{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-business\"\u003e\u003ci class=\"ma-business material-icons icon--medium\"\u003ebusiness\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eAuch für Ihr Unternehmen\u003c/h3\u003e\u003cp\u003eVolumenrabatt, Inhouse-Seminare, soziales Lernen mit Ihren Kollegen und immer neue Einsichten.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e14 IT-Sicherheit Seminare in Hamburg\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eVerwandte Themen: \u003ca title=\"61 IT-Management \u0026amp; Strategie Kurse\" href=\"/it/it-management-strategie/hamburg\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" href=\"/it/itberater/hamburg\"\u003eIT-Berater\u003c/a\u003e, \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" href=\"/it/hacking/hamburg\"\u003eHacking\u003c/a\u003e, \u003ca title=\"3 Cisco Network Security Kurse\" href=\"/it/cisco network security/hamburg\"\u003eCisco Network Security\u003c/a\u003e, \u003ca title=\"41 Ethical Hacking Kurse und Seminare\" href=\"/it/ethical-hacking/hamburg\"\u003eEthical Hacking\u003c/a\u003e und \u003ca title=\"22 Penetration Testing Kurse\" href=\"/it/penetration-testing/hamburg\"\u003ePenetration Testing\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eVerwandte Themen: \u003ca title=\"61 IT-Management \u0026amp; Strategie Kurse\" href=\"/it/it-management-strategie/hamburg\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" href=\"/it/itberater/hamburg\"\u003eIT-Berater\u003c/a\u003e und \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" href=\"/it/hacking/hamburg\"\u003eHacking\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 aktiver Filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sortieren\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003eHamburg\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eFilter ändern\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003cp class=\"message--message enabled message\"\u003eTipp: sehen Sie sich auch Produkte ohne Startdaten- oder Regionenangaben an: \u003ca class=\"filter__link-no-style\" data-link-type=\"filter-add-tip-box\" href=\"/it/it-sicherheit/live-online\"\u003eLive Online\u003c/a\u003e (59), \u003ca class=\"filter__link-no-style\" data-link-type=\"filter-add-tip-box\" href=\"/it/it-sicherheit/e-learning\"\u003eE-Learning\u003c/a\u003e (38), \u003ca class=\"filter__link-no-style\" data-link-type=\"filter-add-tip-box\" href=\"/it/it-sicherheit/fernstudium\"\u003eFernstudium\u003c/a\u003e (2), oder \u003ca class=\"filter__link-no-style\" data-link-type=\"filter-add-tip-box\" href=\"/it/it-sicherheit\"\u003eIT-Sicherheit Deutschlandweit\u003c/a\u003e (182). Oder beantragen Sie kostenlos Angebote für eine \u003ca href=\"/inhouse?utm_source=region_tip_box\"\u003eInhouse-Schulung\u003c/a\u003e.\u003c/p\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChange sorting\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSortieren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/it/it-sicherheit/hamburg\" data-link-type=\"sort\" href=\"#\"\u003eBewertungen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/hamburg/preis-hoch-niedrig\" data-link-type=\"sort\" href=\"#\"\u003ePreis (hoch \u0026gt; niedrig)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/hamburg/preis-niedrig-hoch\" data-link-type=\"sort\" href=\"#\"\u003ePreis (niedrig \u0026gt; hoch)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/hamburg/dauer-lang-kurz\" data-link-type=\"sort\" href=\"#\"\u003eDauer (lang \u0026gt; kurz)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/hamburg/dauer-kurz-lang\" data-link-type=\"sort\" href=\"#\"\u003eDauer (kurz \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-704218\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-704218\" id=\"training-704218\" value=\"704218\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT-Grundlagen und IT-Sicherheit für Datenschutzbeauftragte IT-Sicherheit gemäß DSGVO\" href=\"/tuev-nord-akademi/it-grundlagen-und-it-sicherheit-fuer-datenschutzbeauftragte-it-sicherheit-gemaess-dsgvo\"\u003eIT-Grundlagen und IT-Sicherheit für Datenschutzbeauftragte IT-Sicherheit gemäß DSGVO\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV NORD Akademie GmbH \u0026amp; Co. KG\" title=\"Logo von TÜV NORD Akademie GmbH \u0026amp; Co. KG\" src=\"https://static-1.springest.com/uploads/institute/logo/22805/thumb_tuev-nord-akademi-d1498f6690cd07705ebd0fd8c95ce810.