Want another 1,000+ hours of free training?

Want a FREE bottle of Dom Pérignon?

Invite a friend to get 1,000+ hours of free training!

Cyber Work Applied

Learn cybersecurity — for free!

Get FREE cybersecurity training from industry experts

New training sent to your inbox every week.

*You must verify your email address to unlock content.

Registration expires in...

00
Days
00
Hours
00
Minutes
00
Seconds
Cyberattack

Inside a DDoS attack against a bank

Distributed denial-of-service attacks are often used to disrupt websites. Learn how one bank got attacked and what they did to stop it.

Cybersecurity training videos

  • Cyberattack
    Locked

    Inside a DDoS attack against a bank

    Distributed denial-of-service attacks are often used to disrupt websites. Learn how one bank got attacked and what they did to stop it.

    Unlock Video
  • Cyberattack

    Inside a DDoS attack against a bank

    Distributed denial-of-service attacks are often used to disrupt websites. Learn how one bank got attacked and what they did to stop it.

    Watch Now
  • Cyberattack
    Locked

    How injection attacks work

    Injection attacks are the number one security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them.

    Unlock Video
  • Cyberattack

    How injection attacks work

    Injection attacks are the number one security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them.

    Watch Now
  • Overview
    Locked

    How to use the Infosec Skills platform

    Get access to 100s of additional hands-on skill and certification courses with Infosec Skills — FREE when you use code LEARN.

    Unlock Video
  • Overview

    How to use the Infosec Skills platform

    Get access to 100s of additional hands-on skill and certification courses with Infosec Skills — FREE when you use code LEARN.

    Watch Now
  • Overview
    Locked

    5 ways to prevent APT ransomware attacks

    Advanced Persistent Threat groups involvement in ransomware campaigns have made them nearly unstoppable. Learn how you can slow them down.

    Unlock Video
  • Overview

    5 ways to prevent APT ransomware attacks

    Advanced Persistent Threat groups involvement in ransomware campaigns have made them nearly unstoppable. Learn how you can slow them down.

    Watch Now
  • Social Engineering
    Locked

    Using AI to level up your phishing attacks

    See a live demo of a phishing attack, and learn how cybercriminals are using AI to make them more effective — and more dangerous.

    Unlock Video
  • Social Engineering

    Using AI to level up your phishing attacks

    See a live demo of a phishing attack, and learn how cybercriminals are using AI to make them more effective — and more dangerous.

    Watch Now
  • Demo
    Locked

    Write a port scanner in Python in 5 minutes

    Port scanners are an essential network security tool. Open up your Linux terminal and learn how to write one using basic Python — right now.

    Unlock Video
  • Demo

    Write a port scanner in Python in 5 minutes

    Port scanners are an essential network security tool. Open up your Linux terminal and learn how to write one using basic Python — right now.

    Watch Now
  • Cyberattack
    Locked

    Connecting a malicious thumb drive

    Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?

    Unlock Video
  • Cyberattack

    Connecting a malicious thumb drive

    Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?

    Watch Now
  • Data breach
    Locked

    Inside Capital One’s game-changing breach

    The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.

    Unlock Video
  • Data breach

    Inside Capital One’s game-changing breach

    The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.

    Watch Now
  • Demo
    Locked

    How to set up a man-in-the-middle attack

    Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.

    Unlock Video
  • Demo

    How to set up a man-in-the-middle attack

    Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.

    Watch Now
  • Social Engineering
    Locked

    How Zoom is being exploited for phishing

    Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.

    Unlock Video
  • Social Engineering

    How Zoom is being exploited for phishing

    Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.

    Watch Now
  • Careers
    Locked

    Getting started in cybersecurity

    Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.

    Unlock Video
  • Careers

    Getting started in cybersecurity

    Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.

    Watch Now
  • Demo
    Locked

    How to carry out a watering hole attack

    You could be compromised just by visiting a legitimate website. It's called a watering hole attack. See how it works in this episode.

    Unlock Video
  • Demo

    How to carry out a watering hole attack

    You could be compromised just by visiting a legitimate website. It's called a watering hole attack. See how it works in this episode.

    Watch Now
  • Data breach
    Locked

    Inside Equifax’s massive breach

    Equifax was one of the most impactful data breaches of the past few years, affecting nearly half the U.S. population. See how it happened.

    Unlock Video
  • Data breach

    Inside Equifax’s massive breach

    Equifax was one of the most impactful data breaches of the past few years, affecting nearly half the U.S. population. See how it happened.

    Watch Now
  • Overview
    Locked

    Cloud computing: What you need to know

    How do you keep data secure when migrating to the cloud, and who's responsible for that security? Find out in this overview video.

    Unlock Video
  • Overview

    Cloud computing: What you need to know

    How do you keep data secure when migrating to the cloud, and who's responsible for that security? Find out in this overview video.

    Watch Now

Podcasts with industry leaders