Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Core Concepts CMMC 2.0: Understanding the Key Elements for Compliance
Explore the challenges of defense spending and government contracting with this look at the Cybersecurity Maturity Model Certification, or CMMC.

Proper Disposal: Essential Information You Need to Know
The office wants to properly dispose of a broken piece of equipment. Unfortunately, they haven't gotten the idea of 'proper disposal' quite right. Join Anthony and Mr. Louis as they pay their respects to one dearly departed printer, and how to properly dispose of electronic devices.

Unauthorized Cloud Services: What You Need to Know and How to Protect Your Data
Anthony and Harold talk about safe cloud storage ... and the unsafe cloud storage that Harold is already using. Oops. Learn how to properly use cloud services, and how improper use can be a serious risk.

Everything You Need to Know About Public Wi-Fi: Risks, Security, and Safety Tips
Mateo is looking for a stable public Wi-Fi connection. But each one turns out to have its own dangers, and his friend Neena shows him how to stay safe.

Malware Forecast: What You Need to Know for 2025
A malware storm is rolling in, and Cecil is the guy to tell you what to do! Harold learns about the dangers of malware while Cecil walks him through the best ways to defend yourself.

Work Bytes Phishing: Understanding and Protecting Against Threats
The captain gets a message that promises riches and adventure … But what does this treasure map really hide? Learn about phishing, and the dangers of suspicious emails.

Need to Know Too Much Information: What You Should Be Aware Of
In the cafeteria, Anthony teaches Karen the importance of not giving out more information than someone needs.

OWASP Vulnerabilities: A Deep Dive into Using Components with Known Vulnerabilities
This module covers the ninth OWASP application security risk: Using Components with Known Vulnerabilities. Learn how this can impact your organization and work.

Work Bytes: Public Wi-Fi Security and Best Practices
Staying safe on a work trip is a challenge, no matter who you are! Volkov the vampire struggles with public Wi-Fi, and Hal provides some late-night tech support.

Facts About New Hires: A Comprehensive Introduction for New Employees
To lead your team effectively, you need to know the way. Explore smart cybersecurity behaviors and learn about common threats in the digital world.

Essential Facts About Data Destruction You Need to Know
What do you do when you don’t need a piece of data any more? Take a few minutes to explore the hows and whys of data destruction.

Essential Facts About Data Privacy You Need to Know
Get the facts on data privacy. Find out what data privacy is, how it works ... and what happens when it goes wrong!

Need to Know IoT: Essential Insights and Information
Smart devices may not be smart choices when it comes to office security. Join Ivana and Erica as they check out the potential dangers of unshielded IoT.

Electronic Fund Transfer Act (EFTA): Understanding the Regulations and Protections
The Electronic Funds Transfer Act covers what consumers and banks should do if there are fraudulent charges. Learn how it works, and how it could affect your organization.

FERPA for K-12: Understanding Its Impact and Compliance Requirements
In this module, we identify types of information protected by Family Educational Rights and Privacy Act (FERPA) and specific regulations for K-12 institutions.

Core Concepts Travel Security: Key Insights for Safer Travel
Traveling opens you up to new experiences … and new dangers. Take a few minutes to learn about how you can stay cyber-safe while on the go.

Comprehensive Guide to DFARS Training: Everything You Need to Know
This security and awareness training is an introduction to DFARS, or the Defense Federal Acquisition Regulation Supplement.

Comprehensive Guide to HIPAA HITECH Compliance: Protecting Patient Data
Our role-based HIPAA/HITECH module defines Protected Health Information (PHI), explains the need for PHI security and outlines best practices for handling PHI.

Play the Ultimate Cyber Security Zombies Game: Choose Your Path in the Zombie Invasion
Hannah's day just got a lot worse! As malware zombies take over, she needs you to make the right cybersecurity choices or face the possibility of becoming infected herself.

Curse Cybersecurity Game: Pick Your Path in the Mummy's Data Adventure
DANGER IN THE DARK! Ancient data lies in the pharaoh's tomb, and archaeologists will traverse every terrible trap to uncover it. Will the walking dead halt their mission, or will the pharaoh's personal information end up in a museum?

Core Concepts of the Internet: Key Insights into Core Concepts Internet
Could your toaster be dangerous? Explore the importance and the challenges of smart devices with this introduction to the Internet of Things.

Core Concepts Phishing Training: Understanding and Preventing Phishing Attacks
Phishing catches people every day. Learn about what phishing is, how it works and how to avoid the phisher’s net!

OWASP A1 - Injection Vulnerabilities and Prevention
This module covers the first OWASP application security risk: Injection. Learn about various types of injection and the associated risks to applications.

Facts About Social Engineering: Key Insights and Strategies
Some cyber-defenses can be broken without the use of a computer. Explore the details and dangers of social engineering, the tactics that exploit the human element, and get yourself informed with Just the Facts.