{"componentChunkName":"component---src-views-template-template-tsx","path":"/de/vorlage/cybersicherheitssimulation/","result":{"pageContext":{"node":{"data":{"content":{"title":"Cybersicherheitssimulation","bundle":"template","displayTitle":"Cybersicherheitssimulation","description":{"value":"Eine kostenlose Vorlage zur Simulation von Cybersicherheitsszenarien, Schulung im Datenschutz und Vorbereitung auf Cyberangriffe. Ideal für Berichte über Informationssicherheit und ethisches Hacking. Anpassbar und perfekt für das Online-Sicherheitstraining."},"idView":"682dd49c521704c64b528be5","IdGenially":"681b49299b5a06000704bbd3","price":"free","breadcrumb":[{"url":"/templates/nueva-cat/","title":"nueva cat"},{"url":"/de/vorlagen/spiele/elearning-schulung/","title":"eLearning-Spiele"},{"title":"Cybersicherheitssimulation"}],"categories":[{"title":"nueva cat","path":"/templates/nueva-cat"},{"title":"eLearning-Spiele","path":"/de/vorlagen/spiele/elearning-schulung"},{"title":"eLearning","path":"/de/vorlagen/elearning-schulung"},{"title":"Lernende","path":"/de/vorlagen/lernende"},{"title":"Hochschulbildung","path":"/de/vorlagen/hochschulbildung"},{"title":"Marketing","path":"/de/vorlagen/marketing"},{"title":"Unternehmen","path":"/de/vorlagen/unternehmen"}],"metas":[{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"de","href":"https://genially.com/de/vorlage/cybersicherheitssimulation/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"en","href":"https://genially.com/template/cybersecurity-simulation/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"es","href":"https://genially.com/es/plantilla/simulacion-de-ciberseguridad/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"fr","href":"https://genially.com/fr/modele/simulation-de-cybersecurite/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"it","href":"https://genially.com/it/template/simulazione-di-cybersecurity/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"pt-br","href":"https://genially.com/pt-br/modelo/simulaao-de-cibersegurana"}},{"type":"MetaValue","property":"title","content":"Cybersicherheitssimulation"},{"type":"MetaValue","property":"description","content":"Eine kostenlose Vorlage zur Simulation von Cybersicherheitsszenarien, Schulung im Datenschutz und Vorbereitung auf Cyberangriffe. Ideal für Berichte über Informationssicherheit und ethisches Hacking. Anpassbar und perfekt für das Online-Sicherheitstraining."},{"type":"MetaLink","property":"canonical","content":"https://genially.com/de/vorlage/cybersicherheitssimulation/"},{"type":"MetaValue","property":"robots","content":"index, follow"},{"type":"MetaProperty","property":"og:site_name","content":"Genially"},{"type":"MetaProperty","property":"og:type","content":"website"},{"type":"MetaProperty","property":"og:url","content":"https://genially.com/de/vorlage/cybersicherheitssimulation/"},{"type":"MetaProperty","property":"og:title","content":"Cybersicherheitssimulation"},{"type":"MetaProperty","property":"og:description","content":"Eine kostenlose Vorlage zur Simulation von Cybersicherheitsszenarien, Schulung im Datenschutz und Vorbereitung auf Cyberangriffe. Ideal für Berichte über Informationssicherheit und ethisches Hacking. Anpassbar und perfekt für das Online-Sicherheitstraining."