{"id":40139,"date":"2022-11-15T16:08:35","date_gmt":"2022-11-15T16:08:35","guid":{"rendered":"https:\/\/www.cyberguru.it\/cyber-guru-phishing-loesungen-fuer-das-sicherheitsbewusstsein\/"},"modified":"2025-06-10T13:06:03","modified_gmt":"2025-06-10T13:06:03","slug":"cyber-guru-phishing","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/","title":{"rendered":"Phishing Ausbildung"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_margin=&#8220;150px||||false|false&#8220; custom_padding=&#8220;|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter|700|||||||&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||||false|false&#8220; header_font_size_tablet=&#8220;60px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>Cyber Guru Phishing<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Schulungsplattform \/ <span style=\"color: #f18a00;\">Cyber Guru Phishing<\/span><\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DEMO ANFORDERN&#8220; button_alignment=&#8220;left&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.27.0&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;8px||8px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Rete_Neuronale-02-1.webp&#8220; custom_margin=&#8220;|||0px|false|false&#8220; custom_padding=&#8220;|||0px|false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;100%&#8220; custom_padding=&#8220;|10%|||false|false&#8220; custom_padding_tablet=&#8220;|5%||5%|false|true&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; custom_css_main_element=&#8220;align-self:center;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_video src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Cyber-Guru-Phishing-solution.mp4&#8243; image_src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2024\/09\/Cyber-Guru-Phishing.jpg&#8220; _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_video][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|||120px|true|false&#8220; custom_padding_tablet=&#8220;50px||50px|0px|true|false&#8220; custom_padding_phone=&#8220;20px|5px|20px|5px|true|true&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;align-self:center;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb title=&#8220;Cyber Guru Phishing&#8220; image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/Phishing-1.png&#8220; alt=&#8220;Cyber-Guru Phishing&#8220; icon_placement=&#8220;left&#8220; image_icon_width=&#8220;100%&#8220; content_max_width=&#8220;60px&#8220; image_last_edited=&#8220;off|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; header_level=&#8220;h2&#8243; header_font=&#8220;Inter|700|||||||&#8220; header_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=&#8220;48px&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_margin_tablet=&#8220;||0px||false|false&#8220; custom_margin_phone=&#8220;25px||0px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_font_size_tablet=&#8220;48px&#8220; header_font_size_phone=&#8220;36px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; custom_css_blurb_image=&#8220;width:15%;||&#8220; custom_css_blurb_title=&#8220;width:110%;&#8220; custom_css_blurb_content=&#8220;max-width: none !important;||&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22%93}&#8220;][\/et_pb_blurb][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;20px||50px||false|false&#8220; custom_margin_tablet=&#8220;-50px||50px||false|false&#8220; custom_margin_phone=&#8220;20px||0px||false|false&#8220; custom_margin_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8220;]<\/p>\n<p>Cyber Guru Phishing ist das Plattformprogramm f\u00fcr erfahrungsbasierte Anti-Phishing-Schulungen. <span><strong>Dank des einzigartigen und innovativen Modells des maschinellen Lernens <\/strong>, das speziell f\u00fcr die Schulung und Ausbildung entwickelt wurde, ist Cyber Guru Phishing in der Lage, einen ma\u00dfgeschneiderten und vor allem anpassungsf\u00e4higen Ansatz zu bieten, der die Schulung viel effektiver und f\u00fcr den Umgang mit neuen Cyberangriffstechniken geeignet macht.<\/span><\/p>\n<p>Gerade aufgrund seiner Trainingstechniken, der speziellen Trainingsmethodik und des Erfahrungslernens maximiert Cyber Guru Phishing die Trainingseffektivit\u00e4t in drei spezifischen Bereichen: Gefahrenwahrnehmung, Bereitschaft zum richtigen Handeln und Bedrohungsbewusstsein.