Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Data Loss Prevention Training: Core Concepts for Effective Protection

Essential Travel Security Training: What You Need to Know

CJIS Policy Dissemination and Destruction Procedure: A Comprehensive Guide

Core Concepts of HIPAA: Key Principles and Best Practices

Core Concepts Ransomware Training: Understanding the Fundamentals

Core Concepts: Incident Response

Core Concepts: Multi-factor Authentication

Core Concepts: PPRA

CSAM Cyber Security Training: Your Path to Stronger Cybersecurity Awareness

OWASP A3 - Sensitive Data Exposure

Core Concepts Data Destruction Training: Key Principles for Secure Data Disposal

Core Concepts: How to Report Phishing Emails

Cybersecurity for Educators: Essential Guide to Protecting Your Digital Classroom

Core Concepts Cloud Security: Essential Principles for Protecting Your Data

Core Concepts Malware Training: Essential Learning for Cybersecurity

Core Concepts: Physical Security

Core Concepts: QR Code Security

OWASP A10 - Insufficient Logging and Monitoring

OWASP A6 - Security Misconfiguration

PCI DSS Systems: Protecting Networks and Securing Critical Systems

PCI DSS: Access Control

Core Concepts GDPR: Key Principles and Best Practices

Core Concepts: CIPA

Core Concepts: Insider Threats