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Dienstag 23. April 2024 und 5 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDa es sich um ein Grundlagen-Seminar handelt, werden keine besonderen Kenntnisse vorausgesetzt. Eine Teilnahme eignet sich jedoch insbesond…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.392,30 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"IT-Grundlagen und IT-Sicherheit für Datenschutzbeauftragte IT-Sicherheit gemäß DSGVO hat eine durchschnittliche Bewertung von 9,0\" href=\"/tuev-nord-akademi/it-grundlagen-und-it-sicherheit-fuer-datenschutzbeauftragte-it-sicherheit-gemaess-dsgvo#bewertungen\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 9\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(1 Bewertung)\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,7 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV NORD Akademie GmbH \u0026amp; Co. KG haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,7\u003c/strong\u003e (aus \u003cstrong\u003e115\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV NORD Akademie GmbH \u0026amp; Co. KG\" title=\"Logo von TÜV NORD Akademie GmbH \u0026amp; Co. KG\" src=\"https://static-1.springest.com/uploads/institute/logo/22805/thumb_tuev-nord-akademi-d1498f6690cd07705ebd0fd8c95ce810.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tuev-nord-akademi/it-grundlagen-und-it-sicherheit-fuer-datenschutzbeauftragte-it-sicherheit-gemaess-dsgvo/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tuev-nord-akademi/it-grundlagen-und-it-sicherheit-fuer-datenschutzbeauftragte-it-sicherheit-gemaess-dsgvo/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cp class=\"message--info starting-dates-divider message\"\u003e\u003cspan class=\"arrow-down--blue\"\u003e\u003c/span\u003eDie übrigen Produkte haben keine bekannten Startdaten oder sind nicht direkt buchbar.\u003c/p\u003e\u003cdiv class=\"result-item product-item\" id=\"training-915703\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-915703\" id=\"training-915703\" value=\"915703\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT-Sicherheit: (Anti-) Hacking für Admins Angriffe erkennen und Schutzmaßnahmen verstärken\" href=\"/computer-systeme-dipl-ing-thorsten-kebel/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken\"\u003eIT-Sicherheit: (Anti-) Hacking für Admins Angriffe erkennen und Schutzmaßnahmen verstärken\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" title=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" src=\"https://static-2.springest.com/uploads/institute/logo/12161/thumb_computer-systeme-dipl-ing-thorsten-kebel-122784597098ab9f0d5610be1916a633.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg und 18 andere Regionen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eAngesprochener Teilnehmerkreis: System- und Netzwerkadministratoren, IT- und Systemverantwortliche, IT-Architekten sowie IT-Sicherheitsbeau…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.011,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von IT-Trainings - Dipl.-Ing. Thorsten Kebel haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,5\u003c/strong\u003e (aus \u003cstrong\u003e2\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" title=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" src=\"https://static-2.springest.com/uploads/institute/logo/12161/thumb_computer-systeme-dipl-ing-thorsten-kebel-122784597098ab9f0d5610be1916a633.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computer-systeme-dipl-ing-thorsten-kebel/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computer-systeme-dipl-ing-thorsten-kebel/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1034373\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1034373\" id=\"training-1034373\" value=\"1034373\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: SC-100 Microsoft Cybersecurity Architect\" href=\"/prokoda/sc-100-microsoft-cybersecurity-architect\"\u003eSC-100 Microsoft Cybersecurity Architect\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROKODA GmbH\" title=\"Logo von PROKODA GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--date icon--align-top'\u003edate_range\u003c/i\u003e\u003cspan\u003e22 andere Zeitpunkte\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Teilnehmer lernen auch, wie man Lösungen unter Verwendung von Zero-Trust-Prinzipien entwirft und architektonisch gestaltet und Sicherhe…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.201,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eAlle Preise zzgl. Mehrwertsteuer und incl. Teilnehmerunterlagen, kalten und heißen Pausengrtränken sowie Mittagessen\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,3 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von PROKODA GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,3\u003c/strong\u003e (aus \u003cstrong\u003e27\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROKODA GmbH\" title=\"Logo von PROKODA GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/prokoda/sc-100-microsoft-cybersecurity-architect/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/prokoda/sc-100-microsoft-cybersecurity-architect/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1061130\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1061130\" id=\"training-1061130\" value=\"1061130\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Microsoft