Infosec IQ training and awareness content library

Our massive library of industry- and role-based training resources is updated weekly, helping you deliver fresh, relevant training to every member of your organization no matter the style and tone you need. Preview our range of content types or explore the entire library below.

Demo Infosec IQ today!

Browse our library

Over 700 security awareness resources and counting

Content Type
Content Pack
Subscription Plan
View Results
Filter Results

PCI DSS: Protecting Networks and Systems

Take a moment to examine the importance of protecting networks and systems, and how it relates to PCI DSS.

CJIS Policy: Dissemination & Destruction

This module outlines how to properly dispose of CJI, how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI.

Intellectual Property

This module covers important intellectual property protection mechanisms (patents, trademarks, and copyrights) and how they apply to various types of products, including software and digital media.

Anti-Money Laundering

This interactive module explains money laundering and U.S. laws and regulations intended to combat money laundering activities.

FERPA for Post-Secondary Education

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for post-secondary institutions.

FERPA for K-12

In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.


This module covers the provisions of the Children's Online Privacy Protection Act (COPPA). It outlines when an organization is subject to COPPA requirements, and how to ensure compliance with COPPA provisions.

CJIS: Handling CJI

This module defines criminal justice information (CJI), the protocols required to access and handle CJI and the consequences of noncompliance.

CJIS Security Policy

This module provides a detailed explanation of Criminal Justice Information Security (CJIS) policy requirements, who must comply with CJIS policy and how to respond to incidents involving CJI.

CJIS Policy: Media Protection

This module outlines data-handling best practices, such as avoiding malware, applying encryption and proper disposal of physical media containing criminal justice information.

PHI Definition

This video explains Protected Health Information (PHI) and provides examples of individually identifiable health information.

CJIS Policy: Physical Security

This module covers the necessary defenses against unauthorized access to your facility and any paper copies of criminal justice information in your possession.

Introduction To HIPAA

This module briefly covers the main points of HIPAA compliance.

Intellectual Property Rights

This video delves covers the basics US copyright and trademark laws.

Appropriate Use of Software

In less than 60 seconds, this module covers how to legally use products of creative software.

Software Licensing

This brief video covers the appropriate methods for installing and licensing software.

HIPAA Minimum Necessary Standard

This brief video extrapolates on how many people are authorized to access one person's health records.

PHI Policy

This video shows the importance of formulating and implementing organizational policy regarding PHI.

Exceptional learning experiences powered by LX Labs cyber expertise

All Infosec IQ security awareness and training resources are infused with LX Labs know-how. Our elite team of cyber experts, learning specialists and creative ninjas blend cybersecurity expertise with right-brain design talent and solid instructional design. It’s what makes our security awareness series like WORKed and Need to Know so engaging and effective.

LX Labs

Infosec Named a Leader in Security Awareness & Training

Read the Forrester Wave to learn what sets Infosec apart and the latest training program trends.