Interactive, entertaining & up-to-date

IT and cyber security training for employees

   7 business world languages

   Perfectly combinable with phishing simulations

   More than 40 interactive e-learning units

   Auditor-proof, with test and certificate

 

Test the course first hand   Request live demo
 

 

Cyber security training for employees

2,000+ customers trust in our trainings, from start-ups to large companies

Top quality content

Security and learning specialist in one

We don't just create e-learning courses, we sustainably convey security know-how.

  • Real and up-to-date threat scenarios
  • Simple and practical messages with a wow effect
  • No blah blah, straight to the point
  • Legally compliant and auditor-proof
  • As a cloud service or for your own LMS
     

See our award-winning awareness campaigns

Modular system plus phishing simulations

Combine content as preferred

Choose from over 40 modules on cutting-edge topics:

  • Single learning nuggets: A topic covered in 5-8 minutes. Includes video and interactive exercises.
  • Curated recommendations: Pre-defined courses that mitigate key risks or are tailored to specific audiences.
  • Customized course: you choose the chapters, we create the course module. With individual customizing.
  • Phishing simulations: Phishing simulations can be added / integrated as required. From a wake-up call for everyone to regular, time-delayed and randomized tests.

Learn more about phishing simulations

Phishing Simulation

 

Personal consultation?

Would you like to discover our cyber security training courses in a live demo and discuss your requirements in a personal meeting?
 

Request live demo

IS-FOX Logo Fuchs ohne Text

The cyber security content

Over 40 modules, always up-to-date, constantly growing

Introduction

Introduction and cyber security basics

How do attackers proceed?

Exciting short movie "Ananomie of a cyber attack" with physical access, phishing and social engineering over the phone. Which groups of attackers pursue which goals? 10 min with short movie.
 

At this point, there is external content from YouTube that has been recommended by our editorial team. It complements the content of this page and can be displayed with a single click. I agree to have this external content displayed. In doing so, personal data may be transmitted to the content provider and third-party services. For more information, please see our privacy policy.

Show me the video


Why cyber security?

How does cyber security work? Why technology is not enough on its own. What important role does the human firewall play? 4 min with video.   

Cyber security for managers

The special role of the manager in cyber security: team leader, role model & information owner. The “magic triangle” of easy, cheap and secure. The specific tasks of the manager in everyday life. 9 min with video and interactive exercises.

Top digital threats

Top digital threats and cyber incidents

Email & Phishing 

How can you recognize and fend off phishing emails? How can you correctly decode the link in an email? Where do you report a suspicious e-mail? With video and interactive exercises.
 

At this point, there is external content from YouTube that has been recommended by our editorial team. It complements the content of this page and can be displayed with a single click. I agree to have this external content displayed. In doing so, personal data may be transmitted to the content provider and third-party services. For more information, please see our privacy policy.

Show me the video


Microsoft 365-Phishing 

What do attacks on Microsoft 365 logins look like? How can they be detected and defended against? How secure is MFA with Microsoft 365? With video and interactive exercises.  

Phishing next level 

The clever tricks of attackers unmasked: QR codes, 2-step phishing, social engineering on the phone and via teams. With video and interactive exercises.  

Ransomware 

How do ransomware attackers proceed? Why is the first victim often a user? How can you protect yourself? With video and interactive exercises. 

Dangerous file extensions 

Which file extensions in email attachments are harmless and which are dangerous? Why can Office documents in particular be very dangerous? With video and interactive exercises. 

Viruses & malware 

How many viruses and malware exist for which end devices? Where do you need a virus scanner and where not? Which software should you use privately? With video and interactive exercises. 

Cyber incident 

What is a cyber incident? What do you do in the event of an incident? Where do you report the incident? And what happens next? With video and interactive exercises.

Authentication

Authentication, passwords and password management

Secure passwords 

How are passwords cracked? Why are trivial passwords hacked in seconds? How do you create secure passwords that you can remember? With video and interactive exercises.

Admin passwords  

Why do privileged passwords need to be particularly strong? Why do they have to be different? And how do you deal with privileged passwords? With video and interactive exercises.  

Password management 

How secure are password managers? Should you use password managers? If so, which one? Where are the limits? With video and interactive exercises. 

