Webinar

Cyber LAB Cloud Security for Admins – one step ahead of attackers!

Increase your IT team's awareness of secure cloud systems and backups with Cyber LAB training.

 

Watch now

Illustration webinar cyber lab cloud security

The webinar

Analyses of real-life attacks show: IT professionals cause significantly more damage through careless behavior than a user who clicks on a phishing email. High time to change that!

In our webinar for IT admins, you will learn which human vulnerabilities in IT are often exploited by attackers and how you can close them. You will also receive specific practical tips for more security in the cloud and for backups - your life insurance against ransomware gangs.

 

Frank von Stetten

Your speaker:  

Frank von Stetten
Managing Director HvS and Head of Cyber Security Awareness

Frank von Stetten is co-founder of HvS-Consulting in Munich and a true cyber security professional and security awareness Jedi. For more than 20 years, he and his team have been supporting companies in defending against real attacks and creating a functioning security culture. He is the author of the very popular Cyber LABs for IT pros, a security training series for administrators and developers. 

What you will learn:

  • You will understand why sensitizing the IT team is an elementary component of cyber security.
  • You will receive excerpts from our Cyber LABs with specific tips on cloud security and how to use multi-factor authentication (MFA)
  • You will learn which backup errors have broken the back of other companies.
  • You will learn which targeted training measures you can use to advance your IT team in cyber security.

Feedback from our webinar participants

  

Super informative and structured. Thank you very much!

 

It was exciting throughout and I wasn't bored at any point :)

  

This training should be mandatory for all admins!

 

Want to play around yourself?

Nothing is as convincing as trying it out for yourself. Get a free demo access now and test our Cyber LABs first hand.

 

Talk to our experts

Frequently asked questions about Cyber LAB training for administrators

The Cyber LABs are aimed at internal and external people who design, develop or operate IT infrastructure, i.e. IT managers, IT architects, application owners, software developers, system managers, administrators and support staff. 

All “hacking scenarios” in the Cyber LAB are based on real APT attacks by current hacker groups and are therefore highly relevant. In the e-learning part of the Cyber LAB, we impart the knowledge of how professional attackers proceed - in the LAB environment, the participants are allowed to implement the knowledge they have learned in the LAB themselves. They slip into the role of the attacker and work through a typical “kill chain”. This change of perspective trains security awareness for potential vulnerabilities and promotes secure behavior.

IT administrators understand the approach of modern attackers and learn to see cyber security as a concept and not as a collection of security products. Numerous practical tips will enable them to significantly strengthen the security of their infrastructure through configuration, the use of on-board tools and security-conscious behavior.

IT decision-makers in small and medium-sized companies will understand after the training how cyber security works as a concept, which measures have priority and why the mere use of individual security products does not lead to the desired protection. This enables them to make better and more efficient decisions about the use of security tools and to better classify the marketing promises of individual manufacturers.

Decentralized IT administrators understand the approach of modern attackers and learn why the cyber security guidelines of central IT make sense and are useful. They develop an understanding of the measures and no longer perceive them as annoying additional work from the head office. Security findings from audits and assessments are resolved faster and better, and the security level in the decentralized units increases considerably thanks to security-conscious behavior.

HvS-Consulting, the company behind the IS-FOX brand, combines the expertise of a cyber security specialist and a learning specialist in a unique and special way. The technical security consultants and incident responders at HvS-Consulting are among the best in their field and experience attacks on companies on a daily basis, how the attackers proceed and which technical and human vulnerabilities they exploit.

The IS-FOX Security Awareness Team takes this special knowledge, reduces complexity and prepares it in a didactic way so that the training courses set the right priorities, are understandable, contain practical and practicable tips and are fun to learn

Traditional, non-specialist learning specialists do not understand the complex content of cyber security and therefore cannot prepare the content optimally. Security specialists are too deep in the subject matter and are usually unable to convey this know-how in a simple way. The “magic” of the courses is created by this unique combination of security and learning specialists in one company.

In the LAB, participants can put the knowledge they have learned into practice. The LAB for administrators simulates a company network with several prepared Windows and Linux systems, a total of 8 server systems. It contains up-to-date attack tools and assistance.

Option “Shared LAB environment”
You get access to one of our shared LAB environments in Microsoft Azure. Your participants share the LAB with other customers. Each customer can access the shared LAB environment with a maximum of 2 simultaneous users. A shared LAB environment is ideal if you want to train a small number of participants over a longer period of time (e.g. 50 participants in 1 year). Typical scenarios are smaller companies with few IT employees and larger companies that want to offer training to new employees on a permanent basis.

Option “Own LAB environment”
You receive one (or more) exclusive LAB environments in Microsoft Azure for your participants. They access the LAB environment(s) together. You can choose between 2 LAB sizes: “Standard” with 5 or “Enterprise” with 25 simultaneous users in the LAB. A dedicated LAB environment is ideal if you want to train a large number of participants in a short space of time (e.g. 200 participants in 3 months). A typical scenario is the initial training of all IT colleagues.

As standard, the learning units (the courses) are offered fully synchronized in German and English. On request, the learning units can be subtitled in other languages for an additional charge. The LAB environment is always in English.

You can use the Cyber LABs as a rental license and choose between a term of six and twelve months. A six-month extension is possible.

Yes, the learning units can be integrated into your own LMS via “SCORM Streaming”. As a customer, you will receive a learning package in SCORM format for your LMS. Although the content is retrieved (“streamed”) via the IS-FOX Cloud, the course behaves identically to an “internal course”, i.e. course administration, invitation management, booking of success, etc. takes place in your LMS.

The LABs and the associated administration (the “LAB Portal”) contain a great deal of technology and logic and therefore cannot be operated in a customer's own Azure tenant. However, you can store the link to your internal LMS in the LAB Portal in order to establish a transparent connection.

Yes, that is possible. In order to better map your maturity level and your internal processes, we have created various jumping-off points where you can choose from ready-made modules or refer to your internal guidelines.

Yes, all courses include a follow-up test in multiple-choice form. After successfully passing the test, participants can download a certificate as a PDF.

The tracking dashboard is a matter for the learning management system. Our LMS naturally offers invitation management, participation tracking and corresponding statistics.

Yes, thanks to our expertise in incident response and forensics, we are always up to date with the latest technology, security vulnerabilities and attack vectors. We regularly pour this know-how into new content for your awareness target groups. 

Yes, thanks to the many, sometimes optional, explanations and assistance in e-learning and in the LAB environment, we offer support where necessary and avoid unnecessary explanations where they are not needed. In addition, we offer a support service that provides your participants with advice and assistance should something not work.

Other courses that might interest you

Training Secure Development

Online training for developers with a high practical component and your own LAB environment.

Read more
Test löschen Preview Bild

IT security training for administrators with interactive e-learning and hacking environment.

Read more
Cyber Security Training preview

Modern and entertaining IT security trainings protect your company from attacks and their consequences.

Read more
Preview EU AI Act

The EU AI Act is here and brings with it a host of legal requirements - and now what? In our webinar, you will learn how to strategically master these legal requirements and optimally prepare your employees for the use of AI.

Read more