
Learn cybersecurity — for free!
Get FREE cybersecurity training from industry experts
New training sent to your inbox every week.
*You must verify your email address to unlock content.
Registration expires in...
Connecting a malicious thumb drive
Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?
Cybersecurity training videos
-
Cyberattack
Connecting a malicious thumb drive
Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?
Unlock VideoConnecting a malicious thumb drive
-
Cyberattack
Connecting a malicious thumb drive
Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?
Watch Now -
Data breach
Inside Capital One’s game-changing breach
The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.
Unlock VideoInside Capital One’s game-changing breach
-
Data breach
Inside Capital One’s game-changing breach
The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.
Watch Now -
Demo
How to set up a man-in-the-middle attack
Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.
Unlock VideoHow to set up a man-in-the-middle attack
-
Demo
How to set up a man-in-the-middle attack
Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.
Watch Now -
Social Engineering
How Zoom is being exploited for phishing
Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.
Unlock VideoHow Zoom is being exploited for phishing
-
Social Engineering
How Zoom is being exploited for phishing
Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.
Watch Now -
Careers
Getting started in cybersecurity
Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.
Unlock VideoGetting started in cybersecurity
-
Careers
Getting started in cybersecurity
Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.
Watch Now -
Demo
How to carry out a watering hole attack
You could be compromised just by visiting a legitimate website. It's called a watering hole attack. See how it works in this episode.
Unlock VideoHow to carry out a watering hole attack
-
Demo
How to carry out a watering hole attack
You could be compromised just by visiting a legitimate website. It's called a watering hole attack. See how it works in this episode.
Watch Now -
Data breach
Inside Equifax’s massive breach
Equifax was one of the most impactful data breaches of the past few years, affecting nearly half the U.S. population. See how it happened.
Unlock VideoInside Equifax’s massive breach
-
Data breach
Inside Equifax’s massive breach
Equifax was one of the most impactful data breaches of the past few years, affecting nearly half the U.S. population. See how it happened.
Watch Now -
Overview
Cloud computing: What you need to know
How do you keep data secure when migrating to the cloud, and who's responsible for that security? Find out in this overview video.
Unlock VideoCloud computing: What you need to know
-
Overview
Cloud computing: What you need to know
How do you keep data secure when migrating to the cloud, and who's responsible for that security? Find out in this overview video.
Watch Now
Podcasts with industry leaders
-
Getting started and moving up in IT and security
Listen now -
Teach yourself cybersecurity with skills-based education
Listen now -
Cybersecurity careers: How to stand out, get hired and make more money
Listen now -
Get started in computer forensics: Entry-level tips, skills and career paths
Listen now -
From network engineer to pentester: Tips for moving into cybersecurity
Listen now -
How to become a cybersecurity analyst
Listen now -
Red teamers arrested conducting a penetration test
Listen now -
Offensive or defensive security: Which career is for you?
Listen now -
BAHAMUT: Uncovering a massive hack-for-hire cyberespionage group
Listen now
Listen to the Cyber Work Podcast
Uh oh!
There's been an error while we were processing your request. Please try again later.
What others are saying about Infosec
“Awesome practical knowledge about how you will use these skills.”
—Steven
“Whether you’re well-established or just getting started carving out your role, this is a must! Highly recommend subscribing.”
—Josh
“I like the way each training is broken into bite-sized chunks that cut out all the fluff and gets to the important stuff.”
—Edwin

Hands-on training
Get the hands-on training you need to learn new cybersecurity skills and keep them relevant. Every other week on Cyber Work Applied, expert Infosec instructors and industry practitioners teach a new skill — and show you how that skill applies to real-world scenarios.

Weekly career advice
Learn how to break into cybersecurity, build new skills and move up the career ladder. Each week on the Cyber Work Podcast, host Chris Sienko sits down with thought leaders from Carbon Black, IBM, CompTIA and others to discuss the latest cybersecurity workforce trends.

Q&As with industry pros
Have a question about your cybersecurity career? Join our special Cyber Work Live episodes for a Q&A with industry leaders. Get your career questions answered, connect with other industry professionals and take your career to the next level.