Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Core Concepts CMMC 2.0: Understanding the Key Elements for Compliance
Explore the challenges of defense spending and government contracting with this look at the Cybersecurity Maturity Model Certification, or CMMC.

CJIS Policy Dissemination and Destruction Procedure: A Comprehensive Guide
This module outlines how to properly dispose of criminal justice information (CJI), how to locate and remove CJI securely, when CJI should be destroyed and best practices for destroying CJI.

CJIS Policy Media Protection: A Comprehensive Guide
This module outlines data-handling best practices, such as avoiding malware, applying encryption and proper disposal of physical media containing criminal justice information.

Complying with NIST: A Guide to NIST 800-171 Compliance
This security and awareness module will explore the issue of organizational compliance with NIST 800-171 guidelines.

Comprehensive Guide to CCPA Training: Everything You Need to Know
This module is an introduction to the California Consumer Privacy Act, or CCPA. Learn how it can affect your organization and your work.

Comprehensive Guide to DFARS Training: Everything You Need to Know
This security and awareness training is an introduction to DFARS, or the Defense Federal Acquisition Regulation Supplement.

Comprehensive Guide to HIPAA HITECH Compliance: Protecting Patient Data
Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI.

Core Concepts Cloud Security: Essential Principles for Protecting Your Data
What is the cloud, and what problems could it hide? Take a few minutes to learn about cloud computing and cloud security, and what you can do to protect yourself and others.

Core Concepts Malware Training: Essential Learning for Cybersecurity
Explore the ins and outs of malware with this module covering malware types, targets and delivery methods. Learn to detect and avoid dangerous malware attacks.

Core Concepts of HIPAA: Key Principles and Best Practices
Explore the details of the Health Insurance Portability and Accountability Act, or HIPAA. Learn about its creation, its impact and why it matters in today’s privacy landscape.

Core Concepts of the Internet: Key Insights into Core Concepts Internet
Could your toaster be dangerous? Explore the importance and the challenges of smart devices with this introduction to the Internet of Things.

Core Concepts Phishing Training: Understanding and Preventing Phishing Attacks
Phishing catches people every day. Learn about what phishing is, how it works and how to avoid the phisher’s net!

Core Concepts Ransomware Training: Understanding the Fundamentals
Don’t let them lock up your data! Explore the growing threat of ransomware: what it is, how it works and how to protect yourself and your systems from it.

Core Concepts Travel Security: Key Insights for Safer Travel
Traveling opens you up to new experiences … and new dangers. Take a few minutes to learn about how you can stay cyber-safe while on the go.

Core Concepts: Incident Response
Take a few minutes to explore incident response. What is an incident? What does it mean for your organization? And what should you do when something is going wrong?

Core Concepts: Multi-factor Authentication
It takes more than passwords to keep your data safe. Dive into the world of multi-factor authentication and explore text tokens, biometrics and more.

Core Concepts: OWASP
Explore the OWASP top ten web application security risks and how they could apply to your organization. This newly updated list includes threats such as security misconfiguration, insecure design and cryptographic failures.

Core Concepts: PCI DSS
The PCI DSS standard provides guidance for protecting cardholders and cardholder data against hackers. What is PCI DSS and how does it help to stop threat actors?

Core Concepts: Physical Security
Close the door on hackers with this module on physical security in the workplace! Explore common physical security threats, tactics that intruders use, and ways you can protect yourself and others.

Core Concepts: PPRA
The PPRA, or Protection of Pupil Rights Amendment, is an important piece of student privacy legislation. Explore the details of this amendment with this module, including the rights it covers and who it applies to.

Core Concepts: QR Code Security
What is a QR code, and what does it mean for cybersecurity today? Explore the uses of QR codes, how hackers are using them and what you can do to be safe.

CSAM Cyber Security Training: Your Path to Stronger Cybersecurity Awareness
Get yourself on the road to cybersecurity! In this video, cybersecurity expert Keatron Evans introduces you to some of the famous hacks of 2021 and the simple behaviors that could have stopped them.

Curse Cybersecurity Game: Pick Your Path in the Mummy's Data Adventure
DANGER IN THE DARK! Ancient data lies in the pharaoh's tomb, and archaeologists will traverse every terrible trap to uncover it. Will the walking dead halt their mission, or will the pharaoh's personal information end up in a museum?

Electronic Fund Transfer Act (EFTA): Understanding the Regulations and Protections
The Electronic Funds Transfer Act covers what consumers and banks should do if there are fraudulent charges. Learn how it works, and how it could affect your organization.