},{"type":"MetaProperty","property":"og:image","content":"https://images.genially.com/genial.ly/genially/templates/2a1bcf98-9232-4748-b5b8-e275eea9452b.png"},{"type":"MetaProperty","property":"og:email","content":"support@genially.com"},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"x-default","href":"https://genially.com/de/vorlage/cybersicherheitssimulation/"}},{"type":"MetaLink","property":"og:url","content":"https://genially.com/de/vorlage/cybersicherheitssimulation/"},{"type":"MetaValue","property":"og:title"},{"type":"MetaValue","property":"og:description","content":"Eine kostenlose Vorlage zur Simulation von Cybersicherheitsszenarien, Schulung im Datenschutz und Vorbereitung auf Cyberangriffe. Ideal für Berichte über Informationssicherheit und ethisches Hacking. Anpassbar und perfekt für das Online-Sicherheitstraining."}],"metasSchema":{"@context":"https://schema.org","@graph":[{"@type":"Corporation","@id":"https://genially.com/#organization","legalName":"Genially Web S.L.","description":"Genially is a powerful no-code authoring tool that enables anyone to create dynamic, interactive learning experiences. While it began as a platform for interactive presentations and infographics, Genially has evolved into a leading solution for building engaging content in education, eLearning, and corporate training. Educators, instructional designers, and trainers use Genially to design everything from interactive lessons and gamified activities to onboarding modules, microlearning courses, and assessments. Its intuitive interface, built-in animations, and advanced gamification features make it easy to create content that’s not only visually striking, but also pedagogically effective and learner-centered.","name":"Genially","sameAs":"\"https://www.facebook.com/Genially/\", \"https://twitter.com/genially_en/\", \"https://www.instagram.com/genially_official/\", \"https://www.youtube.com/channel/UCtq6w3zpUc5tQYEC6Q8pImg\", \"https://www.linkedin.com/company/geniallyofficial/\", \"https://www.pinterest.com/geniallyofficial/\", \"https://es.wikipedia.org/wiki/Genially\", \"https://www.crunchbase.com/organization/genially\", \"https://www.g2.com/products/genially/\", \"https://www.getapp.com/collaboration-software/a/genially/\",\r\n\"https://www.capterra.com/p/146861/Genially/\",\r\n\"https://www.producthunt.com/products/genially\",\r\n\"https://www.tiktok.com/@genially_official\"","url":"https://genially.com/","logo":{"@type":"ImageObject","url":"https://assets.genially.com/s3fs-public/images/genially.png"}},{"@type":"WebPage","name":"Cybersicherheitssimulation","@id":"https://genially.com/de/vorlage/cybersicherheitssimulation/","description":"Eine kostenlose Vorlage zur Simulation von Cybersicherheitsszenarien, Schulung im Datenschutz und Vorbereitung auf Cyberangriffe. Ideal für Berichte über Informationssicherheit und ethisches Hacking. Anpassbar und perfekt für das Online-Sicherheitstraining.","datePublished":"2025-11-11T09:55:20.881Z","dateModified":"2025-11-11T09:55:20.881Z","author":{"@type":"Organization","@id":"https://genially.com/#organization","name":"Genially","url":"https://genially.com/","logo":{"@type":"ImageObject","url":"https://assets.genially.com/s3fs-public/images/genially.png"}},"hasPart":{"@type":"WebPageElement","isAccessibleForFree":"True","name":"Genially","url":"https://genially.com/"},"isAccessibleForFree":"True","inLanguage":"de"},{"@type":"WebSite","@id":"https://genially.com/#website","name":"Genially","url":"https://genially.com/","inLanguage":"en,es,fr,pt-br,it,de"}]},"relatedTemplates":[{"title":"Unternehmensentscheidungen-Challenge","thumbnail":"https://images.genially.com/genial.ly/genially/templates/7e1ee77c-57ff-4720-8393-53366729a0cb.jpeg","price":"free","url":{"path":"/de/vorlage/unternehmensentscheidungen-challenge/"}},{"title":"Icebreaker Mobile: Startup Edition","thumbnail":"https://images.genially.com/genial.ly/genially/templates/6b60949f-6bcb-4306-a847-19cf00c8ec69.png","price":"free","url":{"path":"/de/vorlage/icebreaker-mobile-startup-edition/"}},{"title":"Trivial