Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.
Our resources

Playing by the Rules: Performing Firewall Audits

Protect Your Wireless Network from Leechers and Hackers

IObit Protected Folder Authentication Bypass

Metadata: The Hidden Treasure

Chapter 7: The role of cryptography in information security

Vulnerability Scanners

Social Media Security

WebInspect

Traffic Anomaly Detection – TCP and DNS

Defending yourself from Google hackers

w3af walkthrough and tutorial part 4 - w3af tools, profiles and scripting

Firewall Security Testing

Man in the Browser Attack vs. Two Factor Authentication

Understanding the Origins of the China - Philippine Cyber War

AlienVault OSSIM Review - Open Source SIEM

Hacking AutoUpdate by Injecting Fake Updates

Passive Fingerprinting

Iframe & the security risk

OSINT and pre-game show for a on-site WLAN Penetration Test

Malware Analysis - Follow along reversing the German government's "Bundestrojaner"

The Importance of Securing a Linux Web Server

SQL injection through HTTP headers

Mexican Drug Cartels and Cyberspace: Opportunity and Threat

DarkComet analysis – Understanding the Trojan used in Syrian uprising