Security Awareness & Training Resource Center

Boost the effectiveness of your security awareness program or earn your next certification with free tools from our resource center. Check back frequently — new resources are added every month!

Topic
Type
View Results
Filter Results
Case study

Cyberjutsu Scholarship Winner, Mansi Thakar, earns her PMP with Infosec Skills

Professional development, Cybersecurity, Certification
We sat down with Mansi Thakar, a cybersecurity professional and Women’s Society of Cyberjustu (WSC) scholarship winner that used her lifetime access to Infosec Skills to earn her PMP certification.
Read more
Whitepaper & report

Cybersecurity Culture — Quantified

Security awareness, Cybersecurity
See the data on the most overlooked variable in security and learn how to measure your organization's cybersecurity culture.
Download
Webinar & video

CMMC rollout: How CMMC will impact your organization | Infosec Edge Webcast

Professional development, Compliance, Cybersecurity, Certification
More than 300,000 organizations will be affected by the new CMMC Framework. Learn how your organization will be affected.
Watch now
Poster, infographic & tool

Infosec IQ training module catalog

Security awareness
Educate and engage your employees with the industry’s leading security awareness and training modules.
Download
Poster, infographic & tool

Infosec Skills course catalog

Professional development, Cybersecurity, Certification
Infosec Skills keeps your team's security skills fresh year-round with hundreds of courses mapped to the NICE Cybersecurity Workforce Framework.
Download
Poster, infographic & tool

ROI of Security Awareness Calculator

Security awareness
Use industry averages from Osterman Research to instantly calculate your return on security awareness training, or customize your results with data from your own organization’s data.
Calculate ROI
Podcast

Cybersecurity and all things privacy | Cyber Work Podcast

Professional development, Cybersecurity
Today's podcast highlights implementation privacy, policy privacy and all things privacy with privacy expert and Infosec Skills author and instructor Chris Stevens. From his years in the government’s office of national intelligence to his multiple IAPP certifications, Stevens is happy to tell you everything you ever wanted to know about careers in privacy, around privacy and careers that would be better with a helping of privacy skills on top!

0:00 - Cybersecurity privacy
3:30 - Getting interested in cybersecurity
4:40 - Cybersecurity in the Department of Defense
6:00 - Computer science studies
8:50 - Cybersecurity research
11:05 - Information privacy and privacy professionals
14:48 - What does U.S. privacy cover?
19:10 - Privacy certifications and more
21:36 - Privacy differences across countries
24:50 - Difference in privacy certifications
27:16 - Learning about privacy
30:16 - Positions available for information privacy
33:50 - Educational steps to work in privacy
36:00 - Getting a job in privacy
37:57 - Entry-level work in privacy roles
42:44 - How to stay on track in lifelong learning
46:37 - Cybersecurity education in the future
48:19 - Outro
Listen now
Podcast

Working in DevOps | Cyber Work Podcast

Professional development, Cybersecurity
Steve Pereira of Visible Value Stream Consulting discusses DevOps, SecOps, DevSecOps and his own lifelong love of streamlining projects. You’ll hear how his dad’s job with Bell Telephone facilitated his early explorations, the intersections of DevOps and Agile, the ever-important security component of it all and why following your interests and not the big money payouts might not work in the short run, but ultimately will get you where you want to go in the end.

0:00 - Intro
2:35 - Cybersecurity origin story
6:02 - Build and release engineering
9:27 - Tech and business
11:20 - DevOps projects
12:10 - Automating yourself out of your job
13:44 - What is DevOps?
23:45 - Method for DevOps success
31:47 - Development team vs security team
36:03 - DevOps history and Agile
44:50 - How do I work in DevOps?
52:09 - Visible Value Stream Consulting
54:42 - Outro
Listen now
Podcast

Working as a digital forensics analyst | Cybersecurity Career Series

Professional development, Cybersecurity
Digital forensics analysts collect, analyze and interpret digital evidence to reconstruct potential criminal events and/or aid in preventing unauthorized actions from threat actors. They help recover data like documents, photos and emails from computer or mobile device hard drives and other data storage devices, such as zip folders and flash drives, that have been deleted, damaged or otherwise manipulated. Digital forensic analysts carefully follow chain of custody rules for digital evidence and provide evidence in acceptable formats for legal proceedings.

