Trainings
Interactive Training
AI, deepfake & cybersecurity training for executives and management
- Duration: 1 day (8 hours) or 2 half days (2×4 hours) incl. breaks
- Language: German (English available soon)
- Max. Number of participants: 15 persons
Training contents
- What is AI-generated content? – Text, images, audio, video
- How are deepfakes created? – Introduction to machine learning
- Recognition features of AI fakes and the limits of manual detection
- Distribution channels – social media and co.
- Live demo: creation of a deepfake
- Current cases from various industries and company sizes
- Attack vectors: Financial damage, reputational damage, industrial espionage
- Human attack vector: Social engineering – types of influence
- Exercise: What types of influence through social engineering am I myself susceptible to?
- Technical & organizational measures
- Employee sensitization and training
- Practical work: development of a catalog of measures
- Technical intervention: forensics & damage limitation
- Basics of internal and external crisis communication
- Legal responsibilities: Liability and compliance
- Practical work: creating a communication plan
Interactive Training
AI, deepfake & cybersecurity training with a special focus on social engineering for employees at all levels and departments
- Duration: 1 day (8 hours) or 2 half days (2×4 hours) incl. breaks
- Language: German (English available soon)
- Max. Number of participants: 15 persons
Training contents
- The human vulnerability
- Hierarchical attack vectors
- Realistic attack scenarios
- Practice: Reconstruction of a real attack
- What is AI-generated content? – Text, images, audio, video
- How are deepfakes created? – Introduction to machine learning
- Recognition features of AI fakes and the limits of manual detection
- Distribution channels – social media and co.
- Live demo: creation of a deepfake
- Basic psychological principles of manipulation: authority principle, reciprocity principle, consistency principle, sympathy & similarity, scarcity & urgency
- Practical manipulation techniques: communicative strategies, non-verbal manipulation signals
- Typical attack methods: phishing, baiting, tailgating
- Exercise: Social engineering simulations – recognizing manipulation patterns: “Which manipulation techniques am I susceptible to?”
- Immediate measures in the event of a detected attack
- Communication protocols
- Escalation paths in the company
- Exercise: Crisis response simulation
- Company guidelines
- Technical protection measures
- Code of conduct for digital communication
- Legal aspects
- Practice: Creation of personal security checklists