Security awareness and training content library
Access the entire content library with no additional cost to your subscription plan.
Infosec recommends

Gamified security awareness training series
Transform traditional employee training into a world of fun and fantasy where your learners face security scenarios and make decisions that shape their training experience.

Comedic security awareness training series
Work Bytes features a cast of creative characters who encounter today's most common cybersecurity threats (phishing, hacking and scamming) as they move through their workday. Learn more about this fantastical security awareness training series.

Animated security awareness and training
Layered security awareness and training are your secret weapon to building a culture of cybersecurity at your organization. Learn what layered training is, how it works and how you can use the Need to Know Program Plan to make secure behavior second nature at your organization.
Browse our featured content

Core Concepts: Internet of Things (IoT)
Could your toaster be dangerous? Explore the importance and the challenges of smart devices with this introduction to the Internet of Things.

Just the Facts: Data Destruction
What do you do when you don’t need a piece of data any more? Take a few minutes to explore the hows and whys of data destruction.

Just the Facts: Data Privacy
Get the facts on data privacy. Find out what data privacy is, how it works ... and what happens when it goes wrong!

Just the Facts: Introduction for New Hires
To lead your team effectively, you need to know the way. Explore smart cybersecurity behaviors and learn about common threats in the digital world.

Need to Know: IoT
Smart devices may not be smart choices when it comes to office security. Join Ivana and Erica as they check out the potential dangers of unshielded IoT.

Need to Know: Proper Disposal
The office wants to properly dispose of a broken piece of equipment. Unfortunately, they haven't gotten the idea of 'proper disposal' quite right. Join Anthony and Mr. Louis as they pay their respects to one dearly departed printer, and how to properly dispose of electronic devices.

Pick Your Path: Curse of the Mummy's Data
DANGER IN THE DARK! Ancient data lies in the pharaoh's tomb, and archaeologists will traverse every terrible trap to uncover it. Will the walking dead halt their mission, or will the pharaoh's personal information end up in a museum?

Pick Your Path: Zombie Invasion
Hannah's day just got a lot worse! As malware zombies take over, she needs you to make the right cybersecurity choices or face the possibility of becoming infected herself.

Work Bytes: Phishing
The captain gets a message that promises riches and adventure … But what does this treasure map really hide? Learn about phishing, and the dangers of suspicious emails.

Just the Facts: Public Wi-Fi
Get the facts on Wi-Fi and working remotely. In this video, you’ll explore the challenges and dangers that come with Wi-Fi, and the importance of keeping security in mind.

Just the Facts: Social Engineering
Some cyber-defenses can be broken without the use of a computer. Explore the details and dangers of social engineering, the tactics that exploit the human element, and get yourself informed with Just the Facts.

Just the Facts: Travel Security
Travel can be an adventure … or a disaster. Explore what it takes to travel safely, stay cybersecure on the move and dodge common cybersecurity threats and attacks.

Need to Know: Phishing
Learn how to spot the bait as Anthony guides his friend Cecil through the dangers of phishing. Is this actually a very exciting email from the boss, or is it just another hacker’s trap?

Need to Know: Safe Web Browsing
It’s a jungle in there. Explore the winding paths of the internet with Anthony and Cecil as they venture into thorny areas like fake browser warnings, HTTPS and dangerous URLs.

Just the Facts: Physical Security
Get the facts on securing your building and your workspace with this module on physical security best practices.

Need to Know: Password Security
A system is only as secure as its password. Join Anthony and Daryl as they get to grips with the challenges of creating a strong password … because safety is not as easy as 1-2-3.

Need to Know: Removable Media
Can a thumb drive topple a company? It’s more likely than you think. Join Anthony and Harold as they check out the dangers of removable media — the good, the bait and the ugly.

Need to Know: Working Remotely
Sometimes, trouble follows you home. Join in as Anthony and Ben explore the dangers of working remotely — from password cracks to malware attacks.

Core Concepts: Business Email Compromise (BEC)
What is Business Email Compromise, and what does it mean for you? Take a look at BEC and learn what you need to know about protecting yourself from this common cyberattack.

Core Concepts: Stick to the Policy
Policies and procedures keep employees safe from cyberattacks. But what are they? And why is it so important to follow them?

Just the Facts: Removable Media
What do USB drives, removable media hard drives and phones have in common? They are all considered forms of removable media, and they can all be dangerous. Get the facts on removable media and how they could affect your organization.

Need to Know: Clean Desk Policy
The company prepares for a Clean Desk Competition, but Ben doesn't seem to understand the point ... or does he? Learn about how to protect sensitive information at your physical workspace to prevent cyberattacks.

Need to Know: Malware
Trojan horses, worms, RATs — There’s a whole animal kingdom of malware out there. Join Anthony and Fiona as they explore the best ways to keep malware from migrating into your system.

Need to Know: Privacy by Design
Sometimes, two heads are NOT better than one. Follow along as Harold and Cecil make a bad decision about data gathering and discover the importance of privacy by design.