Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

What a Challenger Perceives in most CTF Categories/Challenges

Security in Projects: The Importance of Effective Social and Soft Skills

How malware detects virtualized environment (and its countermeasures)

EINSTEIN System is Still Too Immature to Protect Fully the US Government Networks

Why Does No One Talk about BYOD Anymore?

SAP Cybersecurity History

SAP Afaria Security: Attacking Mobile Device Management (MDM) Solution

Windows logging for PCI-DSS

Web Application Firewall 101: How to Prevent Web Hacking

SQL injection analysis

Why ITIL, COBIT and Other Non-Infosec Based Frameworks Are Infosec’s Best Friends

Digital forensics models

Creating your Own Simple Exploit Module for a Remote Code Execution in Web Apps

Spear phishing: Real life examples

IoT Security Awareness

BlackEnergy Used as a Cyber Weapon Against Ukrainian Critical Infrastructure

Cracking Damn Insecure and Vulnerable App (DIVA) – part 3:

A Case Study of Information Stealers: Part II

Cellphone Surveillance: The Secret Arsenal

Cracking Damn Insecure and Vulnerable App (DIVA) – Part 2:

Cracking damn insecure and vulnerable app (DIVA) : Part 1

A Beginner’s Guide to Setting Up an SNMP Pentest Lab Using Vyos and Pfsense

Domain-Based Message Authentication Reporting and Conformance

2016 Cyber Security Predictions: From Extortion to Nation-state Attacks