www.infosecinstitute.com Open in urlscan Pro
141.193.213.20  Public Scan

Submitted URL: https://click.e.infosecinstitute.com/?qs=504065bd4b8ef4a512546dc9727e01db06768a7458b1ee77cab725a52f9949a7a7f02931ef99adafd063541743cd...
Effective URL: https://www.infosecinstitute.com/?utm_source=marketing%20cloud&utm_medium=email%20blast&utm_campaign=training%20webinar&utm_conte...
Submission: On April 05 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * 
   
 * 708.689.0131
 * Contact us
 * Infosec IQ login
 * Infosec Skills login

 * 
 * Products
 * Solutions
 * Resources
 * Company

 * Back
 * Product overview
 * Security awareness & culture
   
 * On-demand training & cyber ranges
   
 * On-demand training & cyber ranges

 * Back
 * Infosec IQ overview
 * Security awareness training
 * Phishing simulator
 * Reporting & assessments
 * Integrations & automation
 * Global administration
 * Browse all training
 * Pricing & features
 * Demo

 * Back
 * Infosec Skills overview
 * Role-guided training
 * Infosec Skills Teams
 * Cyber ranges & labs
 * Certifications & CPEs
 * Skill assessments
 * Browse all training
 * Pricing & features
 * Book a meeting

 * Back
 * Live boot camps
 * Infosec Institute certifications
 * DoD 8570 certifications
 * Get team boot camp pricing
 * View boot camp schedule
 * Book a meeting

 * Back
 * Pre-built training plans
 * Compliance, industry & role-based training
 * Custom education
 * Personalized learning
 * Languages
 * Gamified learning

 * Back
 * 1000+ phishing templates
 * Simulation types
 * Phishing email reporter

 * Back
 * Dashboard reports
 * Security culture survey
 * Assessments
 * Learner analytics

 * Back
 * Learner management
 * Threat response orchestration
 * Integrations

 * Back
 * 52 NICE Work Roles
 * SOC Analyst
 * Cloud Security Engineer
 * Security Manager
 * ICS Security Practitioner
 * Security Engineer
 * Penetration Tester
 * Digital Forensics Analyst
 * Information Risk Analyst
 * Security Architect
 * Secure Coder

 * Back
 * Boot camp overview
 * CISSP Boot Camp
 * Security+ Boot Camp
 * Ethical Hacking Boot Camp
 * CCNA Dual Cert Boot Camp
 * CASP+ Boot Camp
 * CCSP Boot Camp
 * CISM Boot Camp
 * CySA+ Boot Camp
 * PMP Boot Camp
 * Browse all boot camps

Security awareness games by Infosec

Click to Play

On-demand training for every cybersecurity role

Download Catalog

Certification training from industry experts

Get Pricing

 * Back
 * Solutions overview
 * By organization type
 * By need

 * Back
 * For business teams
 * For government & contractor teams
 * For MSPs & resellers

 * Back
 * Security awareness
 * Phishing simulation
 * Technical skill development
 * IT certification
 * Compliance & framework
 * CMMC certification

2021 IT & Security Talent Pipeline Study

Download Now

 * Back
 * Cyber Work
 * Webcasts
 * Case studies
 * Reports & whitepapers
 * Blog
 * Community
 * Infosec Inspire
 * Free tools

 * Back
 * Cyber Work Podcast
 * Cyber Work Applied

 * Back
 * Infosec Insiders
 * TechExams
 * YouTube
 * LinkedIn
 * Facebook
 * Twitter

 * Back
 * Phishing Risk Test
 * Security awareness ROI calculator
 * Security awareness training plans
 * Security awareness buyer’s guide

Cyber Work Podcast

New cybersecurity career conversations every week

Listen Now

 * Back
 * About us
 * Events & webcasts
 * Careers
 * Scholarships & awards
 * Infosec Gives
 * Infosec Gives Partner Program

 * Back
 * About us
 * Leadership
 * Newsroom
 * Recognition
 * Industry alliances

 * Back
 * Infosec Hall of Fame
 * Infosec Security Awareness Awards
 * Infosec Accelerate Scholarship Program

We’re hiring!

Join a team dedicated to making a difference.

Get To Know Us


Infosec has been acquired by leading education technology company, Cengage
Group. Learn More


IDC NAMES INFOSEC AN IT TRAINING LEADER

Get the IDC MarketScape to learn why we stand out for cybersecurity training

Download Report



SKILL UP & GET CERTIFIED

Upskill and get certified with unlimited access to 1,400+ hands-on cybersecurity
courses and cyber ranges — or upgrade to a boot camp for live, instructor-led
training guaranteed to get you certified on your first attempt.

Learn More


BUILD EMPLOYEE AWARENESS

Empower employees with knowledge and skills to stay cyber secure at work and
home. 2,000+ security awareness resources and phishing simulations aligned to
employee learning styles help you change behaviors and culture.

Learn More


SECURITY EDUCATION FOR EVERY ROLE

Infosec is the only security education provider with role-appropriate training
for your entire workforce. We’ve helped organizations like yours upskill and
certify security teams and boost employee awareness for over 17 years.

Get in touch



COMCAST STAYS AHEAD OF TECH CHANGE WITH INFOSEC SKILLS

Infosec Skills is a very good place for building technical acumen and
engineering development knowledge. It enables us to provide training to the
entire team on relevant topics.

Comcast Business Romy Ricafort, West Division Senior Director of Sales
Engineering


Read More


POPULAR CYBERSECURITY RESOURCES


2021 IT & SECURITY TALENT PIPELINE STUDY

Actionable strategies to patch your cyber talent pipeline in a post-pandemic
world.

