Jeff Peters

Jeff Peters is a communications professional with more than a decade of experience creating cybersecurity-related content. As the Director of Content and Brand Marketing at Infosec, he oversees the Infosec Resources website, the Cyber Work Podcast and Cyber Work Hacks series, and a variety of other content aimed at answering security awareness and technical cybersecurity training questions. His focus is on developing materials to help cybersecurity practitioners and leaders improve their skills, level up their careers and build stronger teams.
Jeff Peters

The best cybersecurity jobs in 2023: Trends, roles and salaries

Learn about the best cybersecurity jobs. Discover the best states, understand the trends and learn about cybersecurity salaries and roles.

133 cyber security training courses you can take now — for free

From cybersecurity basics to incident response to secure coding, these free training courses will help prepare you for a career in cybersecurity.

Celebrate Data Privacy Week: Free privacy and security awareness resources

Practice data privacy year-round with these free resources for Data Privacy Week! Learn about data privacy best practices, data privacy careers and more.

Which CompTIA cert is right for you: Security+, PenTest+, CySA+ or CASP+? [updated 2023]

Patrick Lane breaks down four CompTIA cybersecurity certifications: Security+, CySA+, PenTest+ and CASP+. Which one is right for you?

Free Valentine's Day cybersecurity cards: Keep your love secure!

Give your sweetheart the gift of cybersecurity with these free Valentine's Day cards from Infosec.

ISO 27001 auditing: 6 things to know about auditing training and careers

ISO 27001 is one of the most well-known security management frameworks — and a valuable skill set for auditors, managers and cybersecurity professionals.

How to carry out a watering hole attack: Examples and video walkthrough

What is a watering hole attack, how do they work and what can you do to defend against them? Find out in this from Infosec's Keatron Evans.

How cross-site scripting attacks work: Examples and video walkthrough

What are cross-site scripting attacks and how do they work? Find out in this walkthrough from Infosec Skills author John Wagnon.

How to write a port scanner in Python in 5 minutes: Example and walkthrough

What is a port scanner and how does it work? Learn by writing your own basic Python port scanner script in this walkthrough from Keatron Evans.

How to use Wireshark for protocol analysis: Video walkthrough

Learn how to analyze network traffic with the free protocol analyzer Wireshark and sniffing tool tcpdump. Then try it yourself!

How SQL injection attacks work: Examples and video walkthrough

Injection attacks are the number one security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them.

CMMC student guide: Additional CMMC resources

Need more CMMC resources? We collected everything you need from CMMC-AB, NIST and others to stay up to date on the latest CMMC developments.