Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

What types of attack scenarios can you simulate in a cyber range?

Network Forensics Tools

The need for Network Forensics

Network Forensics Concepts

Fake online shopping websites: 6 ways to identify a fraudulent shopping website

Networking Fundamentals for Forensic Analysts

All about carding (for noobs only) [updated 2021]

PCAP analysis basics with Wireshark [updated 2021]

The top 5 pentesting tools you will ever need [updated 2021]

What is a firewall: An overview

Rivest Cipher 4 (RC4)

Understanding stream ciphers in cryptography

CA Installation and Use in Windows 10

Security awareness behavior & culture: Ask us anything

Hack the Box (HTB) machines walkthrough series — Fuse

Threat modeling: Technical walkthrough and tutorial

Certificates overview and use in Windows 10

Top 50 information security interview questions [updated for 2021]

Best free and open source SQL injection tools [updated 2021]

Hacking communities in the deep web [updated 2021]

Password security: Complexity vs. length [updated 2021]

How to hack Android devices using the StageFright vulnerability [updated 2021]

Top 8 reverse engineering tools for cyber security professionals [updated 2021]

Popular computer forensics top 19 tools [updated 2021]