0:00 - Intro
0:26 - What is a digital forensics analyst?
0:57 - Digital forensics specialties
1:24 - How to become a digital forensics analyst
2:17 - Skills needed to be a digital forensics analyst
3:34 - Common tools for a digital forensics analyst
4:42 - Using digital forensics tools
5:17 - Digital forensics analyst jobs
6:30 - Moving from digital forensics to new roles
7:17 - Get started in digital forensics
8:18 - Outro
Listen now
Webinar & video

Infosec Skills instant demo: Close your team’s skills gap

Watch now
Podcast

Three foundational cybersecurity certifications | Cyber Work Podcast

Professional development, Cybersecurity
Infosec Skills author Mike Meyers of Total Seminars discusses three foundational certifications that will start you on just about any path you want to go. Specifically, the CompTIA A+, Network+ and Security+ certifications. Meyers dispenses tough love for people who want someone else to map their career for them, talks up the benefits of vendor-neutral certifications and blows minds by comparing certifications with car windshield wipers. Intrigued? You should be! That’s all today, on Cyber Work!

0:00 - Intro
3:00 - Beginning in cybersecurity
3:23 - Why teach cybersecurity?
5:54 - Why CompTIA?
6:57 - Start vendor neutral with cybersecurity certification
12:10 - Being diverse in cybersecurity is essential
13:35 - Why A+, Network+ and Security+?
25:53 - Guiding your cybersecurity career
30:05 - Where to learn cybersecurity skills
42:02 - Cybersecurity job dilution
44:20 - Where do I begin my cybersecurity career?
48:32 - Using the Infosec Skills platform
49:38 - Mike Meyers' next projects
51:30 - What is Total Seminars?
52:12 - Learn more about Meyers and Total Seminars
53:23 - Outro
Listen now
Webinar & video

Cyber Work Live Q&A: Get your career questions answered

Professional development, Cybersecurity
Register now
Webinar & video

Learn intrusion detection: Using Zeek and Elastic for incident response

Professional development, Cybersecurity
Bad actors are in your network, but how can you tell? Watch Infosec Skills author Mark Viglione's live intrusion detection demo to find out.
Watch now
Whitepaper & report

The ransomware paper: Real-life insights and predictions from the trenches

Security awareness, Best practices, Cybersecurity
What mistakes are allowing ransomware to spread? And where will ransomware actors turn in the future? Find out.
Download
Podcast

What does a security architect do? | Cybersecurity Career Series

Professional development, Cybersecurity
Security Architects are responsible for planning, designing, testing, implementing and maintaining an organization's computer and network security infrastructure. Security Architects develop information technology rules and requirements that describe baseline and target architectures and support enterprise mission needs.

Advanced technical knowledge of network/web protocols, infrastructure, authentication, enterprise risk management, security engineering, communications and network security, identity and access management, and incident response, is critical to success in this role.

0:00 - Intro
0:31 - What is a security architect?
1:07 - How to become a security architect
2:15 - What certifications should a security architect get?
3:07 - Skills a security architect needs
4:07 - Learning as a security architect
7:06 - Security architect tools
7:58 - Where do security architects work
9:28 - Private vs federal security architects
11:09 - Related roles to security architect
12:12 - Start working toward security architect
13:23 - Outro
Listen now
Podcast

Data backup in ransomware situations | Cyber Work Podcast

Professional development, Cybersecurity
Curtis Preston, aka “Mr. Backup,” has been in the backup and recovery space since 1993. He’s written four books, hosts a podcast called “Restore it all,” founded backupcentral.com and is a tech evangelist for SaaS data protection company Druva. We talk about disaster recovery, the role of good backup in ransomware situations and why the data recovery person and the information security person in your company need to become fast friends and start sharing notes. Also, why we’ve all been completely wrong about tape backup systems.

0:00 - Cyber Work intro
2:40 - Mr. Backup origin story
4:01 - How backup and recovery has changed
7:44 - Data duplication during a disaster
9:45 - Speed of data recovery changes
12:47 - Benefit to physical data backups
15:37 - Common long-term data backup mistakes
19:04 - Other issues with data recovery
23:22 - Limits of disaster recovery
34:16 - Encryption options
39:44 - Jobs in data backup and recovery
44:54 - Benefit to learning data backup and recovery
46:53 - Data backup and recovery outlook
52:52 - What is the Restore It All podcast?
56:15 - What is Druva?
59:45 - Where can I learn more about Mr. Backup?
1:00:32 - Cyber Work outro
Listen now
Poster, infographic & tool

[Free Poster] Marine Lowlifes: Clone Phish

Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
Poster, infographic & tool

[Free Poster] Marine Lowlifes: Common Phish

Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
Poster, infographic & tool

[Free Poster] Marine Lowlifes: Spearphish

Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
Poster, infographic & tool

[Free Poster] Outsmart Them All: Btyedown

Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
Poster, infographic & tool

[Free Poster] Outsmart Them All: Gramscam

Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
Poster, infographic & tool

[Free Poster] Wild Wild Net: IoT Train

Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download
Poster, infographic & tool

[Free Poster] Outsmart Them All: Shadybug

Security awareness
Boost awareness and reinforce key lessons from your training program with free security awareness posters from Infosec IQ.
Download