Infosec IQ training and awareness content library

Our massive library of industry- and role-based training resources is updated weekly, helping you deliver fresh, relevant training to every member of your organization no matter the style and tone you need. Preview our range of content types or explore the entire library below.

Content Type
Category
Duration
Industry
Role
Content Pack
Subscription Plan
View Results
Filter Results

Social Engineering Defenses

This brief video shows you how to recognize and prevent social engineering attacks.

The Art of Cyber War: Cyber Security

The threat of cyberattack is real, it’s everyone’s responsibility to learn more about cyber protection.

A Few Extra Seconds (Lock Screens)

Why you should use lock screens on your devices.

Need to Know: Conclusion

Take a moment to relax and review what you’ve learned as Anthony takes you through a few simple cybersecurity principles. Congratulations on completing your training!

Software Licensing

This brief video covers the appropriate methods for installing and licensing software.

One Person’s Trash… (Dumpster Diving)

This mini movie covers the consequences of failing to shred, burn, or properly dispose of sensitive physical documents.

Share Responsibly

This animated module covers the risks involved in oversharing information on social media.

Insecure Deserialization

This module covers best practices for serialization - the process of turning data objects into binary streams of data.

Insufficient Logging and Monitoring

It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.

XML External Entitites (XXE)

This lesson covers how XXE attacks are executed, and how to prevent those attacks on your applications.

Safe Harbor

How to browse the web safely.

Lost and Found (Encryption)

Why you should use encryption in sensitive environments.

HIPAA Minimum Necessary Standard

This brief video extrapolates on how many people are authorized to access one person's health records.

PHI Policy

This video shows the importance of formulating and implementing organizational policy regarding PHI.

Consequences of PHI Release

This brief video walks the learner through the possible consequences of a PHI breach at your organization.

IoT Security

This interactive module discusses security risks related to Internet of Things (IoT), how connected devices may be attacked, and steps for safe use of IoT.

PHI Definition

This video explains Protected Health Information (PHI) and provides examples of individually identifiable health information.

Better Together

This micro-learning module presents the concept of two-factor authentication in a delicious way!

Ready to be inspired? Join us in Chicago for Infosec Inspire19

The Infosec IQ user conference designed for you — two days packed with actionable education, industry best practices, IQ sneak peeks and networking.