• Duration

    1 hour

  • Learners

    95+

  • Video

    1 hour

    CyberSecurity Awareness - 1h Basic Compliance Training (EN)

    Our compact training for everyday digital life.

    Today, cyberattacks are among the greatest risks facing companies and employees alike. Whether it's phishing, social engineering, or malware – many attacks specifically target the 'human factor.' This is precisely where this compact cybersecurity training comes in.

    What you will learn

    In just one hour, you will learn the fundamentals of IT security and develop a heightened awareness of digital threats. This practical course demonstrates how cyberattacks work, how to recognize them, and how to effectively protect yourself in your daily work routine.

    Securing the digital workplace: Strategies for the office and home office.
    Best Practices: From secure passwords and safe data handling to typical risk scenarios.
    Immediate Action: Concrete and easy-to-implement tips with an instant impact.

    A special focus is placed on realistic attack scenarios. You will learn to identify phishing emails, see through manipulation attempts, and close common security gaps. In doing so, you strengthen not only your own security but that of the entire company.

    Proper response in an emergency

    In an emergency, every minute counts. That is why this course also teaches a clear "chain of response":

    Which steps are vital during an attack?
    How do you react exactly right?
    How can damage be minimized through targeted measures such as backups and emergency plans?
    Write your awesome label here.
    course contents

    What's included?

    Practical training with handout

    Every Cybershield module ends with a concrete action protocol—not just theory. The accompanying Quick-Reference Handout summarizes all critical measures on two print-ready pages, serving as a daily practical guide at your desk long after the training is over.

    Current Threat Scenarios

    Cybershield works exclusively with real-world incidents and current attack data—no abstract scenarios, but cases that actually caused damage in 2024 and 2025. The threat landscape is evolving rapidly; Cybershield reflects this current state.

    Certificate of Participation

    Upon successful completion of all ten modules, participants receive a certificate that documents the training and serves as evidence for regulatory authorities and internal compliance audits. Especially under DORA and NIS-2, documented training is not just a "nice-to-have"—it is a regulatory requirement.
    • Supports compliance with NIS-2 Art. 21 (annual training obligation) and DORA Art. 13.
    • Archivable – for audit-proof documentation within the framework of internal governance.
    Empty space, drag to resize
    Meet the instructor

    Marco Rüffer

    Marco is a project manager in large-scale IT projects with a focus on finance and telecommunications. As a graduate in business informatics, he combines technical expertise with business thinking - and brings exactly this combination to his courses.
    His training sessions have been developed with a lot of energy and are designed for all employees - regardless of prior knowledge or position. Marco places particular emphasis on practical relevance: rather than dry theory, he delivers content that can be applied directly in everyday work life.
    Created with