Foundations
Foundations is een 5-lessen-startroute voor wie nieuw is in security-awareness. Het behandelt hoe aanvallers denken, de vijf aanvalstypen die je moet kunnen herkennen, de basis van phishing-herkenning, wachtwoord- en MFA-hygiëne, en wat te doen als er iets misgaat. Samen ongeveer 30 minuten. De eindtoets combineert vragen uit elke les.
Aanbevolen volgorde
Lessen lopen van beginner naar expert. Lees alles op volgorde, of spring naar wat voor jouw rol relevant is.
- 1Les 1Beginner
How Attackers Think — The Mindset Behind Every Modern Cyber Attack
Most attackers are not in your office targeting you personally. They are running a business: cheap reconnaissance, automated targeting, and a profit motive. Understanding the four steps they follow — recon, lure, exploit, monetise — is the foundation every awareness lesson builds on.
6 min read
- 2Les 2Beginner
The Five Attack Categories — A Map of What You'll Actually Face
Almost every cyber attack you'll see in real life falls into one of five categories: phishing and social engineering, credential and authentication abuse, malware and ransomware, network and application exploitation, and supply-chain compromise. Knowing which one you're looking at tells you which defensive playbook to reach for.
7 min read
- 3Les 3Beginner
Spotting Phishing — The Four Red Flags You Can Always Trust
Phishing comes in many forms — email, SMS, voice, QR, chat, video — but almost every variant has the same four red flags: a request for action, urgency or pressure, a channel mismatch, and a credibility prop that doesn't quite hold up. Learn these four and you'll spot 90% of attempts without needing to be a security expert.
6 min read
- 4Les 4Beginner
Passwords & MFA Basics — Why Most MFA Isn't Phishing-Resistant
Passwords get stolen daily; reusing them across accounts is the biggest single risk for individuals and small organisations. Adding MFA helps — but not all MFA is equal. SMS, TOTP, and push-based MFA can all be bypassed in 2026. FIDO2 / passkeys, properly deployed, cannot. This lesson covers what to use, what to avoid, and the four attack patterns each control stops or doesn't.
7 min read
- 5Les 5Beginner
Reporting & Incident Hygiene — The First 30 Minutes Matter Most
When you suspect a security incident, what you do in the first 30 minutes determines how much damage gets contained. This lesson teaches the four moves to make immediately, the four moves to NOT make, who to call, what evidence to preserve, and how NIS2 and GDPR reporting clocks work for non-technical staff.
6 min read
Wat volgt
Als je deze track hebt afgerond, raden we het volgende aan.
Wil je een echte aanvaller in je omgeving testen?
HackersHub voert betaalde red-team-engagements uit.
Praat met een expertDeze module is door HackersHub goedgekeurd in exact deze vorm, inclusief watermerk. Gratis onder CC-BY-ND 4.0. Wil je de inhoud aanpassen? Verwijder dan eerst ons watermerk. — Het HackersHub-team Bekijk licentievoorwaarden.