Download


CYBERSECURITY CULTURE — QUANTIFIED

See the data on the most overlooked variable in security and learn how to
measure your organization's cybersecurity culture.

Download


BUILDING A BILLION-DOLLAR CYBERSECURITY COMPANY | CYBER WORK PODCAST

Veracode CEO Sam King is an icon in the realms of secure coding and application
security, and she joins the podcast, along with Infosec CEO Jack Koziol, to
discuss her cybersecurity journey, the President’s directive on software
security and so, so many more topics. You really don’t want to miss this one,
folks.

0:00 - Intro
3:10 - Origin story
5:05 - Ground floor of cybersecurity
7:54 - The “aha!” moments
12:30 - Point were you thought industry would grow
14:28 - Changes implemented at Veracode
19:52 - Nation’s approach to cybersecurity
24:10 - Federal government security
26:25 - Government oversight
28:14 - Secure coding practices
31:52 - Veracode’s app security report
40:04 - How to learn web application security
43:46 - Mistakes to avoid when applying
47:13 - Bringing in more diverse candidates
51:36 - Maintaining Veracode’s edge
54:25 - Advice to move into a new cybersecurity role
56:24 - Outro


Listen Now


EPISODE 200 EXTRAVAGANZA! BEST OF THE CYBER WORK PODCAST (AND $1,000 IN PRIZES!)

PLEASE NOTE: Around minute 47, I incorrectly say that Eric Milam, author of the
definitive report on the BAHAMUT threat group, is employed by HP. He is, in
fact, employed by Blackberry. I sincerely apologize to Mr. Milam for the error.

In this special episode, we look back at how the show has evolved over the past
three years and celebrate our amazing guests and viewers. You've helped grow the
Cyber Work Podcast to nearly a million plays!

To give back, we're launching a brand new way for EVERYONE to build their
cybersecurity skills. It's free. It's hands-on. Oh, and did we mention there's
more than $1,000 in prizes EVERY MONTH.

Huge thank you to all the past guests who shared their expertise over the past
200 episodes. The timings of everyone in this episode are listed below. Happy
listening!

0:00 - Intro
0:42 - Monthly challenges and $1,000 in prizes!
1:30 - Cyber Work Podcast origins
2:32 - First episode with Leighton Johnson
3:16 - Finding our first guests
3:46 - Keatron Evans on incident response
6:54 - Susan Morrow on two-factor authentication
8:54 - Susan Morrow on GDPR
11:03 - Susan Morrow on "booth babes" and speaking up
13:20 - Alissa Knight on getting arrested for hacking at 17
16:39 - Alissa Knight on API security
19:14 - Ron Gula on cybersecurity challenges
23:23 - Amber Schroader on the real work of digital forensics
26:19 - Theme of the Cyber Work Podcast
27:01 - Jeff Williams on creating the OWASP Top Ten
31:23 - David Balcar on the biggest APTs
33:46 - Elie Bursztein on breaking into cybersecurity
37:37 - Sam King on AppSec frameworks and analysis
41:17 - Gary DeMercurio on getting arrested for red teaming
47:19 - Eric Milam on the BAHAMUT threat group
53:39 - Feedback from Cyber Work Podcast listeners
55:16 - Alyssa Miller on finding your career path
57:24 - Amber Schroader on computer forensics tasks
59:07 - Richard Ford on malware analyst careers
1:02:02 - Career action you can take today
1:02:19 - Rita Gurevich on reading and learning
1:03:20 - Snehal Antani on transitioning careers
1:04:26 - Promoting underrepresented voices
1:05:09 - Mari Galloway on women in cybersecurity
1:05:31 - Alyssa Miller on diversity "dog whistles"
1:10:11 - Christine Izuakor on creating role models
1:10:52 - We want to hear your story
1:11:40 - Monthly challenges and outro


Listen Now


PROUD TO BE RECOGNIZED

With over 200 awards under our belt, we’re honored to be recommended and trusted
by clients and industry leaders worldwide.

See Our Achievements

 * 
 * 
 * 
 * 
 * 

Products

Infosec IQ Security awareness, culture & phishing simulator Infosec Skills
Hands-on skill development & boot camps

Resources

Cyber Work Blog Infosec Inspire Events & webcasts

Company

Contact us About Infosec Careers Newsroom Partners

 * ©2022 Infosec Institute, Inc.
    * 
    * Trademarks
    * Privacy Policy

Infosec, part of Cengage Group

We use cookies to personalize your experience and optimize site functionality.
Accept Cookie settings
Privacy & Cookies Policy
Close

INFOSEC COOKIE NOTICE

We use cookies to help understand your needs, optimize website functionality and
give you the best experience possible. Use this policy to understand how, when
and where cookies are stored on your device.  Want to know more? Contact
privacy@infoseci...
Necessary
Necessary
Always Enabled
This type of cookie helps keep our website functioning. They provide access to
account-based features and other secure areas of our site, and do not store
information about you that could be used for marketing. This category of cookies
cannot be disabled.
Analytics
analytics
Google Analytics cookies help us understand how visitors use our site. All data
collected from Google Analytics is anonymized (including your IP address) and
stored by Google on U.S. servers.
Marketing
marketing
We use this type of cookie to optimize our marketing campaigns. Marketing
cookies are delivered by our database when you visit our site, complete a form
or open email from us. Information stored in this cookie includes personal
information like your name and what pages you view on our site.
Save & Accept