
Interactive, entertaining & up-to-date
IT and cyber security training for employees
Interactive, entertaining & up-to-date
2,000+ customers trust in our trainings, from start-ups to large companies
Top quality content
We don't just create e-learning courses, we sustainably convey security know-how.
Modular system plus phishing simulations
Choose from over 40 modules on cutting-edge topics:
Would you like to discover our cyber security training courses in a live demo and discuss your requirements in a personal meeting?
Over 40 modules, always up-to-date, constantly growing
How do attackers proceed?
Exciting short movie "Ananomie of a cyber attack" with physical access, phishing and social engineering over the phone. Which groups of attackers pursue which goals? 10 min with short movie.
Why cyber security?
How does cyber security work? Why technology is not enough on its own. What important role does the human firewall play? 4 min with video.
Cyber security for managers
The special role of the manager in cyber security: team leader, role model & information owner. The “magic triangle” of easy, cheap and secure. The specific tasks of the manager in everyday life. 9 min with video and interactive exercises.
Email & Phishing
How can you recognize and fend off phishing emails? How can you correctly decode the link in an email? Where do you report a suspicious e-mail? With video and interactive exercises.
Microsoft 365-Phishing
What do attacks on Microsoft 365 logins look like? How can they be detected and defended against? How secure is MFA with Microsoft 365? With video and interactive exercises.
Phishing next level
The clever tricks of attackers unmasked: QR codes, 2-step phishing, social engineering on the phone and via teams. With video and interactive exercises.
Ransomware
How do ransomware attackers proceed? Why is the first victim often a user? How can you protect yourself? With video and interactive exercises.
Dangerous file extensions
Which file extensions in email attachments are harmless and which are dangerous? Why can Office documents in particular be very dangerous? With video and interactive exercises.
Viruses & malware
How many viruses and malware exist for which end devices? Where do you need a virus scanner and where not? Which software should you use privately? With video and interactive exercises.
Cyber incident
What is a cyber incident? What do you do in the event of an incident? Where do you report the incident? And what happens next? With video and interactive exercises.
Secure passwords
How are passwords cracked? Why are trivial passwords hacked in seconds? How do you create secure passwords that you can remember? With video and interactive exercises.
Admin passwords
Why do privileged passwords need to be particularly strong? Why do they have to be different? And how do you deal with privileged passwords? With video and interactive exercises.
Password management
How secure are password managers? Should you use password managers? If so, which one? Where are the limits? With video and interactive exercises.
Multi-factor authentication
What is multi-factor authentication? Why is it fundamentally important? Is MFA phishing-resistant? Which solutions can be used? With video and interactive exercises.
Local admin rights
What are local admin rights? Why do security experts consider local admin rights to be bad? What responsibility is involved with these rights? With video and interactive exercises.
Identity & access management
What is identity management? Which identities are managed centrally by IT and which are managed by admins in the business departments? What responsibility does this entail? With video and interactive exercises.
For small and medium-sized companies.
Just select licenses, invite participants, done! The rest works fully automated: invitations, reminders, tracking. This is how training works today.
For companies with their own learning management system (LMS).
You have your own learning management system or need customizations? No problem! Our courses will become “your” course in no time at all... with integration of the policies and the logo.
Impressive and engaging. Recommended for everyone in a company.
IS-FOX creates real behavioral change. We are excited.
The IS-FOX awareness platform is perfect for us.
Because we are a subject specialist, didactics expert and agency – all in one.
Thanks to our security consultants, incident response specialists and data protection experts, we know what's really important and what isn't. That's why our content is not only entertaining but also “audit-proof”.
We take the complexity out of topics and get right to the point by removing unnecessary jargon: crisp, understandable, comprehensive, always with practical tips - which is exactly why it sticks for longer.
Our multimedia team creates all IS-FOX products in-house: from storyboard, animation and graphic design to production. That's why we can also individualize excellently and react to new developments at lightning speed.
FAQ
What distinguishes a good e-learning, explainer video or webinar from a bad one? The script and the messages. If the basis isn't right, the rest won't work.
Script and messages are probably our greatest strengths. We focus on the essentials, always ask ourselves “why do I actually need to know this as a learner?”, throw out unnecessary blah-blah and foreign words and get to the point very quickly with a simple, comprehensible “call to action”. The participants love our content for this and regularly give us excellent feedback.
Addressing the right target group is very important for us, especially as part of an awareness campaign. Take a look at our know-how article on training the often forgotten IT target group.
We offer a wide range of content for target group-specific training, which can be put together flexibly and designed according to different criteria:
Function in the company: For example, dedicated training for managers, for all employees, etc.
Department / role: Special training for IT professionals such as developers or IT administrators, production employees, people in the board/finance area, etc.
Level of knowledge: Basic training, advanced training or training for people with a specialization, e.g. processing credit card data, people with privileged rights, or people who are frequently on business trips, etc.
All-in-one: training courses with pre-test. If you pass, you're through. Or training courses with refresher paths: Have you attended content before? Then take the refresher path!
We will be happy to advise you on putting together the right training for your target groups.
Yes - participants can have a certificate issued. Either through their company's learning management system or through the course, as required.
Of course, we always have our ears to the ground and keep an eye on changes, both in the legal situation and in company practice. If there is something to change, we update accordingly.
As part of our cloud service, these updates are included in the annual fee. With a purchase license, we inform you about the new version and you decide for yourself whether you want to update or not. However, the update price is so attractive that you can hardly refuse.
Other courses that might interest you
E-Learning knowledge from our blog
How to repackage familiar GDPR content into exciting online courses.
Find out how companies can properly motivate their employees to complete an e-learning course on cyber security, data protection or compliance.
In this article, we explain the technical terms Scorm, LMS and e-learning course.