Cybersecurity Architect\" href=\"/prokoda/microsoft-cybersecurity-architect\"\u003eMicrosoft Cybersecurity Architect\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROKODA GmbH\" title=\"Logo von PROKODA GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMontag 23. September 2024 in Hamburg und 8 andere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDieses Seminar vermittelt den Teilnehmern das nötige Wissen für Design und Evaluierung von Cybersecuritystrategien in folgenden Bereichen: …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.034,50 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eAlle Preise zzgl. Mehrwertsteuer und incl. Teilnehmerunterlagen, kalten und heißen Pausengrtränken sowie Mittagessen\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,3 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von PROKODA GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,3\u003c/strong\u003e (aus \u003cstrong\u003e27\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROKODA GmbH\" title=\"Logo von PROKODA GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/prokoda/microsoft-cybersecurity-architect/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/prokoda/microsoft-cybersecurity-architect/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-748914\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-748914\" id=\"training-748914\" value=\"748914\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT-Security-Beauftragter (TÜV) (ITSBTUEV)\" href=\"/prokoda/it-security-beauftragter-tuev-itsbtuev\"\u003eIT-Security-Beauftragter (TÜV) (ITSBTUEV)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROKODA GmbH\" title=\"Logo von PROKODA GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Sicherheit sensibler Daten, Informationen und Prozesse gewinnt immer mehr an Bedeutung. Ein optimales und zuverlässiges Informationssic…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.105,90 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eAlle Preise zzgl. Mehrwertsteuer und incl. Teilnehmerunterlagen, kalten und heißen Pausengrtränken sowie Mittagessen\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,3 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von PROKODA GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,3\u003c/strong\u003e (aus \u003cstrong\u003e27\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROKODA GmbH\" title=\"Logo von PROKODA GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/prokoda/it-security-beauftragter-tuev-itsbtuev/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/prokoda/it-security-beauftragter-tuev-itsbtuev/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-866904\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-866904\" id=\"training-866904\" value=\"866904\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Die IT-Security-Policy - Kurs\" href=\"/protranet-institut-2/die-it-security-policy-kurs\"\u003eDie IT-Security-Policy - Kurs\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROTRANET GmbH\" title=\"Logo von PROTRANET GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/12115/thumb_protranet-institut-2-d2b49bd7b159a7aa4f3c46b33303364d.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eDonnerstag 4. April 2024 in Hamburg und 146 andere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Trainings-Schwerpunkte werden nach Ihrem persönlichen Beratungsgespräch festgelegt. In diesem Training sind folgende Themen vorgesehen:…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.439,90 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 \u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von PROTRANET GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,5\u003c/strong\u003e (aus \u003cstrong\u003e37\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von PROTRANET GmbH\" title=\"Logo von PROTRANET GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/12115/thumb_protranet-institut-2-d2b49bd7b159a7aa4f3c46b33303364d.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/protranet-institut-2/die-it-security-policy-kurs/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/protranet-institut-2/die-it-security-policy-kurs/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1081361\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1081361\" id=\"training-1081361\" value=\"1081361\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity - rechtliche und technische Grundlagen\" href=\"/gfu-cyrus/cybersecurity-rechtliche-und-technische-grundlagen\"\u003eCybersecurity - rechtliche und technische Grundlagen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg und 46 andere Regionen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eSeminarziel In diesem zweitägigen Seminar werden den Teilnehmern die Grundzüge der durch eine ausgeprägte Vernetzung von rechtlichen und