Interactive, entertaining & up-to-date

IT and cyber security training for employees

   7 business world languages

   Perfectly combinable with phishing simulations

   More than 40 interactive e-learning units

   Auditor-proof, with test and certificate

 

Test the course first hand   Request live demo
 

 

Cyber security training for employees

2,000+ customers trust in our security awareness trainings, from start-ups to large companies

Email & phishing

Top quality content

Security and learning specialist in one

We don't just create e-learning courses, we sustainably convey security know-how.

  • Real and up-to-date threat scenarios
  • Simple and practical messages with a wow effect
  • No blah blah, straight to the point
  • Legally compliant and auditor-proof
  • As a cloud service or for your own LMS
     

See our award-winning awareness campaigns

Modular system plus phishing simulations

Combine content as preferred

Choose from over 40 modules on cutting-edge topics:

  • Single learning nuggets: A topic covered in 5-8 minutes. Includes video and interactive exercises.
  • Curated recommendations: Pre-defined courses that mitigate key risks or are tailored to specific audiences.
  • Customized course: you choose the chapters, we create the course module. With individual customizing.
  • Phishing simulations: Phishing simulations can be added / integrated as required. From a wake-up call for everyone to regular, time-delayed and randomized tests.

Learn more about phishing simulations

Phishing Simulation

 

Personal consultation?

Would you like to discover our cyber security training courses in a live demo and discuss your requirements in a personal meeting?
 

Request live demo

IS-FOX Logo Fuchs ohne Text

The cyber security content

Over 40 modules, always up-to-date, constantly growing

Introduction

Introduction and cyber security basics

How do attackers proceed?

Exciting short movie "Ananomie of a cyber attack" with physical access, phishing and social engineering over the phone. Which groups of attackers pursue which goals? 10 min with short movie.
 


Why cyber security?

How does cyber security work? Why technology is not enough on its own. What important role does the human firewall play? 4 min with video.   

Cyber security for managers

The special role of the manager in cyber security: team leader, role model & information owner. The “magic triangle” of easy, cheap and secure. The specific tasks of the manager in everyday life. 9 min with video and interactive exercises.

Top digital threats

Top digital threats and cyber incidents

Email & Phishing 

How can you recognize and fend off phishing emails? How can you correctly decode the link in an email? Where do you report a suspicious e-mail? With video and interactive exercises.
 


Microsoft 365-Phishing 

What do attacks on Microsoft 365 logins look like? How can they be detected and defended against? How secure is MFA with Microsoft 365? With video and interactive exercises.  

Phishing next level 

The clever tricks of attackers unmasked: QR codes, 2-step phishing, social engineering on the phone and via teams. With video and interactive exercises.  

Ransomware 

How do ransomware attackers proceed? Why is the first victim often a user? How can you protect yourself? With video and interactive exercises. 

Dangerous file extensions 

Which file extensions in email attachments are harmless and which are dangerous? Why can Office documents in particular be very dangerous? With video and interactive exercises. 

Viruses & malware 

How many viruses and malware exist for which end devices? Where do you need a virus scanner and where not? Which software should you use privately? With video and interactive exercises. 

Cyber incident 

What is a cyber incident? What do you do in the event of an incident? Where do you report the incident? And what happens next? With video and interactive exercises.

Authentication

Authentication, passwords and password management

Secure passwords 

How are passwords cracked? Why are trivial passwords hacked in seconds? How do you create secure passwords that you can remember? With video and interactive exercises.

Admin passwords  

Why do privileged passwords need to be particularly strong? Why do they have to be different? And how do you deal with privileged passwords? With video and interactive exercises.  

Password management 

How secure are password managers? Should you use password managers? If so, which one? Where are the limits? With video and interactive exercises. 

Multi-factor authentication 

What is multi-factor authentication? Why is it fundamentally important? Is MFA phishing-resistant? Which solutions can be used? With video and interactive exercises. 

Local admin rights  

What are local admin rights? Why do security experts consider local admin rights to be bad? What responsibility is involved with these rights? With video and interactive exercises. 

