Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

5 ways to identify a spear phishing email

IoT firmware analysis -- Firmwalker

Importance of IP Fragmentation in Penetration Testing

Android penetration tools walkthrough series: QARK

10 most common phishing attacks

Closing the Gender Gap: Women in Cybersecurity

CGEIT Domain 5: Resource Optimization [DECOMMISSIONED ARTICLE]

DoD 8570 IAM certification – Level I

The IAPP CIPP/US certification: The leading U.S. privacy credential

NIST CyberSecurity Framework

DoD IASAE Overview

CGEIT Domain 4: Risk Optimization

Memory forensics and analysis using volatility

Top 5 email retention policy best practices

The Rowhammer: the Evolution of a Dangerous Attack

Privilege escalation on linux with live examples

DoD 8570 IAM certification and requirements

Learning curve: Security awareness in education

What is an XXE attack?

Top six SIEM use cases

CERT-Certified Computer Security Incident Handler (CSIH)

Insider Threat: How to Protect Your Business from Your Own Employees

Threat Hunting – Zyklon Trojan

Top 10 solutions to protect against DDoS attacks and increase security