Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

Mobile forensics: Investigation process model

Brexit's Effects on Cyber Security

Exploiting format strings: Getting the shell

Process Hallowing

Pen Testing and Hacking Conferences – A Front Line Experience

Lab: identifying the use of covert channels

Assessing the Vulnerability of the UK to a Cyber-attack: A Multidisciplinary Analysis of Cyber Security.

Evolution in the world of cyber crime

Lab: GPG

App Transport Security

The Threatening Evolution of Exploit Kits

Ransomware and Its Impact On Small Businesses

BYOD Security Training for Physicians: The Whys, Whats, Hows and Whens

Understanding Critical Windows Artifacts and Their Relevance During An Investigation: Artifacts

The 5 Most Visible Cyber Attacks on Hospitals

How to Educate Healthcare Employees to Stop Ransomware

Metasploit Certification Study Plan

Understanding Critical Windows Artifacts and Their Relevance During Investigation: NTFS Timestamps

Is Penetration Testing a Degree?

Ransomware Case Studies: Hollywood Presbyterian & The Ottawa Hospital

Penetration Testing: Intelligence Gathering

How to Ensure HIPAA HITECH Compliance

Penetration Testing - Jobs, Certifications, Tools, and More

On the Road to Pen Testing - Why Infosec Training and Certification?