Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

WORKed Episode 8: Eagle Eye

CJIS Policy Dissemination and Destruction Procedure: A Comprehensive Guide

Core Concepts of HIPAA: Key Principles and Best Practices

Core Concepts Ransomware Training: Understanding the Fundamentals

Core Concepts: Incident Response

Core Concepts: Multi-factor Authentication

Core Concepts: PPRA

CSAM Cyber Security Training: Your Path to Stronger Cybersecurity Awareness

Essential Social Engineering Training: What You Need to Know

Exploring the WORKed Bathroom

Facts About Mobile Security: Everything You Need to Know

Facts About Safe Web Browsing: Essential Tips for Secure Online Navigation

Facts About Working Remotely: Key Insights and Tips

Family Educational Rights: Understanding the Family Educational Rights and Privacy Act (FERPA)

Just the Facts: Business Email Compromise (BEC)

Just the Facts: Multi-Factor Authentication

Need to Know: Email Security

PCI DSS Training: Learn How to Achieve Compliance and Secure Your Data

Pick Your Path: Dive into the Cybersecurity Game and Face the Peril

WORKed Episode 2: Evite

WORKed Episode 3: The Future of the Worked Robot Lawnmower

Core Concepts Data Destruction Training: Key Principles for Secure Data Disposal

Core Concepts: How to Report Phishing Emails

CPNI Training for Providers: Essential Guidance and Best Practices