Security Awareness & Training Resource Center

Boost the effectiveness of your security awareness program or earn your next certification with free tools from our resource center. Check back frequently — new resources are added every month!

Topic
Type
View Results
Filter Results
Webinar & video

Choose Your Own Adventure® Security Awareness Game

Security awareness
We gamified security awareness. Play Choose Your Own Adventure Zombie Invasion to see for yourself.
Click to Play
Webinar & video

SolarWinds supply chain breach: Insights from the trenches

Best practices, Threat intel, Cybersecurity
How are organizations responding to the SolarWind breach. Keatron Evans shares what he's learned performing a number of incident response cases.
Watch now
Webinar & video

Security culture — The cheat code for securing your organization

Security awareness, Best practices, Cybersecurity
Learn how security professionals are using security awareness and training to build a culture of security at their organization.
Watch now
Webinar & video

CompTIA Security+: Everything you need to know about the SY0-601 update

Professional development, Cybersecurity, Certification
Learn how the CompTIA's Security+ certification is evolving so it remains the “go-to” certification for anyone trying to break into cybersecurity.
Watch now
Poster, infographic & tool

Wild Wild Net Campaign Kit

Security awareness, Best practices
Can your employees wrangle the Wild Wild Net’s most wanted cybercriminals?
Download
Whitepaper & report

2020 IT & Security Talent Pipeline Study

Professional development, Best practices
Learn how successful hiring managers are filling open roles in Infosec’s 2020 IT & security talent pipeline study.
Download
Poster, infographic & tool

Outsmart Them All Campaign Kit

Phishing, Security awareness, Best practices
We made simulated phishing & training easy. Get the email templates and training tools to launch 12 months of simulated phishing training.
Download
Webinar & video

Infosec IQ instant demo: Cybersecurity for your entire workforce

Phishing, Security awareness
Watch our live demo of Infosec IQ and learn how to educate and empower your employees to be one of your greatest cybersecurity assets.
Watch now
Webinar & video

Infosec Skills instant demo: Close your team’s skills gap

Professional development, Best practices, Threat intel, Cybersecurity, Certification
Learn how Infosec Skills can help close your organization’s cybersecurity skills gap in this instant demo.
Watch now
Poster, infographic & tool

Infosec Skills course catalog

Professional development, Cybersecurity, Certification
Infosec Skills keeps your team's security skills fresh year-round with hundreds of courses mapped to the NICE Cybersecurity Workforce Framework.
Download
Poster, infographic & tool

ROI of Security Awareness Calculator

Security awareness
Download our free calculator, input your organization's costs and measure your return on security awareness training.
Download
Video

Write a port scanner in Python in 5 minutes

Professional development, Cybersecurity
Port scanners are an essential network security tool. Open up your Linux terminal and learn how to write one using basic Python — right now.
Watch Now
Podcast

Cybersecurity careers: Risk management, privacy and healthcare security

Professional development, Phishing, Cybersecurity
Learn about different cybersecurity roles and career paths in this wide-ranging conversation with today’s guest Tyler Cohen Wood. Tyler discusses working as a senior intelligence officer for the Defense Intelligence Agency (DIA), overseeing cyber risk for AT&T and writing her book Catching the Catfishers. We talk about online privacy, implementing complex cybersecurity systems, healthcare security shortcomings in the age of COVID — and her blue-haired, pre-cyber years working in the record industry!

We’re also excited to share a new, hands-on training series called Cyber Work Applied. Every week, expert Infosec instructors and industry practitioners teach you a new cybersecurity skill and show you how that skill applies to real-world scenarios. You’ll learn how to carry out different cyberattacks, practice using common cybersecurity tools, follow along with walkthroughs of how major breaches occurred and more. And it's free! Click the link below to get started.
Listen now
Video

Connecting a malicious thumb drive

Security awareness, Cybersecurity
Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?
Watch Now
Podcast

Kubernetes: Vulnerabilities, efficiency and cloud security

Professional development, Cybersecurity
Learn all about Kubernetes, its possible misconfigurations and vulnerabilities, and how it applies to cloud security on today’s episode, featuring Michael Foster, a Cloud Native Advocate at StackRox. Michael discusses intrinsic Kubernetes security issues compared with those that come from improper use, the work of a Cloud Security Advocate, his time in the Chicago Cubs and more.

We’re also excited to share the new hands-on Cyber Work training series, Cyber Work Applied. Each week on Cyber Work Applied, expert Infosec instructors teach a new cybersecurity skill and show you how that skill applies to real-world scenarios. Get demos of different cyberattacks, learn how to use common cybersecurity tools, explore how major breaches occurred and more. Check out the link below to start learning, for free!
Listen now
Video

Inside Capital One’s game-changing breach

Professional development, Best practices, Threat intel, Cybersecurity
The breach involved two of the world's largest organizations and new legal precedents that impact how cybersecurity professionals operate.
Watch Now
Podcast

Running a digital forensics business

Professional development, Cybersecurity
We’re going back into the world of digital forensics careers with today’s guest, Tyler Hatch of DFI Forensics! Tyler tells us about moving from being a lawyer into the field of digital forensics, key traits of great forensics professionals and how to prove that incriminating evidence on a defendant’s laptop isn’t always what it seems.

