# Phishing Simulator

## Scheduling your Phishing Campaigns

{% embed url="<https://www.loom.com/share/c3b8db8e4b4f434cbf0f79eafcb58d61?sid=0a830bbc-1f32-4216-933e-3fdd335389a4>" %}

{% embed url="<https://www.loom.com/share/0d9d8452ecbe4505aa2b0253cfdbc75a?sid=95569ca1-8128-45bb-849d-6f5cd3f1f552>" %}

{% embed url="<https://www.loom.com/share/aebdba7bb2a84bd9bbc5b7446a190641?sid=293f6ffb-b42a-4973-9d17-c518066075da>" %}

## Customising your Phishing Templates

We have over 16,000 templates you can start using immediately. However, many customers love to customise the templates available for their own business. Alternatively, some customers have emails they want to import to Keepnet to use as a Phishing scenario.

{% embed url="<https://www.loom.com/share/47cca6a655f44bafb8edf8d064ef9dd2?sid=db3084ff-be5c-46e2-9c43-cc09beba36f5>" %}

{% embed url="<https://www.loom.com/share/a2ee344e41a4438d9f5d377f71866a0f?sid=a7f1d2e3-24d4-4ddb-93e4-a63b705aeb44>" %}

{% embed url="<https://www.loom.com/share/4ff7681ccb1e4069bd71d6b6f824654f?sid=a7c65b5f-c5b2-48bc-80be-7e7a1826b4ee>" %}

{% embed url="<https://www.loom.com/share/63573d378a8e4e23b5dd1e8c3b6d1e2b?sid=95010646-e161-4f3b-8e81-0fe914110578>" %}

{% embed url="<https://www.loom.com/share/e899debb32cb491b8e97c064fabb7a7a?sid=67c87a55-1515-469e-a0e6-1313b1a8f1e7>" %}

{% embed url="<https://www.loom.com/share/6e1e3f3343474deaa45e8124f033f7f6>" %}

## View Reporting for your Campaigns

{% embed url="<https://www.loom.com/share/d0c88895fccf4e158d853ce4bff4a983?sid=31c87d09-c18e-42da-a9eb-b51defbabe32>" %}

{% embed url="<https://www.loom.com/share/63a0f25936904cb8b3720489ea85af28?sid=5d94559f-ddbf-44ab-8a8b-4f4ee019b6ca>" %}