<\/p>\n<p>Dar\u00fcber hinaus macht das einzigartige Machine Learning Modell das Trainingsprogramm v\u00f6llig autonom bei der Realisierung von ma\u00dfgeschneiderten Trainingsprogrammen und der Planung von Simulationskampagnen, wodurch die Verwaltungskosten auf Null reduziert werden.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#f8f8f8&#8243; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/11\/Phishing-1.webp&#8220; custom_padding=&#8220;||||false|false&#8220; custom_padding_tablet=&#8220;||||false|false&#8220; custom_padding_phone=&#8220;30px||||false|false&#8220; background_last_edited=&#8220;on|phone&#8220; background_position_tablet=&#8220;center_left&#8220; background_position_phone=&#8220;center_left&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;100%&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;0px|5%|0px|5%|true|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|120px|||true|false&#8220; custom_padding_tablet=&#8220;|120px|||true|false&#8220; custom_padding_phone=&#8220;|0px|||true|false&#8220; custom_padding_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;align-self:center;&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;16px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;35px&#8220; header_2_line_height=&#8220;40px&#8220; width=&#8220;600px&#8220; module_alignment=&#8220;left&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Anti Phishing Training mit einem pers\u00f6nlichen Trainer<\/h2>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;16px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8220;]<\/p>\n<p>Um sich vor dem Phishing-Ph\u00e4nomen zu sch\u00fctzen, muss jedes Unternehmen zwangsl\u00e4ufig in den menschlichen Faktor investieren und die F\u00e4higkeit jedes Benutzers trainieren, einen Phishing- oder Smishing-Angriff zu erkennen.<\/p>\n<p>Um ein H\u00f6chstma\u00df an Widerstandsf\u00e4higkeit zu entwickeln, ist es jedoch notwendig, das Training auf die spezifischen Eigenschaften jedes Einzelnen und seine pers\u00f6nlichen F\u00e4higkeiten zur Abwehr von Cyberangriffen abzustimmen.<\/p>\n<p>Die Cyber Guru Phishing-Simulationskampagnen werden daher dank eines auf k\u00fcnstlicher Intelligenz basierenden pers\u00f6nlichen Trainers auf die Verhaltensmerkmale jedes einzelnen Benutzers zugeschnitten.<br \/>\nDer Benutzer wird simulierten Angriffen ausgesetzt, die immer komplexer und schwieriger werden, mit unterschiedlicher H\u00e4ufigkeit, aber auf einer kontinuierlichen Basis. <\/p>\n<p>Um die Effektivit\u00e4t des Trainings zu maximieren, reproduzieren adaptive und automatische Trainingspfade, die vom pers\u00f6nlichen Trainer auf der Grundlage der vom einzelnen Benutzer erzielten Ergebnisse festgelegt werden, die realen Erfahrungen, indem sie die verschiedenen Angriffsstrategien von Cyberkriminellen simulieren.  <\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; background_enable_image=&#8220;off&#8220; custom_css_main_element=&#8220;align-self:center&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_stops=&#8220;#010512 0%|#071036 99%&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_padding=&#8220;|10%||10%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_number_counter number=&#8220;+ 5.4M&#8220; percent_sign=&#8220;off&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; number_font=&#8220;Rubik||||||||&#8220; number_text_color=&#8220;RGBA(255,255,255,0)&#8220; number_font_size=&#8220;80px&#8220; custom_css_main_element=&#8220;-webkit-text-stroke: 1px #fff;||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_number_counter][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;20px&#8220; text_orientation=&#8220;center&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;65px||||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Durchgef\u00fchrte Simulationen<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_number_counter number=&#8220;+ 1.1M&#8220; percent_sign=&#8220;off&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; number_font=&#8220;Rubik||||||||&#8220; number_text_color=&#8220;RGBA(255,255,255,0)&#8220; number_font_size=&#8220;80px&#8220; custom_css_main_element=&#8220;-webkit-text-stroke: 1px #fff;||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_number_counter][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;20px&#8220; text_orientation=&#8220;center&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;65px||||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Aktive Kunden<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_number_counter number=&#8220;+ 750&#8243; percent_sign=&#8220;off&#8220; _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; number_font=&#8220;Rubik||||||||&#8220; number_text_color=&#8220;RGBA(255,255,255,0)&#8220; number_font_size=&#8220;80px&#8220; custom_css_main_element=&#8220;-webkit-text-stroke: 1px #fff;||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_number_counter][et_pb_text _builder_version=&#8220;4.24.