Security Awareness & Training Resource Center
Featured content

Deconstructing Human-Element Breaches | Infosec HRM
Human risk management isn’t just rebranded SA&T — it’s a profound change of mindset, strategy, process and technology that approaches human-related breaches in a new way.

Inside an Infosec Boot Camp: All your questions, answered!
You need to get certified, but is an Infosec Boot Camp the right choice for you — or your team? Find out in this live Q&A with two Infosec instructors.

Emerging trend checklist: Which certifications cover which new skills?
Boost your team's cybersecurity skills with the right certifications. Discover the most in-demand skills and the certifications that cover them in our free guide.

Security Awareness Outcomes with Infosec IQ
See security awareness and training outcomes from more than five million Infosec IQ learners.
Our resources
Network forensics overview
Most attacks move through the network before hitting the target and they leave some trace. According to Locard’s exchange principle, “every contact leaves a
Network security tools (and their role in forensic investigations)
The effectiveness of network forensics is closely related to the network security tools used in an organization. We have covered common enterprise security s
Kali Linux: Top 5 tools for digital forensics
There are many tools available from Kali Linux. These are the five most popular tools for digital forensics work.
Computer forensics: Chain of custody [updated 2019]
In this article, we will learn what the chain of custody entails in digital forensics and how it is maintained. We’ll also look at the chain of custody proce

Data integrity and backups
Introduction Data integrity means that a given data set is accurate, complete, consistent, unchanged (original or a true copy) and trustworthy throughout it

Spoofing and Anonymization (Hiding Network Activity)
Introduction Forensic investigators should always pay heed to the possibility of a cybercriminal to have been using spoofing and anonymizing techniques to c
The mobile forensics process: steps and types
Introduction: Importance of mobile forensics The term “mobile devices” encompasses a wide array of gadgets ranging from mobile phones, smartphones, tablets,

Average help desk support salary in 2018
Inexperienced college graduates or those just looking to get into the IT field need to start somewhere and one of the best places to gain real world experien

The GSEC certification and exam
GIAC Security Essentials (GSEC) is one of the top certifications on the market for professionals who want to prove their IT skills on security-related tasks.
Certified Wireless Security Specialist (CWSS) Salary
If looking for a good niche in the information technology sector, a professional might want to explore opportunities in the growing market for wireless-relat
CGEIT Domain 5: Resource Optimization [DECOMMISSIONED ARTICLE]
NOTE: This article is based on an old version of the CGEIT exam, and should not be consulted for information on the current exam. Please consult the article
CGEIT Domain 2: Strategic Management [DECOMMISSIONED ARTICLE]
NOTE: This article reflects an older version of the CGEIT Exam -- please see the current CGEIT Certification page for the most up-to-date information.
Average IT security auditor salary
If you have attention to detail and love for IT security, the position of an IT auditor will likely be a great fit for you! IT auditing has a number of funct
Becoming a Cybersecurity Practitioner (CSXP)
Introduction The growing concern of cybercrime is pushing more and more companies to staff their IT teams with professionals that are able to implement prop
CompTIA IT Fundamentals+ Certification: An Overview
What are organizational leaders going to do about today’s IT skills gap and to help keep their non-technical employees current with the rapid pace at which t
The International Association of Privacy Professionals CIPM Certification
The Certified Information Privacy Manager (CIPM) is one of several popular privacy-focused certifications offered by the International Association of Privacy
International Association of Privacy Professionals (IAPP): Certification overview
Learn about the IAPP, the different privacy certifications they offer and how they can help your career.
CIPP/US: 5 things to know about privacy and cybersecurity law
Certifications are a way to motivate you to study and learn as they can help you expand upon your cybersecurity career.
Average SCADA Security (CSSA) salary
What is SCADA? Supervisory Control and Data Acquisition is one of the most interesting areas of Industrial Control Systems (ICS) and refers to the hardware a
Most valuable cybersecurity skills to learn in 2022
Find out what some of the most valuable skills in cybersecurity are forecasted to be in 2022.

15 best free packet crafting tools
Packet crafting is the process of manually creating or editing the existing data packets on a network to test network devices. Hackers and network admins use

Broadpwn Wi-Fi Vulnerability: How to Detect & Mitigate
It can be easy to think our mobile devices are more secure than they are. However, that is just not the case. In the last three years, there have been dozens
Network Traffic Analysis for IR — Discovering RATs
Introduction A Remote Access Trojan (RAT) is part of the malware family. It enables covert surveillance, a backdoor channel and unfettered and unauthorized

Apache Guacamole Remote Desktop Protocol (RDP) vulnerabilities: What you need to know
In June of 2020, security researchers at Check Point Research discovered multiple critical RDP (Remote Desktop Protocol) flaws in Apache Guacamole. The natur