Security awareness and training content library
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends
Browse our featured content

Core Concepts: CMMC 2.0
Explore the challenges of defense spending and government contracting with this look at the Cybersecurity Maturity Model Certification, or CMMC.

Pick Your Path: Curse of the Mummy's Data
DANGER IN THE DARK! Ancient data lies in the pharaoh's tomb, and archaeologists will traverse every terrible trap to uncover it. Will the walking dead halt their mission, or will the pharaoh's personal information end up in a museum?

Pick Your Path: Zombie Invasion
Hannah's day just got a lot worse! As malware zombies take over, she needs you to make the right cybersecurity choices or face the possibility of becoming infected herself.

Core Concepts: Internet of Things (IoT)
Could your toaster be dangerous? Explore the importance and the challenges of smart devices with this introduction to the Internet of Things.

Core Concepts: Phishing
Phishing catches people every day. Learn about what phishing is, how it works and how to avoid the phisher’s net!

Core Concepts: Travel Security
Traveling opens you up to new experiences … and new dangers. Take a few minutes to learn about how you can stay cyber-safe while on the go.

Electronic Funds Transfer Act (EFTA)
The Electronic Funds Transfer Act covers what consumers and banks should do if there are fraudulent charges. Learn how it works, and how it could affect your organization.

FERPA for K-12
In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.

HIPAA HITECH
Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI.

Introduction to DFARS
This security and awareness training is an introduction to DFARS, or the Defense Federal Acquisition Regulation Supplement.

Just the Facts: Data Destruction
What do you do when you don’t need a piece of data any more? Take a few minutes to explore the hows and whys of data destruction.

Just the Facts: Data Privacy
Get the facts on data privacy. Find out what data privacy is, how it works ... and what happens when it goes wrong!

Just the Facts: Introduction for New Hires
To lead your team effectively, you need to know the way. Explore smart cybersecurity behaviors and learn about common threats in the digital world.

Need to Know: IoT
Smart devices may not be smart choices when it comes to office security. Join Ivana and Erica as they check out the potential dangers of unshielded IoT.

Need to Know: Malware Forecast
A malware storm is rolling in, and Cecil is the guy to tell you what to do! Harold learns about the dangers of malware while Cecil walks him through the best ways to defend yourself.

Need to Know: Proper Disposal
The office wants to properly dispose of a broken piece of equipment. Unfortunately, they haven't gotten the idea of 'proper disposal' quite right. Join Anthony and Mr. Louis as they pay their respects to one dearly departed printer, and how to properly dispose of electronic devices.

Need to Know: Public Wi-Fi
Mateo is looking for a stable public Wi-Fi connection. But each one turns out to have its own dangers, and his friend Neena shows him how to stay safe.

Need to Know: Too Much Information
In the cafeteria, Anthony teaches Karen the importance of not giving out more information than someone needs.

Need to Know: Unauthorized Cloud Services
Anthony and Harold talk about safe cloud storage ... and the unsafe cloud storage that Harold is already using. Oops. Learn how to properly use cloud services, and how improper use can be a serious risk.

OWASP A1 - Injection
This module covers the first OWASP application security risk: Injection. Learn about various types of injection and the associated risks to applications.

OWASP A9 - Using Components with Known Vulnerabilities
This module covers the ninth OWASP application security risk: Using Components with Known Vulnerabilities. Learn how this can impact your organization and work.

Work Bytes: Phishing
The captain gets a message that promises riches and adventure … But what does this treasure map really hide? Learn about phishing, and the dangers of suspicious emails.

Work Bytes: Public Wi-Fi
Staying safe on a work trip is a challenge, no matter who you are! Volkov the vampire struggles with public Wi-Fi, and Hal provides some late-night tech support.

CJIS Policy: Physical Security
This module covers the necessary defenses against unauthorized access to your facility and any paper copies of criminal justice information in your possession.