Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

HIPAA HITECH for Executives: A Guide for Healthcare Leaders

Just the Facts: Business Email Compromise (BEC)

Just the Facts: Multi-Factor Authentication

Need to Know: Email Security

OWASP A3 - Sensitive Data Exposure

PCI DSS Training: Learn How to Achieve Compliance and Secure Your Data

Pick Your Path: Dive into the Cybersecurity Game and Face the Peril

WORKed Episode 2: Evite

WORKed Episode 3: The Future of the Worked Robot Lawnmower

Comprehensive CUI Training Certification for Enhanced Security

Core Concepts Data Destruction Training: Key Principles for Secure Data Disposal

Core Concepts: How to Report Phishing Emails

CPNI Training for Providers: Essential Guidance and Best Practices

Cybersecurity for Educators: Essential Guide to Protecting Your Digital Classroom

Essential Guide to Mobile Security: What You Need to Know

Facts About Educators: Key Insights for Teachers and Educators

GDPR - Rights of the Data Subjects

GDPR for Data Processors: A Complete Guide to Compliance and Best Practices

Marine Lowlifes: Spearphish

Marine Lowlifes: Whaling Shark

PHI Life Cycle

Pick Your Path: Deep Space Danger

Work Bytes: Social Engineering

Core Concepts Cloud Security: Essential Principles for Protecting Your Data