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;20px&#8220; text_orientation=&#8220;center&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;65px||||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Organisationen<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; disabled_on=&#8220;off|on|off&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.19.1&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;16px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Merkmale von Cyber Guru Phishing<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; custom_padding=&#8220;20px|20px|20px|20px|true|true&#8220; border_radii=&#8220;on|15px|15px|15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/workshop.webp&#8220; alt=&#8220;Workshop&#8220; title_text=&#8220;Workshop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;30%&#8220; width_tablet=&#8220;30%&#8220; width_phone=&#8220;30%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;display:inline-block;&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Rubik|700|||||||&#8220; header_2_text_align=&#8220;left&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;25px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||10px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;30px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">ERFAHRUNGSBASIERTE SCHULUNG<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_font_size=&#8220;15px&#8220; custom_padding=&#8220;||30px||false|false&#8220; custom_padding_last_edited=&#8220;off|desktop&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li>KONTINUIERLICHE WEITERBILDUNG<\/li>\n<li>SOFORTIGES FEHLERTRAINING<\/li>\n<li>ADAPTIVE ABHILFEMASSNAHMEN<\/li>\n<li>MELDEVERFAHREN<\/li>\n<li>MEHRSPRACHIGES FORMAT<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; custom_padding=&#8220;20px|20px|20px|20px|true|true&#8220; border_radii=&#8220;on|15px|15px|15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/trophy.webp&#8220; alt=&#8220;Troph\u00e4e&#8220; title_text=&#8220;Troph\u00e4e&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;30%&#8220; width_tablet=&#8220;30%&#8220; width_phone=&#8220;30%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;display:inline-block;&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Rubik|700|||||||&#8220; header_2_text_align=&#8220;left&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;25px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||10px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;30px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">MASSGESCHNEIDERTE SCHULUNG<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_font_size=&#8220;15px&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li><span style=\"font-size: 15px;\">MASSGESCHNEIDERTE SIMULATIONEN<\/span><\/li>\n<li>RISIKOGRUPPEN<\/li>\n<li>SCHWIERIGKEITSGRADE<\/li>\n<li>LOKALISIERTE VORLAGEN<\/li>\n<li>SIMULATIONEN MIT DEEPFAKE, USB UND QRCODE<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; custom_padding=&#8220;20px|20px|20px|20px|true|true&#8220; border_radii=&#8220;on|15px|15px|15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/supervisione-impatto.webp&#8220; alt=&#8220;\u00dcberwachung der Auswirkungen&#8220; title_text=&#8220;\u00dcberwachung der Auswirkungen&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;30%&#8220; width_tablet=&#8220;30%&#8220; width_phone=&#8220;30%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_css_main_element=&#8220;display:inline-block;&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Rubik|700|||||||&#8220; header_2_text_align=&#8220;left&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;25px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||10px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">\u00dcBERWACHUNG OHNE BEEINTR\u00c4CHTIGUNG<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_font_size=&#8220;15px&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<ul>\n<li>PLATFORM IN SaaS<\/li>\n<li>SCHL\u00dcSSELFERTIGER