Featured content
Our resources
Topic
Type
Infosec IQ demo: Cybersecurity for every employee
Learn how Infosec IQ can help educate and empower your employees to be one of your greatest cybersecurity assets in this 15-minute demo.
Learn more
Skills training value: How to differentiate your staff and your organization from the rest
Learn how Infosec Skills can help upskill your employees and help your clients.
Learn more
Learning ≠ Education: How people really learn and what it means for security training
What drives employees to learn, and how can you truly change employee behavior? Learning and development vet Nick Shackleton-Jones explains.
Learn more
Security awareness training: 4 employee behaviors that matter most
Level up your security awareness training program — and instill best practices in employees that will keep them (and your organization) secure year-round.
Learn more
Cybersecurity project management: A peek behind the curtain | Cyber Work Live
Jackie Olshack and Ginny Morton discuss managing cybersecurity projects and overcoming obstacles to keep those projects on time and on budget.
Learn more
How to do application security right in your organization
Best-selling author Ted Harrington explains how to avoid application security mistakes, maximize organizational investment and gain a competitive edge.
Learn more
How to configure a network firewall | Cyber Work Applied
Learn the basics of setting up a network firewall, including stateful vs. stateless firewalls, setting up access control lists and more in this episode of Cyber Work Applied featuring Infosec Skills author Mike Meyers.
Watch Now
5 ways to prevent APT ransomware attacks | Cyber Work Applied
Advanced Persistent Threat groups' involvement in ransomware campaigns has made them nearly unstoppable. Learn how you can slow them down in this episode of Cyber Work Applied.
Watch Now
4 network utilities every security pro should know | Cyber Work Applied
Command-line utilities are useful in a variety of scenarios. Learn how, and when, you can use Ping, Netstat, Traceroute and ARP in this episode of Cyber Work Applied.
Watch Now
Connecting a malicious thumb drive: An undetectable cyberattack | Cyber Work Applied
Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?
Watch Now
Infosec Skills instant demo: Close your team’s skills gap
Learn how Infosec Skills can help close your organization’s cybersecurity skills gap in this instant demo.
Learn more
A public discussion about privacy careers: Training, certification and experience
Join our panel of privacy experts as they discuss the intersection of privacy and cybersecurity — and various privacy-related job opportunities.
Learn more
Learn intrusion detection: Using Zeek and Elastic for incident response
Bad actors are in your network, but how can you tell? Watch Infosec Skills author Mark Viglione's live intrusion detection demo to find out.
Learn more
How to use Nmap and other network scanners | Cyber Work Applied
What's on your network, or someone else's? Mike Meyers demonstrates how to use free network scanning tools like Nmap, Zenmap and advanced port scanner.
Watch Now
Using AI to level up phishing attacks | Cyber Work Applied
See a live demo of a phishing attack. Learn how cybercriminals are using AI to make them more effective — and more dangerous.
Watch Now
Password security: Using Active Directory password policy | Cyber Work Applied
How do you enforce a secure password policy? Learn how to implement Windows local and group password policies.
Watch Now
Secure cloud computing: What you need to know | Cyber Work Applied
How do you keep data secure when migrating to the cloud, and who's responsible for that security? Keatron Evans explains.
Watch Now
Getting started in cybersecurity | Cyber Work Applied
Cybersecurity is one of the fastest-growing career fields. Learn how to break into the industry — and what you can do to get started now.
Watch Now
Understanding identification, authorization and authentication | Cyber Work Applied
Someone's trying to gain access, but are they who they say they are? That's what the different methods of identification are all about.
Watch Now
Advanced adversary tactics and defense evasion with MITRE ATT&CK | Cyber Work Applied
Learn how advanced persistent threat groups use defense evasion to stay hidden. Then open our cyber range and test your evasion skills.
Watch Now
Extortion: How attackers double down on threats | Cyber Work Applied
You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand, pay up now — or it’s only going to get worse.
Watch Now
Privilege escalation via cross-site scripting with MITRE ATT&CK | Cyber Work Applied
Learn how certain cross-site scripting vulnerabilities can be exploited for a privilege escalation attack. Then dive in and try it yourself.
Watch Now
How Zoom is being exploited for phishing attacks | Cyber Work Applied
Zoom is one of the most popular meeting tools. Learn how threat actors were leveraging that popularity in a successful phishing campaign.
Watch Now
Persistence: Maintaining a foothold with MITRE ATT&CK techniques | Cyber Work Applied
Learn how threat actors use MITRE ATT&CK® persistence techniques to maintain a foothold in an environment. Then try the techniques yourself.
Watch Now