Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

Blockchain and asymmetric cryptography

BlackBerry exposes threat actor group BAHAMUT: Cyberespionage, phishing and other APTs

Security of the PKI ecosystem

IT auditing and controls: A look at application controls [updated 2021]

Elliptic curve cryptography

AWS APIs abuse: Watch out for these vulnerable APIs

How To Earn CGEIT CPE Credits [updated 2021]

Purple team cyber ranges: Hands-on training for red and blue teams

Decrypting SSL/TLS traffic with Wireshark [updated 2021]

Ghimob Trojan Banker: What it is, how it works and how to prevent it | Malware spotlight

Dumping a complete database using SQL injection [updated 2021]

Cybersecurity weekly: SolarWinds blames intern, AOL phishing scam, Kia ransomware attack

Cyber ranges: Who are they for and how can they help

Basic snort rules syntax and usage [updated 2021]

What types of cybersecurity skills can you learn in a cyber range?

Hack the Box [HTB] machines walkthrough CTF series — Omni

Stacks and Heap

Cybersecurity Weekly: Phishing attacks spike, SHAREit patch, NSA exploit

ELECTION: 1 VulnHub CTF walkthrough

Key findings from ESG’s Modern Application Development Security report

CloudGoat walkthrough series: IAM privilege escalation by attachment

How to reserve a CVE: From vulnerability discovery to disclosure

SonicWall firewall VPN vulnerability (CVE-2020-5135): Overview and technical walkthrough

IDS/IPS overview