Cyber and IT Security Training for employees

We provide modular online cyber security training & e-learning courses on IT security with test and certificate.

Start demo
Visualized illustration of cyber security training

The right solution for your business

Regardless of whether your cyber security training courses need to be ready to go quickly or whether they need to be flexibly customisable: We have a solution for you.
This video will be loaded from YouTube while playing. By clicking here you accept the data protection declaration of HVS Consulting / IS-FOX and YouTube.

Boost your employees’ awareness with a cyber security training

 

90% of cyber security risks sit in front of the screen – mostly due to lack of understanding and awareness. As the threat landscape continues to rise, it's important to understand attackers and how they operate. With our cyber security trainings and cyber security e-learnings for employees, we build strong information security awareness and address the role of each individual user in your company. By increasing your employees' awareness of information security we counteract the risk and impact of a cyber attack in your company.

Customer feedback

Graphic of our Cyber Security E-Learning rating

Adjust our Cyber-Security Trainings & Cyber-Security E-Learnings to your needs

Our cyber security trainings and cyber security e-learnings increase your employees' awareness about how to protect your networks, data and devices from theft, damage and unauthorized access by criminals. From identifying phishing emails, to physical security, password management, cloud services, right through to social engineering and CEO Fraud, we currently offer 25+ Cyber Security modules.

You can either choose one of our "Best Practice" trainings or combine your individual Cyber Security course from our modules - of course customized according to your guidelines and your corporate design. You can run the finished online training at your company or in our cloud... or both.

Our wide range of modules includes educational content on the anatomy of a cyber attack, classic and refresher modules, or webinars on information security. Professional content, simply explained in our popular videos and exercises that have been tested by our in-house security experts and rated as excellent by users.

Cyber Security Training
This video will be loaded from YouTube while playing. By clicking here you accept the data protection declaration of HVS Consulting / IS-FOX and YouTube.

International, cost-efficient, auditable at any time: & Our e-learning cyber security training

 

Our e-learning courses are suitable for small, medium-sized and large companies - regardless of whether or not you already have your own learning management system (LMS). All content can be implemented into an existing LMS or run in our cloud, if desired. Or both.

With multimedia modules consisting of videos, interactive exercises, individual learning paths, and final quizzes, employees can learn or refresh their existing knowledge anywhere. By the way, we offer these courses without any complicated legal or techie jargon or excess details - we promise! We are also happy to consult you on how to increase your (voluntary) participation rate.

Watch a Cyber Security e-learning course demo here.

 

Who are the cyber security trainings for?

 

Every employee is a user. HR, accounting, administrators, developers, leadership - everyone has a responsibility to protect data and devices. This doesn't just apply to people with administrative privileges. That makes it all the more important that each individual understands the importance of security measures, as well as how to identify and respond to threats when needed.

E-Learning content 'IT Security / Cyber Security'

Why cyber security?
  • Current Threat Situation
  • Who are the attackers, what is their motivation?
  • Implementation of a functioning information security
  • Role of the user in protecting information
How do attackers proceed?
  • Film: Anatomy of a cyber attack
  • Who are the attackers?
  • What are their goals?
E-Mail & Phishing
  • Detecting and fending off phishing
  • Encryption of sensitive information
  • Viruses and Trojans in e-mails
Microsoft 365 phishing
  • Detect and defend against Microsoft 365 phishing
  • Microsoft 365 Safe Link
  • Typical Microsoft 365 phishing scams
  • Multi-factor authentication in Microsoft 365
Ransomware
  • What is ransomware and why is it so dangerous?
  • Tips for protection in the company
  • Tips for protecting private IT
Dangerous file extensions
  • Which file extensions tend to be harmless, which evil?
  • Tip: Display file extensions
  • Dealing with macros
Viruses & malware
  • How virus scanners work and what they can detect
  • Remaining risks
  • Malware on different platforms
  • Which software for private use
Behaviour in an emergency
  • What is a cyber incident?
  • What to do in the event of a cyber incident?
  • Spectacular cases of cyber security attacks
  • Which contacts should be contacted in an emergency?
Passwords
  • How password cracking works
  • Create and remember strong passwords
  • Keep passwords safe
Password management
  • What are the benefits of password manager?
  • Differences between commercial and free offers
  • Functions based on KeePass expamples
Multi-factor authentication
  • What does multi-factor authentication mean?
  • Why is this so good?
  • What types are there?
  • Remaining risks
Social Engineering
  • What is social engineering?
  • Uncover attacks
  • Social engineering attacks on private individuals
CEO Fraud
  • How do CEO fraud attackers act?
  • Reacting properly
  • Uncover attacks
Secure workplace
  • Clean Desk: Locking PCs and offices
  • Disposal of sensitive information
  • Dealing with visitors
Secure business travel
  • Sensitive information in public
  • Work securely on the road
  • Loss of mobile devices
  • Use of external devices
Smartphones & tablets
  • For which devices should you use antivirus protection?
  • Difference between iOS and Android
  • Tips for handling company equipment
  • Tips for handling private devices
Safe in the home office
  • Company data only on company devices
  • Secure handling of IT in the home office
  • Do not use public cloud services
  • Web meetings and telephone tips
Protect sensitive information
  • Confidentiality classes
  • Roles and responsibilities
  • Need-to-know principle
  • Handling sensitive information
Internet & Cloud
  • Differences in Cloud Solutions
  • Which ones may I use?
  • Secure exchange of large files
  • Copyright and image sources
Social media
  • Business model of social networks
  • Behavior as an employee in social networks
  • Privacy in social networks
  • Social networks as information source for attackers

E-learning content  „Privileged Accounts“

Every company has people with administrative rights, for example local admin rights, team and SharePoint administrators, or admins of supplier and customer portals. These "super users" can create or revoke access, install and delete software, but they are not real IT administrators and therefore often do not know about their special responsibilities. This course closes this knowledge gap.

Start demo chapter "Local Admin Rights"

E-Learning privileged Accounts demo chapter Local Admin Rights
Local Admin Rights
  • More freedom brings more responsibility
  • Always work with user account
  • Do not install unauthorized software
  • Tips for local admin rights on private device, with difference between Windows and Mac
Identity & Access Management
  • What are identities and to what do they permit access?
  • Which identities are managed centrally by IT?
  • What is the task of a tool administrator?
  • What is the role of the manager?
Software from the Internet
  • Why can software from the Internet be so dangerous?
  • Small tools as triggers of a ransomware attack
  • The same applies to unauthorized cloud services
  • Tips for downloads on private devices: Which sources are reasonably reliable
Admin Passwords
  • Why should admin passwords have more than 15 characters?
  • How passwords are cracked or obtained
  • The importance of a second factor for privileged accounts
  • Different passwords for different accounts 
Cyber Incidents
  • What is a cyber incident?
  • What to do in the event of a cyber incident?
  • Spectacular cases of cyber security attacks
  • Which contacts should be contacted in an emergency?
Multi-factor authentication
  • What does multi-factor authentication mean?
  • Why is this so good?
  • What types are there?
  • Remaining risks

If you also don't have a learning management system for our course content yet, we can offer you our IS-FOX learning management system.

And if you first want to understand what a learning management system is for and why they all speak Scorm, we recommend our know-how article on e-learning fundamentals

More chapters? Prices? References?

Get a demo access and let us talk about your needs in a web meeting. We will show you what we have successfully implemented in comparable customer situations.
Let's talk
This video will be loaded from YouTube while playing. By clicking here you accept the data protection declaration of HVS Consulting / IS-FOX and YouTube.