Identity & access management 

What is identity management? Which identities are managed centrally by IT and which are managed by admins in the business departments? What responsibility does this entail? With video and interactive exercises.

Social Engineering

Social Engineering

Social Engineering 

Attackers manipulate their victims with pressure, a need for help and a plausible story. This learning nugget provides the necessary knowledge to recognize social engineering scams and react correctly. With video and interactive exercises. 

 


CEO-Fraud 

Many companies have already transferred large sums of money to fraudsters. This learning nugget explains the attackers' scam and provides practical tips for protection. With video and interactive exercises.  

Workplaces

Workplaces

Secure workplace 

What are attackers looking for on site? How can you increase information security through your own behavior? Clean desk, clear screen, safe disposal, correct handling of visitors. With video and interactive exercises.

Secure business trips

Why are confidential conversations in public dangerous? Is the hotel a “safe” place? Should you use public WLANs? With video and interactive exercises.

Secure in the home office

How do you access company data on the move? Why shouldn't anyone else use the company device? What should you watch out for during web meetings or phone calls? With tips for private devices at home, video and interactive exercises.

 

Internet & Cloud

Internet & Cloud

Internet & Cloud 

What distinguishes public cloud offerings from your own company's cloud services? Why does company data have no place in public cloud services? With tips for secure surfing at home, video and interactive exercises.

Social media 

How can you increase privacy on social media? Why should you always check your privacy settings and not post company information? What rules apply to company data? With video and interactive exercises.

Software from the Internet 

Why do security experts have such big problems with software and apps from the Internet? Is it really that dangerous? What can happen and what does “shadow IT” have to do with it? With video and interactive exercises.


 

AI

Top digital threats and cyber incidents

Safe use of AI 

How does a generative AI like ChatGPT work? What are the challenges involved? Can the results be trusted? How can you use these systems safely? With video and interactive exercises. 

AI competence (EU AI Act) 

How does AI work? What challenges are associated with genetic systems? What does the AI regulation want? How can AI systems be used safely? And how do you get the best results? With video and interactive exercises. Learn more...
 

Regulatory Affairs

Top digital threats and cyber incidents

ISMS basics 

What does information security do? What are the protection goals? How do you manage it all? Who is responsible for what? And what role does each individual person play? With video and interactive exercises. 

PCI DSS 

What does PCI DSS mean, why is it so important and what are the specific requirements for handling credit card data? With video and interactive exercises. 

Business Continuity Management 

What is BCM and why is it fundamentally important? What can cause an emergency and how can an organization prepare for it? What should be done in an emergency and what role does each individual play? With video and interactive exercises. 

NIS-2 

How do organizations become resilient? What exactly does NIS-2 want? What does it mean for managers? And what does it mean for employees? With videos and interactive exercises.  Learn more...

DORA 

What does DORA require? What goals does it pursue? What are the main pillars of DORA? And why does the law really make sense? With video and interactive exercises.  Learn more...

EU AI Act

How does AI work? What challenges are associated with generative systems? What does the AI regulation want? How can AI systems be used safely? And how do you get the best results? With videos and interactive exercises. Learn more...


 

Special topics

Special topics

Secure handling of MS Teams 

What pitfalls lurk in MS Teams for the security of information? Who should become a member of a team? Who can access which files? With video and interactive exercises.

Smartphones & tablets 

Is Apple iOS more secure than Google Android? Where do you need a virus scanner and where not? Are company devices better protected? With tips for private mobile devices, video and interactive exercises.  

Classifying information with Microsoft Office 

Why does information need to be classified? Who does this? In which tool? According to which criteria? And what happens when information is assigned to a confidentiality class? With video and interactive exercises. 

Sensitive information

How do you classify information in the right confidentiality class? Who is responsible for this? And what does this classification mean for the handling of the information? With video and interactive exercises. 

Discover all cyber security demos

indevis IT-Consulting and Solutions GmbH Logo

"The security awareness training platform from IS-FOX has exceeded our expectations. The practical training, user-friendly design and high-quality content - including up-to-date modules such as NIS2, whistleblowing and due diligence in the supply chain - offer real added value for our company. Our employees are now well prepared to recognise security risks and act with confidence. An unreserved recommendation!"


