Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.
![Inside an Infosec Boot Camp: All your questions, answered! [replay]](/globalassets/is-wb-24-05-inside-an-infosec-boot-camp_thumbnail2.webp?width=338&height=304&rmode=Max&bgcolor=transparent)
Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources

How Are Credentials Used In Applications?

How To Exploit Least Privilege Vulnerabilities

Phishing attack timeline: 21 hours from target to detection

XSS Vulnerabilities Exploitation Case Study

What is is integer overflow and underflow?

SQL Injection Vulnerabilities Exploitation Case Study

CyberSploit 2 VulnHub CTF walkthrough

Malicious Amazon Machine Images (AMIs)

CyberSploit 1: VulnHub CTF walkthrough

First Safe Harbor, then Privacy Shield: What EU-US data-sharing agreement is next?

7 Steps of the MITRE ATT&CK®-based Analytics Development Method

How to Use MITRE ATT&CK® to Map Defenses and Understand Gaps

Using MITRE ATT&CK®-based analytics for threat detection: 5 principles

Use cases for implementing the MITRE ATT&CK® framework

How to Use the MITRE ATT&CK® Framework and the Lockheed Martin Cyber Kill Chain Together

How to make cybersecurity budget cuts without sacrificing security

Nworm malware: What it is, how it works and how to prevent it | Malware spotlight

Cybersecurity Weekly: Apple patches, job offer phishing, Cisco zero-day

How to use the MITRE ATT&CK® framework and diamond model of intrusion analysis together

MITRE ATT&CK® Framework Tactics: An Overview

MITRE ATT&CK® Framework Matrices: An Overview

55 federal and state regulations that require employee security awareness and training

Malicious Docker images: How to detect vulnerabilities and mitigate risk

The Ultimate Guide to the MITRE ATT&CK® Framework