
Professional development
The best cybersecurity jobs in 2023: Trends, roles and salaries
Learn about the best cybersecurity jobs. Discover the best states, understand the trends and learn about cybersecurity salaries and roles.

Professional development
133 cyber security training courses you can take now — for free
From cybersecurity basics to incident response to secure coding, these free training courses will help prepare you for a career in cybersecurity.

Security awareness
Celebrate Data Privacy Week: Free privacy and security awareness resources
Practice data privacy year-round with these free resources for Data Privacy Week! Learn about data privacy best practices, data privacy careers and more.

Professional development
Which CompTIA cert is right for you: Security+, PenTest+, CySA+ or CASP+? [updated 2023]
Patrick Lane breaks down four CompTIA cybersecurity certifications: Security+, CySA+, PenTest+ and CASP+. Which one is right for you?

General security
Free Valentine's Day cybersecurity cards: Keep your love secure!
Give your sweetheart the gift of cybersecurity with these free Valentine's Day cards from Infosec.

Professional development
ISO 27001 auditing: 6 things to know about auditing training and careers
ISO 27001 is one of the most well-known security management frameworks — and a valuable skill set for auditors, managers and cybersecurity professionals.

Application security
How to carry out a watering hole attack: Examples and video walkthrough
What is a watering hole attack, how do they work and what can you do to defend against them? Find out in this from Infosec's Keatron Evans.

Application security
How cross-site scripting attacks work: Examples and video walkthrough
What are cross-site scripting attacks and how do they work? Find out in this walkthrough from Infosec Skills author John Wagnon.

Penetration testing
How to write a port scanner in Python in 5 minutes: Example and walkthrough
What is a port scanner and how does it work? Learn by writing your own basic Python port scanner script in this walkthrough from Keatron Evans.

Network security
How to use Wireshark for protocol analysis: Video walkthrough
Learn how to analyze network traffic with the free protocol analyzer Wireshark and sniffing tool tcpdump. Then try it yourself!

Application security
How SQL injection attacks work: Examples and video walkthrough
Injection attacks are the number one security risk, according to the OWASP Top 10. Learn how they work and how you can defend against them.

CMMC
CMMC student guide: Additional CMMC resources
Need more CMMC resources? We collected everything you need from CMMC-AB, NIST and others to stay up to date on the latest CMMC developments.