Objective
The aim is to playfully show in an escape game where weak points in IT security can be found in many organizations and workplaces, and to teach participants what to look out for. Here, the participants play the role of the attacker!
Comment
Type: E-learning, SCORM format; Duration: 90 minutes; Available languages: German (English courses are being prepared); Please note that the e-learning content provided may only be used for internal purposes, i.e. it may not be passed on to other business partners, customers, suppliers, etc. The purchase of the e-learning content does not constitute a transfer of intellectual property. In particular, the format provided may not be modified or used for commercial purposes without the explicit consent of Bechtle. The right of use for the e-learning format offered is limited to up to 500 users. Prices for the right of use for more than 500 users are available on request.
Target group
Agile teams, Field sales representatives, Vocational trainees, Basic users, Database administrators, Advanced users, Managers, Graphic designers, Maintenance/mechatronics/machine operators, Internet/data protection/security officers, Controlling employees, Marketing employees, HR employees, Network administrators, Office users, PC user service, Software developers, Project managers, Career jumpers, Service technicians, Security experts, Support technicians, Drafters, Web designers