We’re also excited to share the new hands-on Cyber Work training series, Cyber Work Applied. Each week on Cyber Work Applied, expert Infosec instructors teach a new cybersecurity skill and show you how that skill applies to real-world scenarios. Get demos of different cyberattacks, learn how to use common cybersecurity tools, explore how major breaches occurred and more. Check out the link below to start learning, for free!
Listen now
Podcast

The 5 pillars of cybersecurity framework

Professional development, Best practices, Threat intel, Compliance, Cybersecurity
Help your C-suite get serious about cybersecurity with today’s episode, featuring Mathieu Gorge. Using his Five Pillars of Security Framework and his book, The Cyber Elephant in the Boardroom, Mathieu takes complex, confusing regulatory frameworks and maps them in a language that non tech-fluent board members can understand.

We’re also excited to share the new hands-on Cyber Work training series, Cyber Work Applied. Each week on Cyber Work Applied, expert Infosec instructors teach a new cybersecurity skill and show you how that skill applies to real-world scenarios. Get demos of different cyberattacks, learn how to use common cybersecurity tools, explore how major breaches occurred and more. Check out the link below to start learning, for free!
Listen now
Video

How to set up a man-in-the-middle attack

Professional development, Cybersecurity
Is your web browsing private, or is a man in the middle looking at everything you do? Learn how to set up and execute this type of attack.
Watch Now
Podcast

SolarWinds breach: Insights from the trenches | Live incident response demo

Professional development, Threat intel, Cybersecurity
It’s been a busy week for cybersecurity professionals as they respond to the SolarWinds breach. On December 13, the Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to immediately “disconnect or power down SolarWinds Orion products" as they were being actively exploited by malicious actors.

Infosec Skills author and KM Cyber Security managing partner Keatron Evans is helping numerous clients respond to the breach. In this live discussion and incident response demo (recorded Friday, December 18) he covers what happened with the SolarWinds supply chain attack, immediate action you can take to protect your systems and industry responses to help mitigate the incident. He also provides a live demo of Snort, memory forensics and Zeek, as well as a live Q&A with attendees.
Listen now
Video

How Zoom is being exploited for phishing

Phishing, Security awareness, Cybersecurity
Zoom is one of the most popular meeting tools. Learn how threat actors are leveraging that popularity in a successful phishing campaign.
Watch Now
Podcast

Hiring a ransomware negotiator: Tactics, tips and careers

Professional development, Best practices, Cybersecurity
Ever thought of hiring a ransomware negotiator, or becoming one yourself? On today’s episode, Kurtis Minder of GroupSense tells us what makes a good ransomware negotiator, why setting the right tone is crucial in a successful negotiation, and why, in the right situation, you can get away with referring to a ransomer as “grasshopper.”

We’re also excited to announce a new, hands-on training series called Cyber Work Applied. Every week, expert Infosec instructors and industry practitioners teach you a new cybersecurity skill and show you how that skill applies to real-world scenarios. You’ll learn how to carry out different cyberattacks, practice using common cybersecurity tools, follow along with walkthroughs of how major breaches occurred, and more. And it's free! Check out the link below to start learning.
Listen now
Podcast

Vulnerability hunting and ecommerce safety

Professional development, Cybersecurity
Let’s talk about the practice of finding vulnerabilities! For Ted Harrington, Executive Partner of ISE, it’s much more than a job, it’s a life mission. Ted joins the Cyber Work Podcast to discuss being part of the first team to hack the iPhone, as well as thinking like a hacker to avoid being hacked yourself. He also gives advice for people who would rather sell their wares online this holiday season than spend all day thinking about security. The world has been moving in the direction of holiday shopping online for quite some time now, but with things being what they are in 2020, that trend is likely to grow exponentially upward as stores become either closed to the public or only open to a few people at a time for safety. Either way, that means a lot of online transactions, and a lot of juicy targets for cybercriminals.

Ted Harrington, Executive Partner at ISE is finding new ways to protect digital assets. He's helped companies like Disney, Amazon, Google, Netflix and Adobe fix tens of thousands of security vulnerabilities. His team at ISE is composed of ethical hackers known for being the first to hack the iPhone, where he applies his think-like-a-hacker mentality to constantly adapt to fresh security and software development challenges.
Listen now
Video

Getting started in cybersecurity

Professional development, Cybersecurity
Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.
Watch Now