Cyber Work Applied

Learn cybersecurity — for free!

Get FREE cybersecurity training from industry experts

New training sent to your inbox every week.

*You must verify your email address to unlock content.

Registration expires in...

00
Days
00
Hours
00
Minutes
00
Seconds
Cyberattack

Connecting a malicious thumb drive

Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?

1,000s of students

1,000s of students

New episodes every week

New episodes every week

Hands-on education

Hands-on education

Cybersecurity training videos

  • Cyberattack
    Locked

    Connecting a malicious thumb drive

    Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?

    Unlock Video
  • Cyberattack

    Connecting a malicious thumb drive

    Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?

    Watch Now
  • Data breach
    Locked

    Inside Capital One’s game-changing breach

    The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.

    Unlock Video
  • Data breach

    Inside Capital One’s game-changing breach

    The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.

    Watch Now
  • Demo
    Locked

    How to set up a man-in-the-middle attack

    Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.

    Unlock Video
  • Demo

    How to set up a man-in-the-middle attack

    Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.

    Watch Now
  • Social Engineering
    Locked

    How Zoom is being exploited for phishing

    Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.

    Unlock Video
  • Social Engineering

    How Zoom is being exploited for phishing

    Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.

    Watch Now
  • Careers
    Locked

    Getting started in cybersecurity

    Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.

    Unlock Video
  • Careers

    Getting started in cybersecurity

    Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.

    Watch Now
  • Demo
    Locked

    How to carry out a watering hole attack

    You could be compromised just by visiting a legitimate website. It's called a watering hole attack. See how it works in this episode.

    Unlock Video
  • Demo

    How to carry out a watering hole attack

    You could be compromised just by visiting a legitimate website. It's called a watering hole attack. See how it works in this episode.

    Watch Now
  • Data breach
    Locked

    Inside Equifax’s massive breach

    Equifax was one of the most impactful data breaches of the past few years, affecting nearly half the U.S. population. See how it happened.

    Unlock Video
  • Data breach

    Inside Equifax’s massive breach

    Equifax was one of the most impactful data breaches of the past few years, affecting nearly half the U.S. population. See how it happened.

    Watch Now
  • Overview
    Locked

    Cloud computing: What you need to know

    How do you keep data secure when migrating to the cloud, and who's responsible for that security? Find out in this overview video.

    Unlock Video
  • Overview

    Cloud computing: What you need to know

    How do you keep data secure when migrating to the cloud, and who's responsible for that security? Find out in this overview video.

    Watch Now

Podcasts with industry leaders

Listen to the Cyber Work Podcast

Uh oh!

There's been an error while we were processing your request. Please try again later.

What others are saying about Infosec

“Awesome practical knowledge about how you will use these skills.”
—Steven

“Whether you’re well-established or just getting started carving out your role, this is a must! Highly recommend subscribing.”
—Josh

“I like the way each training is broken into bite-sized chunks that cut out all the fluff and gets to the important stuff.”
—Edwin

Hands-on training

Hands-on training

Get the hands-on training you need to learn new cybersecurity skills and keep them relevant. Every other week on Cyber Work Applied, expert Infosec instructors and industry practitioners teach a new skill — and show you how that skill applies to real-world scenarios.

Weekly career advice

Weekly career advice

Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.

Q&As with industry pros

Q&As with industry pros

Have a question about your cybersecurity career? Join our special Cyber Work Live episodes for a Q&A with industry leaders. Get your career questions answered, connect with other industry professionals and take your career to the next level.