Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

Advice to a New SCADA Engineer

An Introduction to cybersecurity policy

Hooking and patching android apps using Xposed framework

Insidious Gmail Phishing Attacks: New Variants Leveraging An Old Scheme

API Call Logging: Windows API

Security Awareness Training for the European Union General Data Protection Regulation (EU GDPR)

An Introduction to tmux

USV CTFh

An Examination of the Caesar Methodology, Ciphers, Vectors, and Block Chaining

Stapler Walkthrough

Integrate WHONIX with Kali Linux to achieve anonymity

10 Security Vulnerabilities That Broke the World Wide Web in 2016

Unprotected MongoDB Installations: Child's Play for Hackers

A brief summary of encryption method used in widespread ransomware

Best guide for preparation of SIEM POC (Proof of Concept)

Latest trends in cybersquatting

A Review of Cryptography

The Best Techniques to Avoid Phishing Scams

The Advantages and Benefits of Automating Web Security

Penetration testing and the law

System Configuration of Biometrics-The Network Topologies

When Convenience Trumps Security

The Biggest Cyber-Security Incidents of 2016

Setting Up a VPN-Based Penetration Testing Lab