Cyber and IT Security Training for employees
We provide modular online cyber security training & e-learning courses on IT security with test and certificate.
Start demoThe right solution for your business
Boost your employees’ awareness with a cyber security training
90% of cyber security risks sit in front of the screen – mostly due to lack of understanding and awareness. As the threat landscape continues to rise, it's important to understand attackers and how they operate. With our cyber security trainings and cyber security e-learnings for employees, we build strong information security awareness and address the role of each individual user in your company. By increasing your employees' awareness of information security we counteract the risk and impact of a cyber attack in your company.
Customer feedback
Adjust our Cyber-Security Trainings & Cyber-Security E-Learnings to your needs
Our cyber security trainings and cyber security e-learnings increase your employees' awareness about how to protect your networks, data and devices from theft, damage and unauthorized access by criminals. From identifying phishing emails, to physical security, password management, cloud services, right through to social engineering and CEO Fraud, we currently offer 25+ Cyber Security modules.
You can either choose one of our "Best Practice" trainings or combine your individual Cyber Security course from our modules - of course customized according to your guidelines and your corporate design. You can run the finished online training at your company or in our cloud... or both.
Our wide range of modules includes educational content on the anatomy of a cyber attack, classic and refresher modules, or webinars on information security. Professional content, simply explained in our popular videos and exercises that have been tested by our in-house security experts and rated as excellent by users.
International, cost-efficient, auditable at any time: & Our e-learning cyber security training
Our e-learning courses are suitable for small, medium-sized and large companies - regardless of whether or not you already have your own learning management system (LMS). All content can be implemented into an existing LMS or run in our cloud, if desired. Or both.
With multimedia modules consisting of videos, interactive exercises, individual learning paths, and final quizzes, employees can learn or refresh their existing knowledge anywhere. By the way, we offer these courses without any complicated legal or techie jargon or excess details - we promise! We are also happy to consult you on how to increase your (voluntary) participation rate.
Watch a Cyber Security e-learning course demo here.
Who are the cyber security trainings for?
Every employee is a user. HR, accounting, administrators, developers, leadership - everyone has a responsibility to protect data and devices. This doesn't just apply to people with administrative privileges. That makes it all the more important that each individual understands the importance of security measures, as well as how to identify and respond to threats when needed.
E-Learning content 'IT Security / Cyber Security'
- Current Threat Situation
- Who are the attackers, what is their motivation?
- Implementation of a functioning information security
- Role of the user in protecting information
- Film: Anatomy of a cyber attack
- Who are the attackers?
- What are their goals?
- Detecting and fending off phishing
- Encryption of sensitive information
- Viruses and Trojans in e-mails
- Detect and defend against Microsoft 365 phishing
- Microsoft 365 Safe Link
- Typical Microsoft 365 phishing scams
- Multi-factor authentication in Microsoft 365
- What is ransomware and why is it so dangerous?
- Tips for protection in the company
- Tips for protecting private IT
- Which file extensions tend to be harmless, which evil?
- Tip: Display file extensions
- Dealing with macros
- How virus scanners work and what they can detect
- Remaining risks
- Malware on different platforms
- Which software for private use
- What is a cyber incident?
- What to do in the event of a cyber incident?
- Spectacular cases of cyber security attacks
- Which contacts should be contacted in an emergency?
- How password cracking works
- Create and remember strong passwords
- Keep passwords safe
- What are the benefits of password manager?
- Differences between commercial and free offers
- Functions based on KeePass expamples
- What does multi-factor authentication mean?
- Why is this so good?
- What types are there?
- Remaining risks
- What is social engineering?
- Uncover attacks
- Social engineering attacks on private individuals
- How do CEO fraud attackers act?
- Reacting properly
- Uncover attacks
- Clean Desk: Locking PCs and offices
- Disposal of sensitive information
- Dealing with visitors
- Sensitive information in public
- Work securely on the road
- Loss of mobile devices
- Use of external devices
- For which devices should you use antivirus protection?
- Difference between iOS and Android
- Tips for handling company equipment
- Tips for handling private devices
- Company data only on company devices
- Secure handling of IT in the home office
- Do not use public cloud services
- Web meetings and telephone tips
- Confidentiality classes
- Roles and responsibilities
- Need-to-know principle
- Handling sensitive information
- Differences in Cloud Solutions
- Which ones may I use?
- Secure exchange of large files
- Copyright and image sources
- Business model of social networks
- Behavior as an employee in social networks
- Privacy in social networks
- Social networks as information source for attackers
E-learning content „Privileged Accounts“
Every company has people with administrative rights, for example local admin rights, team and SharePoint administrators, or admins of supplier and customer portals. These "super users" can create or revoke access, install and delete software, but they are not real IT administrators and therefore often do not know about their special responsibilities. This course closes this knowledge gap.
- More freedom brings more responsibility
- Always work with user account
- Do not install unauthorized software
- Tips for local admin rights on private device, with difference between Windows and Mac
- What are identities and to what do they permit access?
- Which identities are managed centrally by IT?
- What is the task of a tool administrator?
- What is the role of the manager?
- Why can software from the Internet be so dangerous?
- Small tools as triggers of a ransomware attack
- The same applies to unauthorized cloud services
- Tips for downloads on private devices: Which sources are reasonably reliable
- Why should admin passwords have more than 15 characters?
- How passwords are cracked or obtained
- The importance of a second factor for privileged accounts
- Different passwords for different accounts
- What is a cyber incident?
- What to do in the event of a cyber incident?
- Spectacular cases of cyber security attacks
- Which contacts should be contacted in an emergency?
- What does multi-factor authentication mean?
- Why is this so good?
- What types are there?
- Remaining risks
If you also don't have a learning management system for our course content yet, we can offer you our IS-FOX learning management system.
And if you first want to understand what a learning management system is for and why they all speak Scorm, we recommend our know-how article on e-learning fundamentals.