Security Awareness & Training Resource Center
Boost the effectiveness of your security awareness program or earn your next certification with free tools from our resource center. Check back frequently — new resources are added every month!
Topic
Type
View Results
Filter Results
Cyberjutsu Scholarship Winner, Mansi Thakar, earns her PMP with Infosec Skills
Professional development, Cybersecurity, Certification
We sat down with Mansi Thakar, a cybersecurity professional and Women’s Society of Cyberjustu (WSC) scholarship winner that used her lifetime access to Infosec Skills to earn her PMP certification.
Read more
Cybersecurity Culture — Quantified
Security awareness, Cybersecurity
See the data on the most overlooked variable in security and learn how to measure your organization's cybersecurity culture.
Download
CMMC rollout: How CMMC will impact your organization | Infosec Edge Webcast
Professional development, Compliance, Cybersecurity, Certification
More than 300,000 organizations will be affected by the new CMMC Framework. Learn how your organization will be affected.
Watch now
Infosec IQ training module catalog
Security awareness
Educate and engage your employees with the industry’s leading security awareness and training modules.
Download
Infosec Skills course catalog
Professional development, Cybersecurity, Certification
Infosec Skills keeps your team's security skills fresh year-round with hundreds of courses mapped to the NICE Cybersecurity Workforce Framework.
Download
ROI of Security Awareness Calculator
Security awareness
Use industry averages from Osterman Research to instantly calculate your return on security awareness training, or customize your results with data from your own organization’s data.
Calculate ROI
Cybersecurity and all things privacy | Cyber Work Podcast
Professional development, Cybersecurity
Today's podcast highlights implementation privacy, policy privacy and all things privacy with privacy expert and Infosec Skills author and instructor Chris Stevens. From his years in the government’s office of national intelligence to his multiple IAPP certifications, Stevens is happy to tell you everything you ever wanted to know about careers in privacy, around privacy and careers that would be better with a helping of privacy skills on top!
0:00 - Cybersecurity privacy
3:30 - Getting interested in cybersecurity
4:40 - Cybersecurity in the Department of Defense
6:00 - Computer science studies
8:50 - Cybersecurity research
11:05 - Information privacy and privacy professionals
14:48 - What does U.S. privacy cover?
19:10 - Privacy certifications and more
21:36 - Privacy differences across countries
24:50 - Difference in privacy certifications
27:16 - Learning about privacy
30:16 - Positions available for information privacy
33:50 - Educational steps to work in privacy
36:00 - Getting a job in privacy
37:57 - Entry-level work in privacy roles
42:44 - How to stay on track in lifelong learning
46:37 - Cybersecurity education in the future
48:19 - Outro
0:00 - Cybersecurity privacy
3:30 - Getting interested in cybersecurity
4:40 - Cybersecurity in the Department of Defense
6:00 - Computer science studies
8:50 - Cybersecurity research
11:05 - Information privacy and privacy professionals
14:48 - What does U.S. privacy cover?
19:10 - Privacy certifications and more
21:36 - Privacy differences across countries
24:50 - Difference in privacy certifications
27:16 - Learning about privacy
30:16 - Positions available for information privacy
33:50 - Educational steps to work in privacy
36:00 - Getting a job in privacy
37:57 - Entry-level work in privacy roles
42:44 - How to stay on track in lifelong learning
46:37 - Cybersecurity education in the future
48:19 - Outro
Listen now
Working in DevOps | Cyber Work Podcast
Professional development, Cybersecurity
Steve Pereira of Visible Value Stream Consulting discusses DevOps, SecOps, DevSecOps and his own lifelong love of streamlining projects. You’ll hear how his dad’s job with Bell Telephone facilitated his early explorations, the intersections of DevOps and Agile, the ever-important security component of it all and why following your interests and not the big money payouts might not work in the short run, but ultimately will get you where you want to go in the end.
0:00 - Intro
2:35 - Cybersecurity origin story
6:02 - Build and release engineering
9:27 - Tech and business
11:20 - DevOps projects
12:10 - Automating yourself out of your job
13:44 - What is DevOps?
23:45 - Method for DevOps success
31:47 - Development team vs security team
36:03 - DevOps history and Agile
44:50 - How do I work in DevOps?