SERVICE<\/li>\n<li>AUTOMATISIERTE KAMPAGNEN<\/li>\n<li>VORINSTALLIERTE VORLAGEN<\/li>\n<li>ERSCH\u00d6PFENDE BERICHTERSTATTUNG<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; make_equal=&#8220;on&#8220; use_custom_gutter=&#8220;on&#8220; specialty=&#8220;on&#8220; padding_top_bottom_link_1=&#8220;false&#8220; padding_top_bottom_link_2=&#8220;false&#8220; padding_left_right_link_1=&#8220;false&#8220; padding_left_right_link_2=&#8220;false&#8220; custom_css_main_2=&#8220;margin:auto;&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#f8f8f8&#8243; background_enable_image=&#8220;off&#8220; inner_width=&#8220;100%&#8220; inner_max_width=&#8220;2580px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; specialty_columns=&#8220;2&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_row_inner custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;||30px||false|false&#8220; custom_padding_tablet=&#8220;|5%|30px|5%|false|true&#8220; custom_padding_phone=&#8220;|10%|0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column_inner saved_specialty_column_type=&#8220;1_2&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||0%|false|false&#8220; custom_padding_phone=&#8220;|||0%|false|false&#8220; custom_padding_last_edited=&#8220;on|tablet&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; width=&#8220;100%&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: left;\">Cyber Guru Phishing: Anpassungsf\u00e4higes Training<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;18px||||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8220;]<\/p>\n<p style=\"text-align: left;\">Die Simulationen werden automatisch auf der Grundlage des Verhaltensprofils eines jeden Benutzers und seiner F\u00e4higkeit, Angriffen zu widerstehen, spezialisiert.<\/p>\n<p style=\"text-align: left;\">Jedes Mal, wenn der Benutzer Opfer eines simulierten Angriffs wird, wird er einer leichten Trainingsintervention ausgesetzt, die ihm hilft, seinen Fehler f\u00f6rmlich zu verstehen und das negative Gef\u00fchl reifen zu lassen, dass er einen Fehler gemacht hat, den er h\u00e4tte vermeiden k\u00f6nnen.<\/p>\n<p style=\"text-align: left;\">Der adaptive Prozess wirkt auf verschiedenen Ebenen, die die automatische Auswahl der Angriffsvorlagen f\u00fcr jede Kampagne und ihre Verteilung auf das Ziel bestimmen.<br \/>\nDiese Auswahl basiert im Wesentlichen auf bestimmten Makro-Variablen: <\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;18px||||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8220;]<\/p>\n<ul>\n<li style=\"text-align: left;\"><strong>das Benutzerprofil<\/strong>: Auf der Grundlage des spezifischen Grades der Widerstandsf\u00e4higkeit gegen Angriffe wird f\u00fcr jeden Benutzer der zu verwendende Schwierigkeitsgrad gew\u00e4hlt und die Periodizit\u00e4t des n\u00e4chsten Angriffs bestimmt.<\/li>\n<li style=\"text-align: left;\">die <strong>Einstufung der Vorlagen<\/strong>: Der Schwierigkeitsgrad des Angriffs wird nicht nur durch die Berechnung statischer, sondern auch dynamischer Parameter ermittelt, wie z.B. die Beobachtung der Klickrate, die eine Vorlage in der jeweiligen Realit\u00e4t erzielt hat.<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; module_alignment=&#8220;center&#8220; min_height=&#8220;99.9px&#8220; custom_margin=&#8220;-20px||16px||false|false&#8220; custom_padding=&#8220;0px|||||&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8220;]<\/p>\n<p>Um Benutzer in verschiedenen Angriffstechniken zu schulen, kann das <span style=\"color: #ff9900;\"><strong>PhishPro-Add-on<\/strong><\/span> Angriffssimulationen auf drei zus\u00e4tzliche digitale Komponenten ausweiten: Video\/Deepfake, USB-Sticks und QR-Codes. Es bietet auch die Funktion Adaptive Learning Remediation.<\/p>\n<p>[\/et_pb_text][\/et_pb_column_inner][\/et_pb_row_inner][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/mail5.png&#8220; alt=&#8220;Lehrgang&#8220; title_text=&#8220;mail5&#8243; align=&#8220;right&#8220; align_tablet=&#8220;center&#8220; align_phone=&#8220;center&#8220; align_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_margin=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp&#8220; custom_margin=&#8220;-48px|||||&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;16px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">Machen Sie aus Ihrer Phishing-Erfahrung ein effektives Training<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8220;]<\/p>\n<p style=\"text-align: center;\">Jede Kampagne unterscheidet sich in ihrer Zusammensetzung von der vorherigen und der n\u00e4chsten, ohne dass ein menschliches Eingreifen erforderlich ist.