Security Awareness & Training Resource Center
Boost the effectiveness of your security awareness program or earn your next certification with free tools from our resource center. Check back frequently — new resources are added every month!
Choose Your Own Adventure® Security Awareness Game
Security awareness
SolarWinds supply chain breach: Insights from the trenches
Best practices, Threat intel, Cybersecurity
Security culture — The cheat code for securing your organization
Security awareness, Best practices, Cybersecurity
CompTIA Security+: Everything you need to know about the SY0-601 update
Professional development, Cybersecurity, Certification
Wild Wild Net Campaign Kit
Security awareness, Best practices
2020 IT & Security Talent Pipeline Study
Professional development, Best practices
Outsmart Them All Campaign Kit
Phishing, Security awareness, Best practices
Infosec IQ instant demo: Cybersecurity for your entire workforce
Phishing, Security awareness
Infosec Skills instant demo: Close your team’s skills gap
Professional development, Best practices, Threat intel, Cybersecurity, Certification
Infosec Skills course catalog
Professional development, Cybersecurity, Certification
ROI of Security Awareness Calculator
Security awareness
Write a port scanner in Python in 5 minutes
Professional development, Cybersecurity
Cybersecurity careers: Risk management, privacy and healthcare security
Professional development, Phishing, Cybersecurity
We’re also excited to share a new, hands-on training series called Cyber Work Applied. Every week, expert Infosec instructors and industry practitioners teach you a new cybersecurity skill and show you how that skill applies to real-world scenarios. You’ll learn how to carry out different cyberattacks, practice using common cybersecurity tools, follow along with walkthroughs of how major breaches occurred and more. And it's free! Click the link below to get started.
Connecting a malicious thumb drive
Security awareness, Cybersecurity
Kubernetes: Vulnerabilities, efficiency and cloud security
Professional development, Cybersecurity
We’re also excited to share the new hands-on Cyber Work training series, Cyber Work Applied. Each week on Cyber Work Applied, expert Infosec instructors teach a new cybersecurity skill and show you how that skill applies to real-world scenarios. Get demos of different cyberattacks, learn how to use common cybersecurity tools, explore how major breaches occurred and more. Check out the link below to start learning, for free!
Inside Capital One’s game-changing breach
Professional development, Best practices, Threat intel, Cybersecurity
Running a digital forensics business
Professional development, Cybersecurity
We’re also excited to share the new hands-on Cyber Work training series, Cyber Work Applied. Each week on Cyber Work Applied, expert Infosec instructors teach a new cybersecurity skill and show you how that skill applies to real-world scenarios. Get demos of different cyberattacks, learn how to use common cybersecurity tools, explore how major breaches occurred and more. Check out the link below to start learning, for free!
The 5 pillars of cybersecurity framework
Professional development, Best practices, Threat intel, Compliance, Cybersecurity
We’re also excited to share the new hands-on Cyber Work training series, Cyber Work Applied. Each week on Cyber Work Applied, expert Infosec instructors teach a new cybersecurity skill and show you how that skill applies to real-world scenarios. Get demos of different cyberattacks, learn how to use common cybersecurity tools, explore how major breaches occurred and more. Check out the link below to start learning, for free!
How to set up a man-in-the-middle attack
Professional development, Cybersecurity
SolarWinds breach: Insights from the trenches | Live incident response demo
Professional development, Threat intel, Cybersecurity
Infosec Skills author and KM Cyber Security managing partner Keatron Evans is helping numerous clients respond to the breach. In this live discussion and incident response demo (recorded Friday, December 18) he covers what happened with the SolarWinds supply chain attack, immediate action you can take to protect your systems and industry responses to help mitigate the incident. He also provides a live demo of Snort, memory forensics and Zeek, as well as a live Q&A with attendees.
How Zoom is being exploited for phishing
Phishing, Security awareness, Cybersecurity
Hiring a ransomware negotiator: Tactics, tips and careers
Professional development, Best practices, Cybersecurity
We’re also excited to announce a new, hands-on training series called Cyber Work Applied. Every week, expert Infosec instructors and industry practitioners teach you a new cybersecurity skill and show you how that skill applies to real-world scenarios. You’ll learn how to carry out different cyberattacks, practice using common cybersecurity tools, follow along with walkthroughs of how major breaches occurred, and more. And it's free! Check out the link below to start learning.
Vulnerability hunting and ecommerce safety
Professional development, Cybersecurity
Ted Harrington, Executive Partner at ISE is finding new ways to protect digital assets. He's helped companies like Disney, Amazon, Google, Netflix and Adobe fix tens of thousands of security vulnerabilities. His team at ISE is composed of ethical hackers known for being the first to hack the iPhone, where he applies his think-like-a-hacker mentality to constantly adapt to fresh security and software development challenges.