How to Use Gamification

How to Use Gamification

Gamification in ThreatCop

Cybersecurity learning just got smarter and more fun!
ThreatCop now offers gamified training modules designed to boost employee engagement and knowledge retention.

Types of Games

  •  Generic Games
    Example: Word Hunt
    Ideal for everyone, these games reinforce fundamental cybersecurity concepts in an enjoyable way.

  •  Role-Specific Games
    Example: HR Department Face-Off
    These simulate real-life scenarios tailored to specific job roles. Perfect for training users on threats they’re likely to encounter based on their responsibilities—especially with modern phishing attacks now targeting different roles differently.

Learn by doing – making training more relevant, engaging, and effective.

How to Launch a Game-Based Campaign

Follow these simple steps to create and send a gamified training campaign:

  1. Log in to the Admin Portal.

  2. Navigate to TLMS.

  1. Click the Create Campaign button at the top.


  1. Select Campaign Type as Game.

  1. Enter a Campaign Name.

  1. Click Select Game and choose from the available options.


  1. Select the Groups to target with this campaign.

  1. Set the Campaign Expiration Date (or use the default duration).

  1. Click Send Now or Schedule for Later.


    • Related Articles

    • GAMIFICATION

      Making learning a delightful adventure by adding fun elements for the gaming context on our LMS. What Do We Mean by Gamification? We concentrate not only on providing a seaming learning experience but also a fun experience while learning through our ...
    • How to use Activity Logs In TLMS ?

      Activity Logs show the time of the user when it logs in. The user can be Admin or IAM user. The Admin can track the activity of an IAM User. These details help the Admin to check which section has been opened by which user, etc. Please follow the ...
    • How to use Activity Log webhook URL?

      Enter your webhook URL here to keep the activity log updated.
    • IAM User in TLMS

      IAM refers to Identity and Access Management. This feature enables administrators to manage user identities and control their access to resources within the tool's ecosystem. With IAM, administrators can create, modify, and delete user accounts, ...
    • API Token – Guide

      Overview Using TLMS APIs, you can fetch campaign and learner details, enabling real-time insights and data synchronization with your internal systems. How to Get Started Login to TLMS Portal. Navigate to the Integrations section. Click on the API ...