Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources


PMP Domain #1: People [updated 2021]

Cybersecurity Weekly: Ryuk ransomware, U.S. pipeline outage, Chrome privacy update

The OSCP certification and exam [updated 2021]

Cybersecurity project manager: Is it the career for you?

Insider threat report: Tesla employee thwarts $1 million bribery attempt

Two ways to build a cybersecurity team using the NICE Framework

Sparrow.ps1: Free Azure/Microsoft 365 incident response tool

VMware vCenter vulnerability: Inside a critical remote code execution flaw

Cybersecurity Weekly: SonicWall zero-day, Experian leak, Python vulnerability

The top 10 highest-paying jobs in information security in 2021

Smart Toys and Their Cybersecurity Risks: Are Our Toys Becoming a Sci-Fi Nightmare? [updated 2021]

Top 7 malware sample databases and datasets for research and training

Cybersecurity is a public health crisis, so why don’t we treat it that way?

Top 10 most in-demand cybersecurity skills for 2021

5 reasons to implement a self-doxxing program at your organization

CGEIT Frequently Asked Questions (FAQ) [updated 2021]

Cybersecurity Weekly: Geico data breach, SonicWall under attack, Twitter email

How To Become CGEIT Certified – Certification Requirements [updated 2021]

What is homomorphic encryption?

6 most sophisticated phishing attacks of 2020

Man-in-the-middle attack: Real-life example and video walkthrough

Odin 1: VulnHub CTF walkthrough

Cryptocurrency Enforcement Framework: Impacts on digital forensic investigations