Infosec IQ Training & Awareness Content Library
Our massive library of industry- and role-based training resources is updated weekly, helping you deliver fresh, relevant training to every member of your organization no matter the style and tone you need. Preview our range of content types or explore the entire library below.
Social Engineering Defenses
This brief video shows you how to recognize and prevent social engineering attacks.
The Art of Cyber War: Cyber Security
The threat of cyberattack is real, it’s everyone’s responsibility to learn more about cyber protection.
A Few Extra Seconds (Lock Screens)
Why you should use lock screens on your devices.
WORKed Episode 11: Eagle Eye
Keep your head on a swivel and your screen down. Teach your employees to watch out for shoulder surfing in this WORKed training module.
This brief video covers the appropriate methods for installing and licensing software.
One Person’s Trash… (Dumpster Diving)
This mini movie covers the consequences of failing to shred, burn, or properly dispose of sensitive physical documents.
This animated module covers the risks involved in oversharing information on social media.
This module covers best practices for serialization - the process of turning data objects into binary streams of data.
Insufficient Logging and Monitoring
It is imperative that server administrators maintain robust logs of activity on their servers. This module covers the risks associated with improper monitoring.
XML External Entitites (XXE)
This lesson covers how XXE attacks are executed, and how to prevent those attacks on your applications.
How to browse the web safely.
Lost and Found (Encryption)
Why you should use encryption in sensitive environments.
HIPAA Minimum Necessary Standard
This brief video extrapolates on how many people are authorized to access one person's health records.
This video shows the importance of formulating and implementing organizational policy regarding PHI.
Consequences of PHI Release
This brief video walks the learner through the possible consequences of a PHI breach at your organization.
This interactive module discusses security risks related to Internet of Things (IoT), how connected devices may be attacked, and steps for safe use of IoT.
This video explains Protected Health Information (PHI) and provides examples of individually identifiable health information.
This micro-learning module presents the concept of two-factor authentication in a delicious way!