Security awareness training: 4 employee behaviors that matter most
Level up your security awareness training program — and instill best practices in employees that will keep them (and your organization) secure year-round.
Cybersecurity project management: A peek behind the curtain | Cyber Work Live
Jackie Olshack and Ginny Morton discuss managing cybersecurity projects and overcoming obstacles to keep those projects on time and on budget.
How to do application security right in your organization
Best-selling author Ted Harrington explains how to avoid application security mistakes, maximize organizational investment and gain a competitive edge.
How to configure a network firewall | Cyber Work Applied
Learn the basics of setting up a network firewall, including stateful vs. stateless firewalls, setting up access control lists and more in this episode of Cyber Work Applied featuring Infosec Skills author Mike Meyers.
5 ways to prevent APT ransomware attacks | Cyber Work Applied
Advanced Persistent Threat groups' involvement in ransomware campaigns has made them nearly unstoppable. Learn how you can slow them down in this episode of Cyber Work Applied.
4 network utilities every security pro should know | Cyber Work Applied
Command-line utilities are useful in a variety of scenarios. Learn how, and when, you can use Ping, Netstat, Traceroute and ARP in this episode of Cyber Work Applied.
Connecting a malicious thumb drive: An undetectable cyberattack | Cyber Work Applied
Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?
Infosec Skills instant demo: Close your team’s skills gap
Learn how Infosec Skills can help close your organization’s cybersecurity skills gap in this instant demo.
A public discussion about privacy careers: Training, certification and experience
Join our panel of privacy experts as they discuss the intersection of privacy and cybersecurity — and various privacy-related job opportunities.
Learn intrusion detection: Using Zeek and Elastic for incident response
Bad actors are in your network, but how can you tell? Watch Infosec Skills author Mark Viglione's live intrusion detection demo to find out.
How to use Nmap and other network scanners | Cyber Work Applied
What's on your network, or someone else's? Mike Meyers demonstrates how to use free network scanning tools like Nmap, Zenmap and advanced port scanner.
Using AI to level up phishing attacks | Cyber Work Applied
See a live demo of a phishing attack. Learn how cybercriminals are using AI to make them more effective — and more dangerous.
Password security: Using Active Directory password policy | Cyber Work Applied
How do you enforce a secure password policy? Learn how to implement Windows local and group password policies.
Secure cloud computing: What you need to know | Cyber Work Applied
How do you keep data secure when migrating to the cloud, and who's responsible for that security? Keatron Evans explains.
Getting started in cybersecurity | Cyber Work Applied
Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.
Understanding identification, authorization and authentication | Cyber Work Applied
Someone's trying to gain access, but are they who they say they are? That's what the different methods of identification are all about.
Advanced adversary tactics and defense evasion with MITRE ATT&CK | Cyber Work Applied
Learn how advanced persistent threat groups use defense evasion to stay hidden. Then open our cyber range and test your evasion skills.
Extortion: How attackers double down on threats | Cyber Work Applied
You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand, pay up now — or it’s only going to get worse.
Privilege escalation via cross-site scripting with MITRE ATT&CK | Cyber Work Applied
Learn how certain cross-site scripting vulnerabilities can be exploited for a privilege escalation attack. Then dive in and try it yourself.
How Zoom is being exploited for phishing attacks | Cyber Work Applied
Zoom is one of the most popular meeting tools. Learn how threat actors were leveraging that popularity in a successful phishing campaign.
Persistence: Maintaining a foothold with MITRE ATT&CK techniques | Cyber Work Applied
Learn how threat actors use MITRE ATT&CK® persistence techniques to maintain a foothold in an environment. Then try the techniques yourself.
Cybersecurity project management: Your career starts here | Cyber Work Live
Have you considered a career as a cybersecurity project manager? Join our live panel to learn all about this exciting career path.
Inside a DDoS attack against a bank | Cyber Work Applied
Distributed denial-of-service attacks are often used to disrupt websites. Learn how one bank got attacked and what they did to stop it.
Executing the Sandworm APT with MITRE ATT&CK | Cyber Work Applied
Learn the techniques the Sandworm APT hacking group used to compromise, pivot from and destroy a server. Then try to do it yourself.