Interactive Training

AI, deepfake & cybersecurity training for executives and management

  • Duration: 1 day (8 hours) or 2 half days (2×4 hours) incl. breaks
  • Language: German (English available soon)
  • Max. Number of participants: 15 persons

Training contents

  • What is AI-generated content? – Text, images, audio, video
  • How are deepfakes created? – Introduction to machine learning
  • Recognition features of AI fakes and the limits of manual detection
  • Distribution channels – social media and co.
  • Live demo: creation of a deepfake
  • Current cases from various industries and company sizes
  • Attack vectors: Financial damage, reputational damage, industrial espionage
  • Human attack vector: Social engineering – types of influence
  • Exercise: What types of influence through social engineering am I myself susceptible to?
  • Technical & organizational measures
  • Employee sensitization and training
  • Practical work: development of a catalog of measures
  • Technical intervention: forensics & damage limitation
  • Basics of internal and external crisis communication
  • Legal responsibilities: Liability and compliance
  • Practical work: creating a communication plan
Interactive Training

AI, deepfake & cybersecurity training with a special focus on social engineering for employees at all levels and departments

  • Duration: 1 day (8 hours) or 2 half days (2×4 hours) incl. breaks
  • Language: German (English available soon)
  • Max. Number of participants: 15 persons

Training contents

  • The human vulnerability
  • Hierarchical attack vectors
  • Realistic attack scenarios
  • Practice: Reconstruction of a real attack
  • What is AI-generated content? – Text, images, audio, video
  • How are deepfakes created? – Introduction to machine learning
  • Recognition features of AI fakes and the limits of manual detection
  • Distribution channels – social media and co.
  • Live demo: creation of a deepfake
  • Basic psychological principles of manipulation: authority principle, reciprocity principle, consistency principle, sympathy & similarity, scarcity & urgency
  • Practical manipulation techniques: communicative strategies, non-verbal manipulation signals
  • Typical attack methods: phishing, baiting, tailgating
  • Exercise: Social engineering simulations – recognizing manipulation patterns: “Which manipulation techniques am I susceptible to?”
  • Immediate measures in the event of a detected attack
  • Communication protocols
  • Escalation paths in the company
  • Exercise: Crisis response simulation
  • Company guidelines
  • Technical protection measures
  • Code of conduct for digital communication
  • Legal aspects
  • Practice: Creation of personal security checklists
Request a consulting or training
Please enable JavaScript in your browser to complete this form.
Name
Business Email
For which topic would you like to request information for?
Share the Post:

Related Posts

EN