Comprehensive Infosec Content Library for Security Awareness and Training
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Core Concepts of the Internet: Key Insights into Core Concepts Internet
Could your toaster be dangerous? Explore the importance and the challenges of smart devices with this introduction to the Internet of Things.

Curse Cybersecurity Game: Pick Your Path in the Mummy's Data Adventure
DANGER IN THE DARK! Ancient data lies in the pharaoh's tomb, and archaeologists will traverse every terrible trap to uncover it. Will the walking dead halt their mission, or will the pharaoh's personal information end up in a museum?

Essential Facts About Data Destruction You Need to Know
What do you do when you don’t need a piece of data any more? Take a few minutes to explore the hows and whys of data destruction.

Essential Facts About Data Privacy You Need to Know
Get the facts on data privacy. Find out what data privacy is, how it works ... and what happens when it goes wrong!

Facts About New Hires: A Comprehensive Introduction for New Employees
To lead your team effectively, you need to know the way. Explore smart cybersecurity behaviors and learn about common threats in the digital world.

Need to Know IoT: Essential Insights and Information
Smart devices may not be smart choices when it comes to office security. Join Ivana and Erica as they check out the potential dangers of unshielded IoT.

Play the Ultimate Cyber Security Zombies Game: Choose Your Path in the Zombie Invasion
Hannah's day just got a lot worse! As malware zombies take over, she needs you to make the right cybersecurity choices or face the possibility of becoming infected herself.

Proper Disposal: Essential Information You Need to Know
The office wants to properly dispose of a broken piece of equipment. Unfortunately, they haven't gotten the idea of 'proper disposal' quite right. Join Anthony and Mr. Louis as they pay their respects to one dearly departed printer, and how to properly dispose of electronic devices.

Work Bytes Phishing: Understanding and Protecting Against Threats
The captain gets a message that promises riches and adventure … But what does this treasure map really hide? Learn about phishing, and the dangers of suspicious emails.

Facts About Social Engineering: Key Insights and Strategies
Some cyber-defenses can be broken without the use of a computer. Explore the details and dangers of social engineering, the tactics that exploit the human element, and get yourself informed with Just the Facts.

Facts About Travel Security: Essential Information for Safe Journeys
Travel can be an adventure … or a disaster. Explore what it takes to travel safely, stay cybersecure on the move and dodge common cybersecurity threats and attacks.

Facts About Wi-Fi: Key Insights into Public Wi-Fi Security
Get the facts on Wi-Fi and working remotely. In this video, you’ll explore the challenges and dangers that come with Wi-Fi, and the importance of keeping security in mind.

Essential Tips for Working Remotely: What You Need to Know
Sometimes, trouble follows you home. Join in as Anthony and Ben explore the dangers of working remotely — from password cracks to malware attacks.

Facts About Physical Security: Key Insights and Considerations
Get the facts on securing your building and your workspace with this module on physical security best practices.

Core Concepts: Business Email Compromise (BEC)
What is Business Email Compromise, and what does it mean for you? Take a look at BEC and learn what you need to know about protecting yourself from this common cyberattack.

Core Concepts: Stick to the Policy
Policies and procedures keep employees safe from cyberattacks. But what are they? And why is it so important to follow them?

Essential Travel Security Training: What You Need to Know
It's a wild ride when Harold and Mr. Louis take cybersecurity on the road! How can you keep data safe when you're far from home?

Everything You Need to Know About Privacy by Design
Sometimes, two heads are NOT better than one. Follow along as Harold and Cecil make a bad decision about data gathering and discover the importance of privacy by design.

Facts About Removable Media: Everything You Need to Know
What do USB drives, removable media hard drives and phones have in common? They are all considered forms of removable media, and they can all be dangerous. Get the facts on removable media and how they could affect your organization.

Need to Know: Clean Desk Policy
The company prepares for a Clean Desk Competition, but Ben doesn't seem to understand the point ... or does he? Learn about how to protect sensitive information at your physical workspace to prevent cyberattacks.

Pick Your Path in the Yeti Cybersecurity Game: A Thrilling Adventure
The frozen cave could be their grave! Daniel and Naomi have an incredible piece of information: a photograph of the elusive yeti. Can they survive to safely upload their data and avoid a data avalanche?

Pick Your Path: League of Cyberheroes
The enemy within! Aided by determined data expert Carmen, the League of Cyberheroes must stand up to their greatest foe — their own careless social media posting!

Work Bytes: Password Security Solutions for Enhanced Protection
Nobody likes thinking up new passwords … But if you don’t change them regularly, the consequences could be downright scary! Learn about password safety and security with the Work Bytes team.

Essential Social Engineering Training: What You Need to Know
Some hackers don’t need computers at all. Join Anthony and Erica in exploring the dirty business of social engineering — when all it takes is a lie to crack open a company.