<br \/>\nDie von der Plattform verwendeten Lernalgorithmen werden in der Lage sein, Angriffsvorlagen nach dem Kriterium der maximalen Trainingseffektivit\u00e4t auszuw\u00e4hlen. <\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; make_equal=&#8220;on&#8220; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb title=&#8220;PHISHING-ANGRIFF&#8220; image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/37-2.webp&#8220; alt=&#8220;37 (2)&#8220; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Rubik|700|||||||&#8220; header_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=&#8220;18px&#8220; body_font=&#8220;Rubik|700|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; width=&#8220;90%&#8220; custom_margin=&#8220;||10px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; custom_css_blurb_image=&#8220;width:30%&#8220; custom_css_blurb_title=&#8220;padding-top:40px;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22%93}&#8220;][\/et_pb_blurb][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;25px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;15px||||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22%93}&#8220;]<\/p>\n<p>Die simulierten Angriffe sind in Kampagnen strukturiert, die das Ergebnis eines adaptiven Prozesses sind, der automatisch die Auswahl der idealen Angriffsvorlagen im Hinblick auf den Evolutionsgrad des Trainingspfads bestimmt.  <\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/phishing1.png&#8220; alt=&#8220;Gamification und Preise&#8220; title_text=&#8220;Phishing1&#8243; align=&#8220;center&#8220; _builder_version=&#8220;4.24.3&#8243; _module_preset=&#8220;default&#8220; width=&#8220;85%&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220; transform_scale__hover=&#8220;200%|200%&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb title=&#8220;MICRO TRAINING  &#8220; image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/computer.webp&#8220; alt=&#8220;Computer&#8220; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Rubik|700|||||||&#8220; header_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=&#8220;18px&#8220; body_font=&#8220;Rubik|700|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; width=&#8220;90%&#8220; custom_margin=&#8220;||10px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; custom_css_blurb_image=&#8220;width:30%&#8220; custom_css_blurb_title=&#8220;padding-top:40px;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22,%22header_text_color%22,%22header_text_color%22%93}&#8220;][\/et_pb_blurb][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;25px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;15px||||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p>Wenn der Benutzer bei einer Simulation scheitert und somit die betr\u00fcgerische Aktion in der Vorlage ausf\u00fchrt, erh\u00e4lt er sofort ma\u00dfgeschneiderte Trainingsinhalte zur Besonderheit der T\u00e4uschung in der Angriffsvorlage.<span style=\"color: #e02b20;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/phishing3.png&#8220; alt=&#8220;Gamification und Preise&#8220; title_text=&#8220;Phishing3&#8243; align=&#8220;center&#8220; _builder_version=&#8220;4.24.3&#8243; _module_preset=&#8220;default&#8220; width=&#8220;85%&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220; transform_scale__hover=&#8220;200%|200%&#8220;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb title=&#8220;ERWEITERTE BERICHTERSTATTUNG&#8220; image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/37-1.webp&#8220; alt=&#8220;37 (1)&#8220; icon_placement=&#8220;left&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Rubik|700|||||||&#8220; header_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_font_size=&#8220;18px&#8220; body_font=&#8220;Rubik|700|||||||&#8220; body_text_color=&#8220;#000000&#8243; body_font_size=&#8220;18px&#8220; width=&#8220;90%&#8220; custom_margin=&#8220;||10px||false|false&#8220; custom_padding=&#8220;||||false|false&#8220; custom_css_blurb_image=&#8220;width:30%&#8220; custom_css_blurb_title=&#8220;padding-top:40px;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22header_text_color%22,%22header_text_color%22,%22header_text_color%22%93}&#8220;][\/et_pb_blurb][et_pb_text _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;16px&#8220; text_line_height=&#8220;25px&#8220; custom_margin=&#8220;||||false|false&#8220; custom_padding=&#8220;15px||||false|false&#8220; custom_css_main_element=&#8220;font-weight:400;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22text_text_color%22%93}&#8220;]<\/p>\n<p>Die Berichterstattung, die in einem Dashboard verf\u00fcgbar ist, geht weit \u00fcber die einfache Ermittlung der durchschnittlichen Klickrate hinaus und bietet dank fortschrittlicher Metriken die M\u00f6glichkeit, das Risiko zu bewerten und seine konkrete Reduzierung im Verlauf des Programms zu verfolgen.