Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.

Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources
CompTIA PenTest+ certification: Overview and career path [updated 2022]
Penetration testing is in high demand. Learn more about the CompTIA PenTest+ certificate and exam.
PenTest+ certification job titles and career outlook
Find out what your career outlook is like and what jobs you can get with a PenTest+ certification.
PenTest+ vs. CEH: Which certification is better? [2022 update]
Find out why the CompTIA PenTest+ or EC-Council's CEH is the certificate for you.
The ultimate guide to ISACA certifications: Overview & career paths [updated 2022]
Learn everything you need to know to get you on your way to pursuing an ISACA certification to improve your cybersecurity job qualifications.
Customer data protection: A comprehensive cybersecurity guide for companies
Looking for advanced cybersecurity strategies? Here is a comprehensive guide on how to develop a cybersecurity plan for enhanced data security.
The most common cyber threats facing SMBs and how to prevent them
SMBs have been hammered by cybercrime this year. Good security practices and training are crucial to keep them safe.
The impact of open source on cybersecurity
Open-source software can help organizations keep their technology more secure. Here are a few tips to help realize those open-source benefits.
One phishing attack could expose your entire hospitality network
What's missing from your hospitality training? Regular cybersecurity training, and it's putting your organization's reputation on the line.

How does hashing work: Examples and video walkthrough
What is password hashing? Infosec Skills author Mike Meyers explains how a hash works and demonstrates common hashing use cases.
Learn the 3 pillars of cyber security risk management and leadership
Cyber security leaders and those in cyber security risk management need to follow three pillars to successfully add value to an organization.
CASP+ vs. CISSP: Which certification should you get in 2022?
CASP+ and CISSP are both advanced-level certifications that validate your cybersecurity skills, but which certification is best for your career?
The ultimate guide to DoD 8570 certification and compliance
Everying you need to know about the Department of Defense's 8570 Directive.
Certifications compared: CISSP vs. GSEC [updated 2021]
CISSP and GSEC are both popular cybersecurity certifications, but they serve different purposes. Find out which one is right for you.

7 Security Awareness Tips for Senior Citizens
More and more seniors are getting to grips with the Internet, but for some, the digital world is a dangerous place. Many are being scammed out of their hard-

ISO 27001 security awareness training: How to achieve compliance
Security awareness training is an ISO 27001 standard. Learn how Infosec IQ can help achieve compliance and build a culture of security.

Are your communication skills holding your information security career back?
Learn Reporting and Communication In this course, five videos take you through the details of reporting and communication. This skills course covers [pka
CRISC: Overview of domains [updated 2021]
Find out what the Risk and Information Systems Control certification is all about.
Protect your data with zero-trust networks
83% of former employees retain access to one or more of your company's accounts. It's past time to use a zero-trust network to ensure your data stays safe.
Introduction to Secure Software Development Life Cycle
Learn all about the Secure Software Development Life Cycle.
CISM Domain 2: Information Risk Management (IRM) [2022 update]
Learn what you need to know about CISM Domain 2 and prepare yourself before earning a CISM certification.
Introduction to SIEM (security information and event management)
Learn all about SIEM, a software system that collects and aggregates data and events from various networking devices and resources.
Want to make more money? Here are the top 5 highest-paying infosec certifications [2022 update]
Want to earn more money in cybersecurity? These cybersecurity certifications might be for you.

Applying linguistics to cybersecurity: The journey of Jade Brown, a 2022 Infosec Scholarship winner
Jade Brown, 2022 Infosec Scholarship winner, builds on her Linguistics and East Asian Studies knowledge to grow as a Cyber Threat Intelligence Analyst.

Why a skills shortage is one of the biggest security challenges for companies
Your company can’t have adequate security without skilled individuals making it happen, so what can you do to build the right security team?