information security

Information security incidents preventing

Every company processes vast amounts of information every day. This can include personal data, as well as company assets. Regardless of the category the information falls under, it must be protected. To ensure this, not only system settings but also the handling of the information are crucial.

Training all employees within a company is therefore even more important. This is guaranteed by the eleven high-quality e-learning courses on information security from Fischer, Knoblauch & Co.

Effective with e-learning school and sensitize

With e-learning courses from Fischer, Knoblauch & Co., you can provide sustainable training for your employees. These courses motivate them to actively engage with the issue of information security and raise their awareness of its importance. The courses can be booked individually or as a package, offering you maximum flexibility and allowing you to tailor the training entirely to the needs of your company.

E-learning training not only offers high cost efficiency but also provides flexibility in terms of location and time.

This is what you can expect in our Information security modules

Learning modules

In eleven modules, employees learn how to handle information and are made aware of potential dangers and risks. Additional modules are available for working in the home office and mobile office. All modules consist of the Instruction and Test sections. The modules are micro-modules, with a completion time of between 10 and 20 minutes.

Instruction

With the help of audio animations, which can also be used to activate subtitles if required, employees become familiar with the relevant training content.

Test with certificate

The final test consists of tasks that assess the content of the training. If the test is passed, employees receive a certificate as proof of their training.

Topic content the learning modules

We provide you with the modules individually or as a package — according to your requirements.

rudiments

  • Difference between information security, IT security, and data protection
  • Assets that need to be protected
  • Security objectives of information security, security threats and their countermeasures

Information security incidents

  • Definition of information security incident
  • Causes of security incidents
  • Detecting security incidents
  • Acting correctly in case of security incidents
  • Protection against security incidents

Cyber risks

  • Definition of cybersecurity
  • Damages caused by cyber attacks
  • Malicious programs – viruses, trojans, worms, and ransomware
  • Social Engineering

Test Our modules!

We would be happy to activate a free demo account for you, allowing you to familiarise yourself with our services.
individual content and Corporate identity
We adapt the learning modules to the specific needs of your company – for example, by integrating your internal contact details, company documents, or workplace policies into the general content. On request, we can also incorporate your logo into the module interfaces.

You will receive a high-quality offer for fair prices.

Basis

SCORM-
modules

You will receive the learning modules as a SCORM version for integration into your own learning platform.

Your benefits

  • The SCORM version can be integrated into all common learning platforms, and learning progress data is transmitted to the platform.
  • The learning modules can be purchased individually or as a package.
Software as a Service

Access via our portal

With our portal, we offer you the perfect platform for your instruction. You buy a license and you can get started right away. Multiple licenses for companies are available on request.

Your benefits

  • Everything is already set up and ready for you.
  • Upon successful completion, you will receive a certificate.
  • The portal is hosted on a German server with current data protection standards.
  • The license period is 12 months.
  • Learning progress and certificate overview serve as documented proof of instruction.
On Premise

Modules + platform on your server

You buy the nectar learning platform, including the desired learning modules, and run the platform on your own server.

Your benefits

  • Everything is in your hands: hosting, user creation, data security.
  • You benefit from all nectar features (mail management, user management, learning progress and certificate overviews).
  • You will receive comprehensive training in the system.
  • The learning modules can be booked individually or as a package.

Customers who place their trust in us

Ascom
BFW Koblenz
Bora
Deutsche Bundesbank
Fincon
Gazprom
Gealan
Iscar
Kieback & Peter
NetCologne
Otto-Christ
Seven Principles
Sielaff
Sonepar
Thomas Sabo
Voxx
Windmöller & Hölscher
Ascom
BFW Koblenz
Bora
Deutsche Bundesbank
Fincon
Gazprom
Gealan
Iscar
Kieback & Peter
NetCologne
Otto-Christ
Seven Principles
Sielaff
Sonepar
Thomas Sabo
Voxx
Windmöller & Hölscher