<span style=\"color: #e02b20;\"><\/span><\/p>\n<p>[\/et_pb_text][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/01\/Report-phishing.png&#8220; alt=&#8220;Gamification und Preise&#8220; title_text=&#8220;Phishing-Bericht&#8220; align=&#8220;center&#8220; _builder_version=&#8220;4.24.3&#8243; _module_preset=&#8220;default&#8220; width=&#8220;85%&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; transform_styles__hover_enabled=&#8220;on|hover&#8220; transform_scale__hover_enabled=&#8220;on|hover&#8220; transform_translate__hover_enabled=&#8220;on|desktop&#8220; transform_rotate__hover_enabled=&#8220;on|desktop&#8220; transform_skew__hover_enabled=&#8220;on|desktop&#8220; transform_origin__hover_enabled=&#8220;on|desktop&#8220; transform_scale__hover=&#8220;200%|200%&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.0&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-02-2.webp&#8220; background_position=&#8220;bottom_center&#8220; custom_padding=&#8220;50px||50px||true|false&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8220; alt=&#8220;Mehr&#8220; title_text=&#8220;Mehr&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-200px&#8220; horizontal_offset=&#8220;85px&#8220; vertical_offset_tablet=&#8220;-55px&#8220; vertical_offset_phone=&#8220;-90px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-55px&#8220; horizontal_offset_phone=&#8220;-50px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; position_origin_a_tablet=&#8220;top_left&#8220; position_origin_a_phone=&#8220;top_left&#8220; position_origin_a_last_edited=&#8220;on|phone&#8220; position_origin_f_tablet=&#8220;&#8220; position_origin_f_phone=&#8220;&#8220; position_origin_f_last_edited=&#8220;on|phone&#8220; position_origin_r_tablet=&#8220;&#8220; position_origin_r_phone=&#8220;&#8220; position_origin_r_last_edited=&#8220;on|phone&#8220; width=&#8220;100%&#8220; custom_margin=&#8220;||||false|false&#8220; positioning_tablet=&#8220;absolute&#8220; positioning_phone=&#8220;absolute&#8220; positioning_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; admin_label=&#8220;Linie&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;70px|170px|0px|170px|false|true&#8220; custom_padding_tablet=&#8220;|100px||100px|false|true&#8220; custom_padding_phone=&#8220;70px|5px|0px|5px|false|true&#8220; border_radii=&#8220;off|10px|10px||&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.18.1&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00f6chten Sie mehr Details erfahren?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_2,1_2&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.18.1&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_tablet=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_phone=&#8220;0px|0px|70px|0px|false|true&#8220; border_radii=&#8220;off|||15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_vertical=&#8220;20px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;https:\/\/www.cyberguru.it\/en\/ds-en-phishing-2\/&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DATENBLATT&#8220; button_alignment=&#8220;right&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;12px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik||||||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px|40px|12px|40px|true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8220; button_text=&#8220;DEMO ANFORDERN&#8220; button_alignment=&#8220;left&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;12px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik||||||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px|40px|12px|40px|true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8220; alt=&#8220;Sie m\u00f6chten wissen&#8220; title_text=&#8220;Sie m\u00f6chten