Security Awareness & Training Resource Center

Boost the effectiveness of your security awareness program or earn your next certification with free tools from our resource center. Check back frequently — new resources are added every month!

Topic
Type
View Results
Filter Results
Webinar & video

CISA Resources to Reduce Ransomware Risk | Infosec Edge Webcast

Security awareness, Best practices, Cybersecurity
Join the CISA team as they discuss the state of ransomware, prevention guidance and free tools to help you reduce risk.
Register now
Webinar & video

Diversity, equity and inclusion in cybersecurity hiring | Cyber Work Live

Professional development, Cybersecurity
A panel of experts answers questions about effective diversity, equity and inclusion (DEI) hiring processes in this episode of Cyber Work Live.
Register now
Webinar & video

Red teaming: The fun, and the fundamentals | Cyber Work Live

Professional development, Cybersecurity
Learn what it's like to have a career in red teaming and offensive security in this episode of Cyber Work Live.
Register now
Webinar & video

CMMC rollout: How CMMC will impact your organization | Infosec Edge Webcast

Professional development, Compliance, Cybersecurity, Certification
More than 300,000 organizations will be affected by the new CMMC Framework. Learn how your organization will be affected.
Watch now
Webinar & video

Infosec IQ instant demo: Cybersecurity for every employee

Phishing, Security awareness
Learn how Infosec IQ can help educate and empower your employees to be one of your greatest cybersecurity assets in this instant demo.
Watch now
Webinar & video

Infosec Skills instant demo: Close your team’s skills gap

Professional development, Best practices, Threat intel, Cybersecurity, Certification
Learn how Infosec Skills can help close your organization’s cybersecurity skills gap in this instant demo.
Watch now
Video

Hashing basics: How does hashing work?

Professional development, Cybersecurity
What is password hashing? How does a one-way hash function work? Mike Meyers uses his sophisticated hashing box to explain in this episode.
Watch Now
Video

Cryptography basics: How does encryption work?

Professional development, Cybersecurity
Learn cryptography basics — from Caesar and Vigenere ciphers to cryptography algorithms and encrypting data using public and private keys.
Watch Now
Video

Extortion: How attackers double down on threats

Professional development, Security awareness, Cybersecurity
You’ve just been breached or threatened with a cyberattack. Now comes a new extortion demand, pay up now — or it’s only going to get worse.
Watch Now
Webinar & video

Cybersecurity Culture Survey Workshop | Infosec Connect Webcast

Security awareness, Best practices, Cybersecurity
Learn how to measure your employees’ attitudes and perceptions towards security with the Infosec IQ Cybersecurity Culture Survey.
Watch now
Video

How cross-site scripting attacks work

Professional development, Best practices, Cybersecurity
Cross-site scripting attacks use insecure web apps to send malicious code to users — leading to account compromise, data loss and more.
Watch Now
Webinar & video

CMMC case study: Inside a CMMC assessment | Infosec Edge Webcast

Professional development, Compliance, Cybersecurity, Certification
Hundreds of thousands of organizations need to be assessed for their CMMC Level. Get an inside look at how the CMMC assessment process works.
Register now
Webinar & video

CMMC career path: How to become a CMMC Certified Assessor | Infosec Edge Webcast

Professional development, Compliance, Cybersecurity, Certification
Thousands of professionals need to be trained to support the new CMMC Framework. Learn about the various roles and career paths related to CMMC.
Watch now
Video

Inside a DDoS attack against a bank

Professional development, Best practices, Cybersecurity
Distributed denial-of-service attacks are often used to disrupt websites. Learn how one bank got attacked and what they did to stop it.
Watch Now
Video

How injection attacks work

Best practices, Cybersecurity
Injection attacks are the number one security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them.
Watch Now
Video

How to use the Infosec Skills platform

Best practices, Cybersecurity
Get access to 100s of additional hands-on skill and certification courses with Infosec Skills — FREE when you use code LEARN.
Watch Now
Webinar & video

Spring 2021 Product Update | Infosec Connect Webcast

Professional development, Cybersecurity, Certification
Join our product and content development teams in the upcoming webcast to see the latest additions to Infosec IQ security awareness training and Infosec Skills technical skill and certification training.
Watch now
Webinar & video

Choose Your Own Adventure® Meets Security Awareness

Security awareness
Zombie malware is circulating the office. Will your employees make the right decisions and save the organization or succumb to zombie malware?
Watch now
Webinar & video

Your beginner cybersecurity career questions, answered! | Cyber Work Live

Professional development, Cybersecurity
Get top-notch cybersecurity career advice for novices, including questions from Cyber Work Live viewers.
Watch now
Video

5 ways to prevent APT ransomware attacks

Best practices, Cybersecurity
Advanced Persistent Threat groups involvement in ransomware campaigns have made them nearly unstoppable. Learn how you can slow them down.
Watch Now
Webinar & video

ISACA career path: The highest paying certifications in the industry | Infosec Edge Webcast

Professional development, Cybersecurity, Certification
Learn about four of the most in-demand and highest-paying certifications — CISA, CISM, CRISC and CGEIT — with average salaries ranging from $103,000 to $133,000, according to Payscale.
Register now
Video

Using AI to level up your phishing attacks

Phishing, Security awareness, Cybersecurity
See a live demo of a phishing attack, and learn how cybercriminals are using AI to make them more effective — and more dangerous.
Watch Now
Video

Write a port scanner in Python in 5 minutes

Professional development, Cybersecurity
Port scanners are an essential network security tool. Open up your Linux terminal and learn how to write one using basic Python — right now.
Watch Now
Video

Connecting a malicious thumb drive

Security awareness, Cybersecurity
Is the thumb drive you found safe, or will it launch a nearly undetectable cyberattack that gives a cybercriminal control of your device?
Watch Now