{"componentChunkName":"component---src-views-template-template-tsx","path":"/template/cybersecurity-simulation/","result":{"pageContext":{"node":{"data":{"content":{"title":"Cybersecurity Simulation","bundle":"template","displayTitle":"Cybersecurity Simulation","description":{"value":"A free template to simulate cybersecurity scenarios, train on data protection, and prepare against cyber attacks. Ideal for reports on computer security and ethical hacking. Customizable and perfect for online security training."},"idView":"682dd49c521704c64b528be5","IdGenially":"681b49299b5a06000704bbcf","price":"free","breadcrumb":[{"url":"/templates/nueva-cat/","title":"nueva cat"},{"url":"/templates/games/elearning-training/","title":"eLearning Games"},{"title":"Cybersecurity Simulation"}],"categories":[{"title":"nueva cat","path":"/templates/nueva-cat"},{"title":"eLearning Games","path":"/templates/games/elearning-training"},{"title":"eLearning","path":"/templates/elearning-training"},{"title":"Students","path":"/templates/students"},{"title":"Higher Education","path":"/templates/higher-education"},{"title":"Marketing","path":"/templates/marketing"},{"title":"Business","path":"/templates/business"}],"metas":[{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"de","href":"https://genially.com/de/vorlage/cybersicherheitssimulation/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"en","href":"https://genially.com/template/cybersecurity-simulation/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"es","href":"https://genially.com/es/plantilla/simulacion-de-ciberseguridad/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"fr","href":"https://genially.com/fr/modele/simulation-de-cybersecurite/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"it","href":"https://genially.com/it/template/simulazione-di-cybersecurity/"}},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"pt-br","href":"https://genially.com/pt-br/modelo/simulaao-de-cibersegurana"}},{"type":"MetaValue","property":"title","content":"Cybersecurity Simulation"},{"type":"MetaValue","property":"description","content":"A free template to simulate cybersecurity scenarios, train on data protection, and prepare against cyber attacks. Ideal for reports on computer security and ethical hacking. Customizable and perfect for online security training."},{"type":"MetaLink","property":"canonical","content":"https://genially.com/template/cybersecurity-simulation/"},{"type":"MetaValue","property":"robots","content":"index, follow"},{"type":"MetaProperty","property":"og:site_name","content":"Genially"},{"type":"MetaProperty","property":"og:type","content":"website"},{"type":"MetaProperty","property":"og:url","content":"https://genially.com/template/cybersecurity-simulation/"},{"type":"MetaProperty","property":"og:title","content":"Cybersecurity Simulation"},{"type":"MetaProperty","property":"og:description","content":"A free template to simulate cybersecurity scenarios, train on data protection, and prepare against cyber attacks. Ideal for reports on computer security and ethical hacking. Customizable and perfect for online security training."},{"type":"MetaProperty","property":"og:image","content":"https://images.genially.com/genial.ly/genially/templates/c19620be-ac31-42ac-87a2-e606e36ad14a.png"},{"type":"MetaProperty","property":"og:email","content":"support@genially.com"},{"type":"MetaLink","property":"alternate","content":{"rel":"alternate","hreflang":"x-default","href":"https://genially.com/template/cybersecurity-simulation/"}},{"type":"MetaLink","property":"og:url","content":"https://genially.com/template/cybersecurity-simulation/"},{"type":"MetaValue","property":"og:title"},{"type":"MetaValue","property":"og:description","content":"A free template to simulate cybersecurity scenarios, train on data protection, and prepare against cyber attacks. Ideal for reports on computer security and ethical hacking. Customizable and perfect for online security training."}],"metasSchema":{"@context":"https://schema.org","@graph":[{"@type":"Corporation","@id":"https://genially.com/#organization","legalName":"Genially Web S.L.","description":"Genially is a powerful no-code authoring tool that enables anyone to create dynamic, interactive learning experiences. While it began as a platform for interactive presentations and infographics, Genially has evolved into a leading solution for building engaging content in education, eLearning, and corporate training. Educators, instructional designers, and trainers use Genially to design everything from interactive lessons and gamified activities to onboarding modules, microlearning courses, and assessments. Its intuitive interface, built-in animations, and advanced gamification features make it easy to create content that’s not only visually striking, but also pedagogically effective and