Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Everything You Need to Know About Privacy by Design

Facts About Removable Media: Everything You Need to Know

Marine Lowlifes: Common Phish

Need to Know for Strong Passwords: Tips for Creating Secure Passwords

Need to Know Malware: What You Should Understand to Stay Protected

Need to Know: Clean Desk Policy

Work Bytes: Password Security Solutions for Enhanced Protection

WORKed Episode 8: Eagle Eye

CJIS Policy Dissemination and Destruction Procedure: A Comprehensive Guide

Core Concepts of HIPAA: Key Principles and Best Practices

Core Concepts Ransomware Training: Understanding the Fundamentals

Core Concepts: Incident Response

Core Concepts: Multi-factor Authentication

Core Concepts: PPRA

CSAM Cyber Security Training: Your Path to Stronger Cybersecurity Awareness

Essential Social Engineering Training: What You Need to Know

Exploring the WORKed Bathroom

Facts About Mobile Security: Everything You Need to Know

Facts About Safe Web Browsing: Essential Tips for Secure Online Navigation

Facts About Working Remotely: Key Insights and Tips

Just the Facts: Business Email Compromise (BEC)

Just the Facts: Multi-Factor Authentication

Need to Know: Email Security

WORKed Episode 2: Evite