Multi-factor authentication 

What is multi-factor authentication? Why is it fundamentally important? Is MFA phishing-resistant? Which solutions can be used? With video and interactive exercises. 

Local admin rights  

What are local admin rights? Why do security experts consider local admin rights to be bad? What responsibility is involved with these rights? With video and interactive exercises. 

Identity & access management 

What is identity management? Which identities are managed centrally by IT and which are managed by admins in the business departments? What responsibility does this entail? With video and interactive exercises.

Discover all cyber security demos

Suitable for any company size
The right solution for everything from small businesses to large corporations.

Cloud training platform

For small and medium-sized companies. 

Just select licenses, invite participants, done! The rest works fully automated: invitations, reminders, tracking. This is how training works today.

To the IS-FOX Awareness Platform 

Schulung für alle Unternehmensgrößen

Individually customized

For companies with their own learning management system (LMS). 

You have your own learning management system or need customizations? No problem! Our courses will become “your” course in no time at all... with integration of the policies and the logo.

Get advice now

IS-FOX Beste Bewertungen E-Learning

 

Mehr Infos TOP EMPFEHLUNG 2025 Kundenmeinungen der letzten 12 Monate

 

 

Proven Expert recommendation 4,7 out of 5
Kundenzitat
Impressive and engaging. Recommended for everyone in a company.
Kundenzitat
IS-FOX creates real behavioral change. We are excited.
Kundenzitat
The IS-FOX awareness platform is perfect for us.

Why cyber security trainings by IS-FOX?

Because we are a subject specialist, didactics expert and agency – all in one.

Security specialist


Content from experts

Thanks to our security consultants, incident response specialists and data protection experts, we know what's really important and what isn't. That's why our content is not only entertaining but also “audit-proof”.

Marketing Specialist


Right to the point

We take the complexity out of topics and get right to the point by removing unnecessary jargon: crisp, understandable, comprehensive, always with practical tips - which is exactly why it sticks for longer.

E-learning specialist


All-in-one service

Our multimedia team creates all IS-FOX products in-house: from storyboard, animation and graphic design to production. That's why we can also individualize excellently and react to new developments at lightning speed.

FAQ

Really good content

What distinguishes a good e-learning, explainer video or webinar from a bad one? The script and the messages. If the basis isn't right, the rest won't work.

Getting to the point

Script and messages are probably our greatest strengths. We focus on the essentials, always ask ourselves “why do I actually need to know this as a learner?”, throw out unnecessary blah-blah and foreign words and get to the point very quickly with a simple, comprehensible “call to action”. The participants love our content for this and regularly give us excellent feedback.  

Addressing the right target group is very important for us, especially as part of an awareness campaign. Take a look at our know-how article on training the often forgotten IT target group.

We offer a wide range of content for target group-specific training, which can be put together flexibly and designed according to different criteria:

Function in the company: For example, dedicated training for managers, for all employees, etc.

Department / role: Special training for IT professionals such as developers or IT administrators, production employees, people in the board/finance area, etc.

Level of knowledge: Basic training, advanced training or training for people with a specialization, e.g. processing credit card data, people with privileged rights, or people who are frequently on business trips, etc.

All-in-one: training courses with pre-test. If you pass, you're through. Or training courses with refresher paths: Have you attended content before? Then take the refresher path!

We will be happy to advise you on putting together the right training for your target groups.  

Yes - participants can have a certificate issued. Either through their company's learning management system or through the course, as required. 

Of course, we always have our ears to the ground and keep an eye on changes, both in the legal situation and in company practice. If there is something to change, we update accordingly.

As part of our cloud service, these updates are included in the annual fee. With a purchase license, we inform you about the new version and you decide for yourself whether you want to update or not. However, the update price is so attractive that you can hardly refuse.

Other courses that might interest you

E-Learning knowledge from our blog

Data Protection
data protection refresh

How to repackage familiar GDPR content into exciting online courses.

Read more
E-Learning
Ein Bild auf welchem die Mitarbeiter ihre Daumen hoch zeigen

Find out how companies can properly motivate their employees to complete an e-learning course on cyber security, data protection or compliance.

Read more
E-Learning
Illustration basics e-learning, scorm and lms

In this article, we explain the technical terms Scorm, LMS and e-learning course.

Read more