CyberQuest: An Engaging Journey into Information Security
The process of creating an interactive Information Security course for an IT company
An international IT company with offices in five countries and 2,000 employees contacted us with the following request:
"We need an Cyber Security course that our employees will actually enjoy"
We worked under an NDA with confidential data, so with the permission of our Client we share the creation process and mockups similar to the materials we produced.
Let's go through the process of creating this course together with our Learning Experience Designer
STEP 1
ANALYSIS
We take a closer look at the current course
  • The materials are carefully selected and logically structured.
  • The writing style is neutral, sometimes complex, but with elements of corporate humor in the texts and visuals.
  • The user journey is well thought out.
  • The course consists of 15 modules, each with several lessons, additional materials, and cross-links.
  • There are tests designed with traps: questions are phrased to trick the user.
  • Massive blocks of text are tiring, and users have to go through them multiple times to understand.
The unclear course objective was the main issue that led to other challenges. What exactly should employees start or stop doing after completing it?
Maryna Baltrukevich
Lead LXD of the course
The client mentioned that it’s important to highlight the role of information security in daily work, not just in emergencies. The topic should be engaging, showing a human approach and explaining the reasoning behind the measures that protect everyone, including employees.
We proposed a solution, different from the company's usual training style

5-level Information Security Quest to equip employees with essential skills for protecting the company, clients, and themselves.
Guided by course characters and featuring cameos from top managers, this solution combines practical learning with engaging content.
STEP 2
DESIGN
At this stage, we created the course prototype
  • Restructured the course program
    Defined the key message, removed unnecessary material, added interactive practical tasks
  • Developed the creative concept:
    The employee goes through the stages of the security system, searching for vulnerabilities. At each stage, they meet an Assistant and an Antagonist, perform tasks and find Easter eggs
  • Chosen the course design style
    We chose a cyberpunk style, moving away from the company's usual restrained approach. We carefully considered this decision, consulted with a focus group, and ultimately chose the boldest option. And the users liked it.
  • Selected the tone of voice
    When choosing the tone of voice, we moved away from overly formal language, using a more lively tone, corporate humor, Easter eggs, and stickers.
STEP 3
DEVELOPMENT
This is the material creation stage. It involved a complex production process, including shooting narrative videos, designing and creating materials, approval and testing.
The key to handling such a complex production with so many moving parts is staying in control of the process and keeping the energy of your team and client high for the long run.


Maryna Baltrukevich
Lead LXD of the course
STEP 4: IMPLEMENTATION
We went through a test group, an unmoderated design test, and launched the first session.
STEP 5
EVALUATION
In addition to specific metrics that we cannot disclose, we regularly measure the CSI, which averages 4.8 out of 5. This includes technical parameters, usability, clarity, applicability, difficulty, and the balance between theory and practice. The Client received positive and warm feedback from their employees.
Our main takeaway
Out-of-the-box design can make a big impact, but a solid framework is essential. Align goals, push boundaries, and make everything work together to create something amazing.
Looking for Impactful Training?
Book a free 20-minutes consulting call with us. We will find best solution for you
Your Contacts