Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

NPK: Free tool to crack password hashes with AWS

LOOZ 1 VulnHub CTF Walkthrough

Malware analysis arsenal: Top 15 tools

Why a skills shortage is one of the biggest security challenges for companies

Best CGRC certification study resources and training materials

Most valuable cybersecurity skills to learn in 2022

New Cybersecurity Weekly: Log4j vulnerability, Guarding against smishing and Navigating privacy laws

DIGITALWORLD.LOCAL: FALL Vulnhub CTF walkthrough

Top 10 CRISC Interview Questions [updated 2021]

CRISC certification: Overview & career path [updated 2021]

HACKER KID 1.0.1: VulnHub CTF walkthrough part 2

Top tools for mobile android assessments

How should your company think about investing in security?

ISC2 CGRC certification exam: Overview of domains

Cybersecurity Weekly: Malvertising campaigns, Wi-Fi router vulnerabilities and holiday-themed resources

HACKER KID 1.0.1 VulnHub CTF Walkthrough Part 1

The ransomware paper (part 2): Real-life scenarios and lessons learned

Compromise assessment or threat hunting? What do organizations need?

HACKSUDO: THOR VulnHub CTF walkthrough

The 5 biggest cryptocurrency heists of all time

Pay GDPR? No thanks, we’d rather pay cybercriminals

10 biggest cybersecurity fines, penalties and settlements of 2021 (so far)

Fixing the cybersecurity skills gap: Draw on wider talent pools

Will a Digital Bill of Rights solve machine learning and privacy issues?