wissen&#8220; align=&#8220;right&#8220; disabled_on=&#8220;on|off|off&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-20px&#8220; horizontal_offset=&#8220;-100px&#8220; vertical_offset_tablet=&#8220;-20px&#8220; vertical_offset_phone=&#8220;-80px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-100px&#8220; horizontal_offset_phone=&#8220;-130px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; width=&#8220;25%&#8220; width_tablet=&#8220;25%&#8220; width_phone=&#8220;25%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_margin=&#8220;||||false|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Guru PhishingSchulungsplattform \/ Cyber Guru PhishingCyber Guru Phishing ist das Plattformprogramm f\u00fcr erfahrungsbasierte Anti-Phishing-Schulungen. Dank des einzigartigen und innovativen Modells des maschinellen Lernens , das speziell f\u00fcr die Schulung und Ausbildung entwickelt wurde, ist Cyber Guru Phishing in der Lage, einen ma\u00dfgeschneiderten und vor allem anpassungsf\u00e4higen Ansatz zu bieten, der die Schulung viel effektiver [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-40139","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Phishing Ausbildung<\/title>\n<meta name=\"description\" content=\"Cyber Guru Phishing ist eine innovative L\u00f6sung f\u00fcr Unternehmen, die die Reaktionsf\u00e4higkeit ihrer Mitarbeiter schulen wollen.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Ausbildung\" \/>\n<meta property=\"og:description\" content=\"Cyber Guru Phishing ist eine innovative L\u00f6sung f\u00fcr Unternehmen, die die Reaktionsf\u00e4higkeit ihrer Mitarbeiter schulen wollen.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-10T13:06:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"6\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/cyber-guru-phishing\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/cyber-guru-phishing\\\/\",\"name\":\"Phishing Ausbildung\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\"},\"datePublished\":\"2022-11-15T16:08:35+00:00\",\"dateModified\":\"2025-06-10T13:06:03+00:00\",\"description\":\"Cyber Guru Phishing ist eine innovative L\u00f6sung f\u00fcr Unternehmen, die die Reaktionsf\u00e4higkeit ihrer Mitarbeiter schulen wollen.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/cyber-guru-phishing\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/cyber-guru-phishing\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/cyber-guru-phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/homepage-v2-entwurf\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Ausbildung\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing Ausbildung","description":"Cyber Guru Phishing ist eine innovative L\u00f6sung f\u00fcr Unternehmen, die die Reaktionsf\u00e4higkeit ihrer Mitarbeiter schulen wollen.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/","og_locale":"de_DE","og_type":"article","og_title":"Phishing Ausbildung","og_description":"Cyber Guru Phishing ist eine innovative L\u00f6sung f\u00fcr Unternehmen, die die Reaktionsf\u00e4higkeit ihrer Mitarbeiter schulen wollen.","og_url":"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2025-06-10T13:06:03+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"6\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/","url":"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/","name":"Phishing Ausbildung","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/de\/#website"},"datePublished":"2022-11-15T16:08:35+00:00","dateModified":"2025-06-10T13:06:03+00:00","description":"Cyber Guru Phishing ist eine innovative L\u00f6sung f\u00fcr Unternehmen, die die Reaktionsf\u00e4higkeit ihrer Mitarbeiter schulen wollen.","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/de\/cyber-guru-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/de\/homepage-v2-entwurf\/"},{"@type":"ListItem","position":2,"name":"Phishing Ausbildung"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/de\/#website","url":"https:\/\/www.cyberguru.it\/de\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/comments?post=40139"}],"version-history":[{"count":16,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40139\/revisions"}],"predecessor-version":[{"id":45712,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40139\/revisions\/45712"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/media?parent=40139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}