E-learning for employees: learn the tricks of the phisher

G Data News

Share post

New e-learning courses from G DATA: learn the tricks of the phisher in story mode. Seven-part learning series from the cyber defense company ensures better learning success for company employees. 

A single inattentive employee, a single click - that's all it takes for cybercriminals to successfully hijack a network with a phishing email. In order to better prepare future employees for dangerous phishing emails, G DATA CyberDefense is offering a new e-learning training series as part of the G DATA academy. The special feature: through storytelling and gamification, the learning content is particularly well remembered by the employees.

Employee training against phishing

In order to raise staff awareness of fraudulent emails, G DATA is now offering a new series of courses as part of its security awareness training – e-learning courses – on the topic of “phishing”. The online training courses are designed as a learning journey, are entertaining and highly interactive in order to maximize the learner's learning transfer. The courses start with the basics of phishing and gradually build up knowledge up to expert knowledge over seven episodes. The training is now available as an add-on in the G DATA academy.

Experienceable learning content – ​​better learning success

In the e-learning, the employees follow four main characters, each of which stands for a specific user type in combination with a different attack path for the phishing attacks. They serve as identification figures for the learners throughout the series. "Phishing" is naturally derived from the word "fishing". To stay true to this analogy, most of the training takes place in an underwater world. The learning series offers a very high degree of interaction.

Classic formats such as drag & drop tasks or multiple-choice questions are reinterpreted through the game-based setting in combination with the story, with learners dragging false statements into fishing nets, filling submarines with air bubbles or the headlights of the submarine. Bootes must point to the correct answer option.

The highlight and conclusion of the series is a digital escape room. This is located in the "cave" of one of the antagonists, the "Spear Phisher". From this cave she plans her attacks. Hints are hidden there, with which the learners have to thwart a planned attack by the spear phisher with their accumulated knowledge from the training series, in order to then return to the surface. In this way, the learners deal intensively with phishing attacks from real life and, in particular, get to know the protective mechanisms better.

More at GData.de

 


About G Data

With comprehensive cyber defense services, the inventor of the anti-virus enables companies to defend themselves against cybercrime. Over 500 employees ensure the digital security of companies and users. Made in Germany: With over 30 years of expertise in malware analysis, G DATA conducts research and software development exclusively in Germany. The highest standards of data protection are paramount. In 2011, G DATA issued a “no backdoor” guarantee with the “IT Security Made in Germany” seal of trust from TeleTrust eV. G DATA offers a portfolio from anti-virus and endpoint protection to penetration tests and incident response to forensic analyzes, security status checks and cyber awareness training to defend companies effectively. New technologies such as DeepRay use artificial intelligence to protect against malware. Service and support are part of the G DATA campus in Bochum. G DATA solutions are available in 90 countries and have received numerous awards.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

IT security: NIS-2 makes it a top priority

Only in a quarter of German companies do management take responsibility for IT security. Especially in smaller companies ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more