careers.


Submit to 0P3N

Cybrary | 0P3N

February 28, 2019
By: Iselin
3006

What Is Machine Learning?
Machine learning- Data mining, optimization, statistics, algorithms, limitations, and software… Wait, a machine that learns? That’s correct. Machine learning is the science behind making computers act like humans and learn norms or rules based on data! In-depth, Machine Learning uses mathematical algorithms to parse data, learn from it based on certain “averages” and calculations, and then make a determination out of it, depending on a set of rules. Imagine that yo ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 28, 2019
3865

By: Hunterkl5
Back in November of 2017, I graduated from University with a 2:1 in Computer and Information Security. I was looking forward to the prospects of a career in an interesting and continually changing field. However, this was not to be, after discovering that a lot of Graduate opportunities within the UK’s industry that I was applying to we ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 27, 2019
2996

By: Uladzislau Murashka
Today we going to speak about how quickly execute security scanning and assessment of big networks, which tools we will need and in which cases it may be required. In which cases do we need to scan big networks Some compliance’s like PCI DSS or HIPAA may require to execute security scans against huge networks and subnets, including tes ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 27, 2019
By: sambocetta
1152

Why Corporations Need to Give their Employees Personal VPNs
Last year, the Cybersecurity Strategy Report was released by the House Energy and Commerce Committee’s Subcommittee. In a nutshell, the report found that the majority of current IT strategies major corporations are using are not working, and lays out various measures that can be used to strengthen them.   One such measure that was recommended in the report was to ensure that employees and other frequent business travelers travel with the ability to protect their corporate ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 26, 2019
By: TJ009_KD007
1746

Linux Keyboard Shortcuts
Linux Keyboard Shortcuts Linux Keyboard Shortcuts are a must for Linux Enthusiasts and Professionals. However, students studying Linux also could apply these to speed up their work process and understanding of Linux. User wanting to learn shortcuts & key combinations need to know the Pros and Cons first. Pros: Speedup Working Productivity Drastically. Reduce Working Time. Proves Efficient & Effective and comes in handy when Time Deadlines are near. Can be Customized ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 25, 2019
1257

By:
By : Christine Schaefer Notice anything new? At ThreatConnect, our philosophy since our founding has been that we would incorporate intelligence in all aspects of security operations including orchestration and workflow, as functionality within our Platform. We believe (and always have) that an intelligence-led defense benefits organizations ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 25, 2019
1344

By: Devansh Bordia
 Scanning is a process of actively gathering information about the target with the intent of determining the various services, process, open ports, a live host, Os, version running on the system. This phase involves sending specially crafted packets to the victim in order to know insights about the system environment and configuration.D urin ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email
February 25, 2019
By: Ace
1341

Synchronizer token pattern
In this post let’s discuss about using a synchronizer token pattern to prevent CSRF (CSRF meaning Cross-site request forgery.). Synchronizer token pattern (STP) is a technique where a token, secret and unique value for each request, is embedded by the web application in all HTML forms and verified on the server side.  Then the token is generated by the server with ensuring the uniqueness. In here server generates token per every session. In that case the attacker is un ...
  • Facebook
  • Twitter
  • LinkedIn
  • Email

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel