Infosec Boot Camps offer live, instructor-led cybersecurity and IT certification training in-person or online.
Infosec Self-Paced Training accommodates your schedule with instructor-guided, on-demand training.
The Infosec Intensive Cybersecurity Training program kickstarts cybersecurity careers in as little as 26 weeks with tailored training.
Infosec Skills provides on-demand cybersecurity training mapped to skill or role paths for any level.
Advance your team's cybersecurity skills with our customizable, industry-recognized programs and take advantage of our team training discounts.
We offer multiple ways to save when it comes to training and certifying your team.
Empower employees with knowledge and skills to stay cyber secure at work and home with 2,000+ security awareness resources.
Our human risk management solution, Infosec HRM, powered by Right-Hand Cybersecurity, increases visibility into security risk and provides alert-based training nudges to improve employee behaviors and decrease security events.
Security education to the right people from IT and security staff to the C-suite and every employee.
Skills and certifications your team should get next with training mapped to NIST and NICE Frameworks.
Flexible, scalable training solutions that add value to your client services portfolio and reduce business risk.
We help IT and security professionals advance their careers with skills development and certifications while empowering all employees with security awareness and phishing training to stay cyber safe at work and home.
August 11, 2018
Secure document phishing attacks are some of the latest in client endpoint exploits that have been plaguing the computing world. While these phishing attempt
August 2, 2018
The Fair Credit Reporting Act, or FCRA, is a piece of legislation passed by Congress in 1970 to promote fairness, accuracy and privacy for information that c
The Red Flags Rule, or RFR, is one of the identity protection rules found in the Federal Credit Reporting Act (FCRA). More specifically, RFR deals with prote
Protecting children online should be of paramount importance to all, especially in today's world. In response to this pressing issue, in 1998 Congress enacte
August 1, 2018
NOTE: This article reflects an older version of the Security+ Exam – please see the current Security+ Certification page for the most up-to-date information.
July 31, 2018
Introduction Just like any good treasure hunt, you need a map or clues to be successful. Threat hunting is no different – Indicators of Compromise (IoC) can
Introduction Unfortunately, cyber-attacks are just a fact of life in today’s world. Anyone with a laptop or smartphone can quickly write malicious code to vi
Introduction When threats are detected on a network, domains can serve as good indicators that the network is compromised. In many cases, this compromise cou
Introduction Imagine that you are sitting at your workstation at work and you notice that your environment is experiencing a higher than usual HTML response
What is one of the first things that you think of when thinking of potential threat activity on your network? Most would probably say that there has been som
Introduction When attackers have breached your network, one of the most common things they will be doing is looking into your systems that have sensitive dat
Searching for Unusual DNS Requests is a standard method for threat hunting. The presence of Unusual DNS Requests can often tip off Information Security profe