Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

Cybersecurity Weekly: California phished, ransomware tied to Hafnium, MobiKwik breach

Volodya/BuggiCorp Windows exploit developer: What you need to know

CGEIT certification exam study resources [updated 2021]

5 cybersecurity talent initiatives working to close the skills gap

Tomato 1: VulnHub CTF walkthrough

CGEIT certification exam Domain 1: Governance of Enterprise IT [updated 2021]

Python for network penetration testing: An overview

CEWLKID: 1 VulnHub CTF walkthrough, part 2

Python for exploit development: Common vulnerabilities and exploits

Certifications compared: CISSP vs. GSEC [updated 2021]

Python for exploit development: All about buffer overflows

Python language basics: understanding exception handling

Python for pentesting: Programming, exploits and attacks

MRBMiner malware: What it is, how it works and how to prevent it | Malware spotlight

CGEIT certification: Overview and career path [updated 2021]

Cybersecurity weekly: Acer hacked, Exchange targeted, Zoom bugs

Machine learning for social engineering

ICS/SCADA threats and threat actors

Cellular Networks and Mobile Security

ICS cyber ranges: Hands-on training for industrial control system security teams

Secure network protocols

CEWLKID: 1 VulnHub CTF walkthrough, part 1

Network security (101)

Fileless Windows Error Reporting (WER) malware attack: Technical overview and walkthrough