Dirk Wocke
Compliance Manager (ISO / DPO), indevis IT-Consulting and Solutions GmbH

Suitable for any company size
The right solution for everything from small businesses to large corporations.

Cloud training platform

For small and medium-sized companies. 

Just select licenses, invite participants, done! The rest works fully automated: invitations, reminders, tracking. This is how training works today.

To the IS-FOX Awareness Platform 

Schulung für alle Unternehmensgrößen

Individually customized

For companies with their own learning management system (LMS). 

You have your own learning management system or need customizations? No problem! Our courses will become “your” course in no time at all... with integration of the policies and the logo.

Get advice now

IS-FOX Beste Bewertungen E-Learning

 

Mehr Infos TOP EMPFEHLUNG 2025 Kundenmeinungen der letzten 12 Monate

 

 

Proven Expert recommendation 4,7 out of 5
Kundenzitat
Impressive and engaging. Recommended for everyone in a company.
W. Ehses, ISO Swiss Post
Kundenzitat
IS-FOX creates real behavioral change. We are excited.
T. Wepner, CISO Amadeus
Kundenzitat
The IS-FOX awareness platform is perfect for us.
R. Witzgall, CEO adyton Ltd.

Why cyber security trainings by IS-FOX?

Because we are a subject specialist, didactics expert and agency – all in one.

Security specialist


Content from experts

Thanks to our security consultants, incident response specialists and data protection experts, we know what's really important and what isn't. That's why our content is not only entertaining but also “audit-proof”.

Marketing Specialist


Right to the point

We take the complexity out of topics and get right to the point by removing unnecessary jargon: crisp, understandable, comprehensive, always with practical tips - which is exactly why it sticks for longer.

E-learning specialist


All-in-one service

Our multimedia team creates all IS-FOX products in-house: from storyboard, animation and graphic design to production. That's why we can also individualize excellently and react to new developments at lightning speed.

FAQ

Really good content

What distinguishes a good e-learning, explainer video or webinar from a bad one? The script and the messages. If the basis isn't right, the rest won't work.

Getting to the point

Script and messages are probably our greatest strengths. We focus on the essentials, always ask ourselves “why do I actually need to know this as a learner?”, throw out unnecessary blah-blah and foreign words and get to the point very quickly with a simple, comprehensible “call to action”. The participants love our content for this and regularly give us excellent feedback.  

Addressing the right target group is very important for us, especially as part of an awareness campaign. Take a look at our know-how article on training the often forgotten IT target group.

We offer a wide range of content for target group-specific training, which can be put together flexibly and designed according to different criteria:

Function in the company: For example, dedicated training for managers, for all employees, etc.

Department / role: Special training for IT professionals such as developers or IT administrators, production employees, people in the board/finance area, etc.

Level of knowledge: Basic training, advanced training or training for people with a specialization, e.g. processing credit card data, people with privileged rights, or people who are frequently on business trips, etc.

All-in-one: training courses with pre-test. If you pass, you're through. Or training courses with refresher paths: Have you attended content before? Then take the refresher path!

We will be happy to advise you on putting together the right training for your target groups.  

Yes - participants can have a certificate issued. Either through their company's learning management system or through the course, as required. 

Of course, we always have our ears to the ground and keep an eye on changes, both in the legal situation and in company practice. If there is something to change, we update accordingly.

As part of our cloud service, these updates are included in the annual fee. With a purchase license, we inform you about the new version and you decide for yourself whether you want to update or not. However, the update price is so attractive that you can hardly refuse.

Other courses that might interest you

E-Learning knowledge from our blog

Data Protection
data protection refresh

How to repackage familiar GDPR content into exciting online courses.

Read more
E-Learning
Ein Bild auf welchem die Mitarbeiter ihre Daumen hoch zeigen

Find out how companies can properly motivate their employees to complete an e-learning course on cyber security, data protection or compliance.

Read more
E-Learning
Illustration basics e-learning, scorm and lms

In this article, we explain the technical terms Scorm, LMS and e-learning course.

Read more