learner-centered.","name":"Genially","sameAs":"\"https://www.facebook.com/Genially/\", \"https://twitter.com/genially_en/\", \"https://www.instagram.com/genially_official/\", \"https://www.youtube.com/channel/UCtq6w3zpUc5tQYEC6Q8pImg\", \"https://www.linkedin.com/company/geniallyofficial/\", \"https://www.pinterest.com/geniallyofficial/\", \"https://es.wikipedia.org/wiki/Genially\", \"https://www.crunchbase.com/organization/genially\", \"https://www.g2.com/products/genially/\", \"https://www.getapp.com/collaboration-software/a/genially/\",\r\n\"https://www.capterra.com/p/146861/Genially/\",\r\n\"https://www.producthunt.com/products/genially\",\r\n\"https://www.tiktok.com/@genially_official\"","url":"https://genially.com/","logo":{"@type":"ImageObject","url":"https://assets.genially.com/s3fs-public/images/genially.png"}},{"@type":"WebPage","name":"Cybersecurity Simulation","@id":"https://genially.com/template/cybersecurity-simulation/","description":"A free template to simulate cybersecurity scenarios, train on data protection, and prepare against cyber attacks. Ideal for reports on computer security and ethical hacking. Customizable and perfect for online security training.","datePublished":"2025-11-11T09:55:20.881Z","dateModified":"2025-11-11T09:55:20.881Z","author":{"@type":"Organization","@id":"https://genially.com/#organization","name":"Genially","url":"https://genially.com/","logo":{"@type":"ImageObject","url":"https://assets.genially.com/s3fs-public/images/genially.png"}},"hasPart":{"@type":"WebPageElement","isAccessibleForFree":"True","name":"Genially","url":"https://genially.com/"},"isAccessibleForFree":"True","inLanguage":"en"},{"@type":"WebSite","@id":"https://genially.com/#website","name":"Genially","url":"https://genially.com/","inLanguage":"en,es,fr,pt-br,it,de"}]},"relatedTemplates":[{"title":"Akihabara Onboarding Game Mobile","thumbnail":"https://images.genially.com/genial.ly/genially/templates/d8691314-505d-485d-b9b4-e48259b2d710.png","price":"free","url":{"path":"/template/akihabara-onboarding-game-mobile/"}},{"title":"Language Learning Game Mobile","thumbnail":"https://images.genially.com/genial.ly/genially/templates/9044e59a-e2c0-4c89-88c3-88b83fc73efa.jpeg","price":"free","url":{"path":"/template/language-learning-game-mobile/"}},{"title":"Product Purchase Simulation","thumbnail":"https://images.genially.com/genial.ly/genially/templates/98900aa9-b638-4220-a23d-8578b44f4097.png","price":"free","url":{"path":"/template/product-purchase-simulation/"}},{"title":"Sorting Cards","thumbnail":"https://images.genially.com/genial.ly/genially/templates/4ea65b91-2110-4730-9824-2c89dafcc565.png","price":"free","url":{"path":"/template/sorting-cards/"}},{"title":"Minimal quiz","thumbnail":"https://images.genially.com/genially/templates/c98df628-10d8-4b64-8522-fcb39a76483b.jpeg","price":"free","url":{"path":"/template/minimal-quiz/"}},{"title":"Products and Services Game","thumbnail":"https://images.genially.com/genial.ly/genially/templates/d5d98819-5d49-4393-b7c9-d391478719d0.jpeg","price":"free","url":{"path":"/template/products-and-services-game/"}},{"title":"Cybersecurity Simulation","thumbnail":"https://images.genially.com/genial.ly/genially/templates/c19620be-ac31-42ac-87a2-e606e36ad14a.png","price":"free","url":{"path":"/template/cybersecurity-simulation/"}},{"title":"Corporate Icebreaker","thumbnail":"https://images.genially.com/genial.ly/genially/templates/d9a086a4-37b9-4bad-856c-787399035353.jpeg","price":"free","url":{"path":"/template/corporate-icebreaker/"}},{"title":"Icebreaker: Startup Edition","thumbnail":"https://images.genially.com/genial.ly/genially/templates/74358368-7b61-4884-98ca-4342e3ee2a6c.png","price":"free","url":{"path":"/template/icebreaker-startup-edition/"}},{"title":"Meet the Team Game","thumbnail":"https://images.genially.com/genial.ly/genially/templates/0ce813ff-dcd6-47ca-9f06-0aa8bde6094a.png","price":"free","url":{"path":"/template/meet-the-team-game/"}},{"title":"Corporate Memory Challenge","thumbnail":"https://images.genially.com/genial.ly/genially/templates/538d9475-0838-4223-861d-f9825247b6e6.png","price":"free","url":{"path":"/template/corporate-memory-challenge/"}},{"title":"Work Style Quiz","thumbnail":"https://images.genially.com/genial.ly/genially/templates/3973fc78-6e9e-4d8d-b8e5-f0cbf909d6e8.jpeg","price":"free","url":{"path":"/template/work-style-quiz/"}}],"url":{"path":"/template/cybersecurity-simulation/"},"langcode":{"value":"en"},"translations":[{"title":"Cybersecurity Simulation","url":{"path":"/template/cybersecurity-simulation/"},"language":{"id":"en"}},{"title":"Cybersicherheitssimulation","url":{"path":"/de/vorlage/cybersicherheitssimulation/"},"language":{"id":"de"}},{"title":"Cybersecurity Simulation","url":{"path":"/template/cybersecurity-simulation/"},"language":{"id":"en"}},{"title":"Simulación de ciberseguridad","url":{"path":"/es/plantilla/simulacion-de-ciberseguridad/"},"language":{"id":"es"}},{"title":"Simulation de cybersécurité","url":{"path":"/fr/modele/simulation-de-cybersecurite/"},"language":{"id":"fr"}},{"title":"Simulazione di cybersecurity","url":{"path":"/it/template/simulazione-di-cybersecurity/"},"language":{"id":"it"}},{"title":"Simulação de cibersegurança","url":{"path":"/pt-br/modelo/simulaao-de-cibersegurana"},"language":{"id":"pt-br"}}],"liveSession":false,"aspectRatio":"16:9","thumbnail":"https://images.genially.com/genial.ly/genially/templates/c19620be-ac31-42ac-87a2-e606e36ad14a.png","tags":["simulation","cybersecurity","cyber attacks","security","computer","reports","online","digital","cybercrimes","virtual","data protection","cyber defense","ethical","educational","training","cyber","threats"]}}}}},"staticQueryHashes":[]}