52:09 - Visible Value Stream Consulting
54:42 - Outro
0:00 - Intro
2:35 - Cybersecurity origin story
6:02 - Build and release engineering
9:27 - Tech and business
11:20 - DevOps projects
12:10 - Automating yourself out of your job
13:44 - What is DevOps?
23:45 - Method for DevOps success
31:47 - Development team vs security team
36:03 - DevOps history and Agile
44:50 - How do I work in DevOps?
52:09 - Visible Value Stream Consulting
54:42 - Outro
Listen now
Working as a digital forensics analyst | Cybersecurity Career Series
Professional development, Cybersecurity
Digital forensics analysts collect, analyze and interpret digital evidence to reconstruct potential criminal events and/or aid in preventing unauthorized actions from threat actors. They help recover data like documents, photos and emails from computer or mobile device hard drives and other data storage devices, such as zip folders and flash drives, that have been deleted, damaged or otherwise manipulated. Digital forensic analysts carefully follow chain of custody rules for digital evidence and provide evidence in acceptable formats for legal proceedings.
0:00 - Intro
0:26 - What is a digital forensics analyst?
0:57 - Digital forensics specialties
1:24 - How to become a digital forensics analyst
2:17 - Skills needed to be a digital forensics analyst
3:34 - Common tools for a digital forensics analyst
4:42 - Using digital forensics tools
5:17 - Digital forensics analyst jobs
6:30 - Moving from digital forensics to new roles
7:17 - Get started in digital forensics
8:18 - Outro
0:00 - Intro
0:26 - What is a digital forensics analyst?
0:57 - Digital forensics specialties
1:24 - How to become a digital forensics analyst
2:17 - Skills needed to be a digital forensics analyst
3:34 - Common tools for a digital forensics analyst
4:42 - Using digital forensics tools
5:17 - Digital forensics analyst jobs
6:30 - Moving from digital forensics to new roles
7:17 - Get started in digital forensics
8:18 - Outro
Listen now
Infosec Skills instant demo: Close your team’s skills gap
Watch now
Three foundational cybersecurity certifications | Cyber Work Podcast
Professional development, Cybersecurity
Infosec Skills author Mike Meyers of Total Seminars discusses three foundational certifications that will start you on just about any path you want to go. Specifically, the CompTIA A+, Network+ and Security+ certifications. Meyers dispenses tough love for people who want someone else to map their career for them, talks up the benefits of vendor-neutral certifications and blows minds by comparing certifications with car windshield wipers. Intrigued? You should be! That’s all today, on Cyber Work!
0:00 - Intro
3:00 - Beginning in cybersecurity
3:23 - Why teach cybersecurity?
5:54 - Why CompTIA?
6:57 - Start vendor neutral with cybersecurity certification
12:10 - Being diverse in cybersecurity is essential
13:35 - Why A+, Network+ and Security+?
25:53 - Guiding your cybersecurity career
30:05 - Where to learn cybersecurity skills
42:02 - Cybersecurity job dilution
44:20 - Where do I begin my cybersecurity career?
48:32 - Using the Infosec Skills platform
49:38 - Mike Meyers' next projects
51:30 - What is Total Seminars?
52:12 - Learn more about Meyers and Total Seminars
53:23 - Outro
0:00 - Intro
3:00 - Beginning in cybersecurity
3:23 - Why teach cybersecurity?
5:54 - Why CompTIA?
6:57 - Start vendor neutral with cybersecurity certification
12:10 - Being diverse in cybersecurity is essential
13:35 - Why A+, Network+ and Security+?
25:53 - Guiding your cybersecurity career
30:05 - Where to learn cybersecurity skills
42:02 - Cybersecurity job dilution
44:20 - Where do I begin my cybersecurity career?
48:32 - Using the Infosec Skills platform
49:38 - Mike Meyers' next projects
51:30 - What is Total Seminars?
52:12 - Learn more about Meyers and Total Seminars
53:23 - Outro
Listen now
Cyber Work Live Q&A: Get your career questions answered
Professional development, Cybersecurity
Register now
Learn intrusion detection: Using Zeek and Elastic for incident response
Professional development, Cybersecurity
Bad actors are in your network, but how can you tell? Watch Infosec Skills author Mark Viglione's live intrusion detection demo to find out.