Quiz","thumbnail":"https://images.genially.com/genially/templates/8991b1b9-a233-4197-b76a-00706ffab624.png","price":"free","url":{"path":"/de/vorlage/geniales-trivia-quiz/"}},{"title":"DAFO Herausforderung: Kategorisieren der Schlüsselfaktoren","thumbnail":"https://images.genially.com/genial.ly/genially/templates/937f2057-2809-4020-9af4-44629eb0e873.jpeg","price":"free","url":{"path":"/de/vorlage/dafo-herausforderung-kategorisieren-der-schlusselfaktoren/"}},{"title":"Cybersicherheitssimulation","thumbnail":"https://images.genially.com/genial.ly/genially/templates/2a1bcf98-9232-4748-b5b8-e275eea9452b.png","price":"free","url":{"path":"/de/vorlage/cybersicherheitssimulation/"}},{"title":"Unternehmen escape room simple","thumbnail":"https://images.genially.com/genial.ly/genially/templates/09c3a8bd-2868-41dc-8964-effc07035a3d.jpeg","price":"free","url":{"path":"/de/vorlage/einfacher-escape-room-unternehmen/"}},{"title":"Mehrwege: Führungsentscheidungen","thumbnail":"https://images.genially.com/genial.ly/genially/templates/cd226583-8dc9-45f2-aac1-4d0333dc68fd.jpeg","price":"free","url":{"path":"/de/vorlage/mehrwege-fuhrungsentscheidungen/"}},{"title":"Sprachlernspiel Mobilgeräte","thumbnail":"https://images.genially.com/genial.ly/genially/templates/54b80fcf-12d8-4b5e-b51d-5575a606d638.jpeg","price":"free","url":{"path":"/de/vorlage/sprachlernspiel-mobilgerate/"}},{"title":"Feedback- und Führungssimulation","thumbnail":"https://images.genially.com/genial.ly/genially/templates/7be5d47c-10cc-4c35-b9f2-6523083a73b3.jpeg","price":"free","url":{"path":"/de/vorlage/feedback--und-fuhrungssimulation/"}},{"title":"Firmen-Memory-Spiel","thumbnail":"https://images.genially.com/genial.ly/genially/templates/8a9fe1fc-036f-467f-a18c-03f2fee69328.jpeg","price":"free","url":{"path":"/de/vorlage/memory-spiel-corp/"}},{"title":"Interaktives Scoreboard","thumbnail":"https://images.genially.com/genial.ly/genially/templates/f97f26a3-7dc9-4f07-8e39-1e0caab54944.png","price":"free","url":{"path":"/de/vorlage/interaktives-scoreboard/"}},{"title":"Unternehmens Icebreaker","thumbnail":"https://images.genially.com/genial.ly/genially/templates/503c5a5f-f40d-4959-be85-62cd7d4667c2.jpeg","price":"free","url":{"path":"/de/vorlage/unternehmens-icebreaker/"}}],"url":{"path":"de/vorlage/cybersicherheitssimulation/"},"langcode":{"value":"de"},"translations":[{"title":"Cybersecurity Simulation","url":{"path":"/template/cybersecurity-simulation/"},"language":{"id":"en"}},{"title":"Cybersicherheitssimulation","url":{"path":"/de/vorlage/cybersicherheitssimulation/"},"language":{"id":"de"}},{"title":"Cybersecurity Simulation","url":{"path":"/template/cybersecurity-simulation/"},"language":{"id":"en"}},{"title":"Simulación de ciberseguridad","url":{"path":"/es/plantilla/simulacion-de-ciberseguridad/"},"language":{"id":"es"}},{"title":"Simulation de cybersécurité","url":{"path":"/fr/modele/simulation-de-cybersecurite/"},"language":{"id":"fr"}},{"title":"Simulazione di cybersecurity","url":{"path":"/it/template/simulazione-di-cybersecurity/"},"language":{"id":"it"}},{"title":"Simulação de cibersegurança","url":{"path":"/pt-br/modelo/simulaao-de-cibersegurana"},"language":{"id":"pt-br"}}],"liveSession":false,"aspectRatio":"16:9","thumbnail":"https://images.genially.com/genial.ly/genially/templates/2a1bcf98-9232-4748-b5b8-e275eea9452b.png","tags":["simulation","cybersicherheit","cyberangriffe","sicherheit","informatik","berichte","online","digitale","cyberkriminalität","virtuelle","angriffe","datenschutz","cyberabwehr","ethisches","hacking","bildung","training","bedrohungen","cybersicherheitsbildung"]}}}}},"staticQueryHashes":[]}