Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Core Concepts of the Internet: Key Insights into Core Concepts Internet
Could your toaster be dangerous? Explore the importance and the challenges of smart devices with this introduction to the Internet of Things.

Curse Cybersecurity Game: Pick Your Path in the Mummy's Data Adventure
DANGER IN THE DARK! Ancient data lies in the pharaoh's tomb, and archaeologists will traverse every terrible trap to uncover it. Will the walking dead halt their mission, or will the pharaoh's personal information end up in a museum?

Essential Facts About Data Destruction You Need to Know
What do you do when you don’t need a piece of data any more? Take a few minutes to explore the hows and whys of data destruction.

Essential Facts About Data Privacy You Need to Know
Get the facts on data privacy. Find out what data privacy is, how it works ... and what happens when it goes wrong!

Facts About New Hires: A Comprehensive Introduction for New Employees
To lead your team effectively, you need to know the way. Explore smart cybersecurity behaviors and learn about common threats in the digital world.

Need to Know IoT: Essential Insights and Information
Smart devices may not be smart choices when it comes to office security. Join Ivana and Erica as they check out the potential dangers of unshielded IoT.

Play the Ultimate Cyber Security Zombies Game: Choose Your Path in the Zombie Invasion
Hannah's day just got a lot worse! As malware zombies take over, she needs you to make the right cybersecurity choices or face the possibility of becoming infected herself.

Proper Disposal: Essential Information You Need to Know
The office wants to properly dispose of a broken piece of equipment. Unfortunately, they haven't gotten the idea of 'proper disposal' quite right. Join Anthony and Mr. Louis as they pay their respects to one dearly departed printer, and how to properly dispose of electronic devices.

Work Bytes Phishing: Understanding and Protecting Against Threats
The captain gets a message that promises riches and adventure … But what does this treasure map really hide? Learn about phishing, and the dangers of suspicious emails.

Facts About Social Engineering: Key Insights and Strategies
Some cyber-defenses can be broken without the use of a computer. Explore the details and dangers of social engineering, the tactics that exploit the human element, and get yourself informed with Just the Facts.

Facts About Travel Security: Essential Information for Safe Journeys
Travel can be an adventure … or a disaster. Explore what it takes to travel safely, stay cybersecure on the move and dodge common cybersecurity threats and attacks.

Facts About Wi-Fi: Key Insights into Public Wi-Fi Security
Get the facts on Wi-Fi and working remotely. In this video, you’ll explore the challenges and dangers that come with Wi-Fi, and the importance of keeping security in mind.

Phishing: What You Need to Know to Stay Protected
Learn how to spot the bait as Anthony guides his friend Cecil through the dangers of phishing. Is this actually a very exciting email from the boss, or is it just another hacker’s trap?

Safe Web Browsing: Essential Tips for Protecting Your Online Privacy
It’s a jungle in there. Explore the winding paths of the internet with Anthony and Cecil as they venture into thorny areas like fake browser warnings, HTTPS and dangerous URLs.

Essential Guide to Password Security: Tips for Protecting Your Online Accounts
A system is only as secure as its password. Join Anthony and Daryl as they get to grips with the challenges of creating a strong password … because safety is not as easy as 1-2-3.

Essential Guide to Removable Media: What You Need to Know
Can a thumb drive topple a company? It’s more likely than you think. Join Anthony and Harold as they check out the dangers of removable media — the good, the bait and the ugly.

Essential Tips for Working Remotely: What You Need to Know
Sometimes, trouble follows you home. Join in as Anthony and Ben explore the dangers of working remotely — from password cracks to malware attacks.

Facts About Physical Security: Key Insights and Considerations
Get the facts on securing your building and your workspace with this module on physical security best practices.

Core Concepts: Business Email Compromise (BEC)
What is Business Email Compromise, and what does it mean for you? Take a look at BEC and learn what you need to know about protecting yourself from this common cyberattack.

Core Concepts: Stick to the Policy
Policies and procedures keep employees safe from cyberattacks. But what are they? And why is it so important to follow them?

Essential Travel Security Training: What You Need to Know
It's a wild ride when Harold and Mr. Louis take cybersecurity on the road! How can you keep data safe when you're far from home?

Everything You Need to Know About Privacy by Design
Sometimes, two heads are NOT better than one. Follow along as Harold and Cecil make a bad decision about data gathering and discover the importance of privacy by design.

Facts About Removable Media: Everything You Need to Know
What do USB drives, removable media hard drives and phones have in common? They are all considered forms of removable media, and they can all be dangerous. Get the facts on removable media and how they could affect your organization.

Need to Know for Strong Passwords: Tips for Creating Secure Passwords
Anthony helps Harold create a new, strong password. Turns out what you really need is just a little more ... creativity. Learn what makes a strong password really secure, and how to build an effective one.