Watch now
The ransomware paper: Real-life insights and predictions from the trenches
Security awareness, Best practices, Cybersecurity
What mistakes are allowing ransomware to spread? And where will ransomware actors turn in the future? Find out.
Download
What does a security architect do? | Cybersecurity Career Series
Professional development, Cybersecurity
Security Architects are responsible for planning, designing, testing, implementing and maintaining an organization's computer and network security infrastructure. Security Architects develop information technology rules and requirements that describe baseline and target architectures and support enterprise mission needs.
Advanced technical knowledge of network/web protocols, infrastructure, authentication, enterprise risk management, security engineering, communications and network security, identity and access management, and incident response, is critical to success in this role.
0:00 - Intro
0:31 - What is a security architect?
1:07 - How to become a security architect
2:15 - What certifications should a security architect get?
3:07 - Skills a security architect needs
4:07 - Learning as a security architect
7:06 - Security architect tools
7:58 - Where do security architects work
9:28 - Private vs federal security architects
11:09 - Related roles to security architect
12:12 - Start working toward security architect
13:23 - Outro
Advanced technical knowledge of network/web protocols, infrastructure, authentication, enterprise risk management, security engineering, communications and network security, identity and access management, and incident response, is critical to success in this role.
0:00 - Intro
0:31 - What is a security architect?
1:07 - How to become a security architect
2:15 - What certifications should a security architect get?
3:07 - Skills a security architect needs
4:07 - Learning as a security architect
7:06 - Security architect tools
7:58 - Where do security architects work
9:28 - Private vs federal security architects
11:09 - Related roles to security architect
12:12 - Start working toward security architect
13:23 - Outro
Listen now
Data backup in ransomware situations | Cyber Work Podcast
Professional development, Cybersecurity
Curtis Preston, aka “Mr. Backup,” has been in the backup and recovery space since 1993. He’s written four books, hosts a podcast called “Restore it all,” founded backupcentral.com and is a tech evangelist for SaaS data protection company Druva. We talk about disaster recovery, the role of good backup in ransomware situations and why the data recovery person and the information security person in your company need to become fast friends and start sharing notes. Also, why we’ve all been completely wrong about tape backup systems.
0:00 - Cyber Work intro
2:40 - Mr. Backup origin story
4:01 - How backup and recovery has changed
7:44 - Data duplication during a disaster
9:45 - Speed of data recovery changes
12:47 - Benefit to physical data backups
15:37 - Common long-term data backup mistakes
19:04 - Other issues with data recovery
23:22 - Limits of disaster recovery
34:16 - Encryption options
39:44 - Jobs in data backup and recovery
44:54 - Benefit to learning data backup and recovery
46:53 - Data backup and recovery outlook
52:52 - What is the Restore It All podcast?
56:15 - What is Druva?
59:45 - Where can I learn more about Mr. Backup?
1:00:32 - Cyber Work outro
0:00 - Cyber Work intro
2:40 - Mr. Backup origin story
4:01 - How backup and recovery has changed
7:44 - Data duplication during a disaster
9:45 - Speed of data recovery changes
12:47 - Benefit to physical data backups
15:37 - Common long-term data backup mistakes
19:04 - Other issues with data recovery
23:22 - Limits of disaster recovery
34:16 - Encryption options
39:44 - Jobs in data backup and recovery
44:54 - Benefit to learning data backup and recovery
46:53 - Data backup and recovery outlook
52:52 - What is the Restore It All podcast?
56:15 - What is Druva?
59:45 - Where can I learn more about Mr. Backup?
1:00:32 - Cyber Work outro
Listen now
[Free Poster] Marine Lowlifes: Clone Phish
Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
[Free Poster] Marine Lowlifes: Common Phish
Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
[Free Poster] Marine Lowlifes: Spearphish
Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
[Free Poster] Outsmart Them All: Btyedown
Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
[Free Poster] Outsmart Them All: Gramscam
Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
[Free Poster] Wild Wild Net: IoT Train
Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
[Free Poster] Outsmart Them All: Shadybug
Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download