Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.

Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

Inside Infosec IQ: Why clients choose Infosec for their security awareness training
Discover how you can strengthen security culture and achieve measurable results with Infosec IQ's award-winning training platform.
Network+: Exam details and process [2025 update]
Learn about the CompTIA Network+ exam, about the credential and how you can get Network+ certified.
How to get the CompTIA Network+ certification: Requirements and step-by-step instructions [2025 update]
Understand the reasons you might consider obtaining the CompTIA Network+ certification and the best way to obtain this globally recognized security management certification.

Azure Certification Exam Prep: Real Practice Questions | Guest Wilfredo Lanz
Learn about network security groups, storage accounts, virtual networks and identity protection with these Microsoft Azure practice questions.
CompTIA’s A+ exam: 220-1102
The CompTIA A+ credential offers several paths to fulfilling positions, including computer user support specialist, help desk technician or field service tec
Why employees keep falling for phishing (and the science to help them)
Phishing is an ever-present cybersecurity issue. And people keep falling for it. Here is why and how people keep falling for phishing emails.
Considerations when using open source to build an identity system
Identity systems are often complex. Can open source software help to take the load off developers to build an interoperable, secure, and usable digital identity?
Learn the 3 pillars of cyber security risk management and leadership
Cyber security leaders and those in cyber security risk management need to follow three pillars to successfully add value to an organization.

Betta Lyon Delsordo, Infosec scholarship 2022 winner, is a true life-long learner
A journey that begins in Montana with self-taught coding, Betta Lyon Delsordo is a 2022 Infosec Accelerate Scholarship winner.

Ethical hacking vs. penetration testing
History of ethical hacking It all began in the 1960s at MIT when the notion "hacker" was coined to mean someone dedicated to solving technical problems in m

Case Studies in Poor Password Management
Introduction In essence, a password is a cryptographic secret that needs proper storage and management. Even for individual users this can be a difficult ta
Kali Linux: Top 5 tools for digital forensics
There are many tools available from Kali Linux. These are the five most popular tools for digital forensics work.
Computer forensics interview questions
Computer forensic investigators are in high demand. Often referred to as digital forensics engineers, computer forensic investigators are expected to know ba
The digital security forensic analyst salary guide
One of the fastest-growing areas of information security is digital security forensics. With so much activity in today’s world taking place in the digital sp
Becoming a Cybersecurity Practitioner (CSXP)
Introduction The growing concern of cybercrime is pushing more and more companies to staff their IT teams with professionals that are able to implement prop
5 tactics to improve cybersecurity hiring results
Cybersecurity hiring can be difficult. Here are five tips you can implement now to help improve your odds of finding great candidates.
6 cybersecurity truisms the industry needs to rethink
Do cybersecurity cliches make you roll your eyes? Alyssa Miller breaks down five of the most comment (and dangerous) truisms and why they need to change.
Five ethical decisions cybersecurity pros face: What would you do?
Some examples of ethical dilemmas faced by cybersecurity professionals: What would you do?
Top 9 effective vulnerability management tips and tricks
Missing security updates are a top concern for organizations of all sizes. Here are nine tips and tricks for effective vulnerability management.

CISA certification: Overview and career path
If you want to be an IT auditor, or are one now and don’t have a certification, then why not consider the Certified Information Systems Auditor (CISA) creden
Converting a PCAP into Zeek logs and investigating the data
Learn how to better understand the Zeek log file structure and how to use the logs when investigating events.
Suricata: What is it and how can we use it
Learn about the open-source threat detection engine that is an intrusion detection system (IDS) and an intrusion prevention system (IPS).
Your next security bug won't even be in the software that you wrote
Your in-house developers check their software for security flaws, but the next bug might not come from them. It might come from your digital supply chain.
Cybersecurity in Biden’s era
With President's Day here, the 18th nationally appointed cybersecurity awareness month behind us, and Joe Biden's presidency at its midpoint—let’s review how