Skip to main content

    Foundations

    Foundations is een 5-lessen-startroute voor wie nieuw is in security-awareness. Het behandelt hoe aanvallers denken, de vijf aanvalstypen die je moet kunnen herkennen, de basis van phishing-herkenning, wachtwoord- en MFA-hygiëne, en wat te doen als er iets misgaat. Samen ongeveer 30 minuten. De eindtoets combineert vragen uit elke les.

    5 lessen32 min totaalNog niet gestart

    Aanbevolen volgorde

    Lessen lopen van beginner naar expert. Lees alles op volgorde, of spring naar wat voor jouw rol relevant is.

    1. 1
      Les 1Beginner

      How Attackers Think — The Mindset Behind Every Modern Cyber Attack

      Most attackers are not in your office targeting you personally. They are running a business: cheap reconnaissance, automated targeting, and a profit motive. Understanding the four steps they follow — recon, lure, exploit, monetise — is the foundation every awareness lesson builds on.

      6 min read

    2. 2
      Les 2Beginner

      The Five Attack Categories — A Map of What You'll Actually Face

      Almost every cyber attack you'll see in real life falls into one of five categories: phishing and social engineering, credential and authentication abuse, malware and ransomware, network and application exploitation, and supply-chain compromise. Knowing which one you're looking at tells you which defensive playbook to reach for.

      7 min read

    3. 3
      Les 3Beginner

      Spotting Phishing — The Four Red Flags You Can Always Trust

      Phishing comes in many forms — email, SMS, voice, QR, chat, video — but almost every variant has the same four red flags: a request for action, urgency or pressure, a channel mismatch, and a credibility prop that doesn't quite hold up. Learn these four and you'll spot 90% of attempts without needing to be a security expert.

      6 min read

    4. 4
      Les 4Beginner

      Passwords & MFA Basics — Why Most MFA Isn't Phishing-Resistant

      Passwords get stolen daily; reusing them across accounts is the biggest single risk for individuals and small organisations. Adding MFA helps — but not all MFA is equal. SMS, TOTP, and push-based MFA can all be bypassed in 2026. FIDO2 / passkeys, properly deployed, cannot. This lesson covers what to use, what to avoid, and the four attack patterns each control stops or doesn't.

      7 min read

    5. 5
      Les 5Beginner

      Reporting & Incident Hygiene — The First 30 Minutes Matter Most

      When you suspect a security incident, what you do in the first 30 minutes determines how much damage gets contained. This lesson teaches the four moves to make immediately, the four moves to NOT make, who to call, what evidence to preserve, and how NIS2 and GDPR reporting clocks work for non-technical staff.

      6 min read

    Wat volgt

    Als je deze track hebt afgerond, raden we het volgende aan.

    Wil je een echte aanvaller in je omgeving testen?

    HackersHub voert betaalde red-team-engagements uit.

    Praat met een expert

    Deze module is door HackersHub goedgekeurd in exact deze vorm, inclusief watermerk. Gratis onder CC-BY-ND 4.0. Wil je de inhoud aanpassen? Verwijder dan eerst ons watermerk. — Het HackersHub-team Bekijk licentievoorwaarden.