Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

ISC2 CSSLP domain 7: Secure software deployment, operations, maintenance

CertNexus certification and career path overview

ISC2 CSSLP domain 6: Secure software lifecycle management

ISC2 CSSLP domain 5: Secure software testing

How to write a port scanner in Python in 5 minutes: Example and walkthrough

Death rays, Death Stars and deathware?

Using Python for MITRE ATT&CK and data encrypted for impact

Explore Python for MITRE ATT&CK exfiltration and non-application layer protocol

7 steps to building a successful career in information security

Explore Python for MITRE ATT&CK command-and-control

Explore Python for MITRE ATT&CK email collection and clipboard data

Explore Python for MITRE ATT&CK lateral movement and remote services

VULNCMS: 1 VulnHub CTF Walkthrough, Part 1

ISC2 CSSLP domain 4: Secure software implementation

How to become a Chief Information Security Officer (CISO)

Explore Python for MITRE ATT&CK account and directory discovery

ZHtrap botnet: How it works and how to prevent it

ISC2 CSSLP domain 3: Secure software architecture and design

Explore Python for MITRE ATT&CK credential access and network sniffing

ISC2 CSSLP domain 2: Secure software requirements

ISC2 CSSLP domain 1: Secure software concepts

Attackers don’t hack in: They log in with your credentials

How to use Wireshark for protocol analysis: Video walkthrough

Beginner’s guide to the basics of data encryption