te…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.034,90 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e6,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von GFU Cyrus AG haben eine durchschnittliche Bewertung von \u003cstrong\u003e6,9\u003c/strong\u003e (aus \u003cstrong\u003e8\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/cybersecurity-rechtliche-und-technische-grundlagen/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/cybersecurity-rechtliche-und-technische-grundlagen/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1081379\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1081379\" id=\"training-1081379\" value=\"1081379\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Praktische Grundlagen der IT-Sicherheit\" href=\"/gfu-cyrus/praktische-grundlagen-der-it-sicherheit\"\u003ePraktische Grundlagen der IT-Sicherheit\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg und 46 andere Regionen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eSeminarziel Das Ziel des Seminars ist ein kompakter Einstieg in die IT-Sicherheit. Die Teilnehmer lernen sicher mit den wichtigsten Grundbe…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.404,20 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e1 Tag\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e6,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von GFU Cyrus AG haben eine durchschnittliche Bewertung von \u003cstrong\u003e6,9\u003c/strong\u003e (aus \u003cstrong\u003e8\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/praktische-grundlagen-der-it-sicherheit/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/praktische-grundlagen-der-it-sicherheit/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1081544\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1081544\" id=\"training-1081544\" value=\"1081544\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Praktische IT Security - Hacker-Abwehr-Techniken\" href=\"/gfu-cyrus/praktische-it-security-hacker-abwehr-techniken\"\u003ePraktische IT Security - Hacker-Abwehr-Techniken\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg und 46 andere Regionen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eSeminarziel Den Teilnehmern werden sowohl Angriffsstrategien sowie auch entsprechende Abwehrmaßnahmen vorgestellt. Ebenso lernen Sie währen…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.535,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e6,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von GFU Cyrus AG haben eine durchschnittliche Bewertung von \u003cstrong\u003e6,9\u003c/strong\u003e (aus \u003cstrong\u003e8\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/praktische-it-security-hacker-abwehr-techniken/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/praktische-it-security-hacker-abwehr-techniken/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1080979\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1080979\" id=\"training-1080979\" value=\"1080979\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT-Sicherheit der Überblick\" href=\"/gfu-cyrus/it-sicherheit-der-uberblick\"\u003eIT-Sicherheit der Überblick\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg und 46 andere Regionen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eSeminarziel Nach Teilnahme an der Schulung kennen Sie die wichtigsten Verfahren, Standards und Begriffe zur IT-Sicherheit und der Erstellun…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.737,40 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e6,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von GFU Cyrus AG haben eine durchschnittliche Bewertung von \u003cstrong\u003e6,9\u003c/strong\u003e (aus \u003cstrong\u003e8\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/it-sicherheit-der-uberblick/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/it-sicherheit-der-uberblick/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-684254\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-684254\" id=\"training-684254\" value=\"684254\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Bewusstsein für IT-Sicherheit schaffen\" href=\"/institut-fur-managementberatung/bewusstsein-fuer-it-sicherheit-schaffen\"\u003eBewusstsein für IT-Sicherheit schaffen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von IFM Institut für Managementberatung GmbH\" title=\"Logo von IFM Institut für Managementberatung GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/6159/thumb_institut-fur-managementberatung-03ad8d438330e1cdee0d79f0a4b1b2fc.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg und 8 andere Regionen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eMit der Digitalisierung von Firmen wird auch ihre Angriffsfläche größer. Wie können sich Unternehmen vor Datendiebstahl, Tricks und Manipul…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.666,00 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eBei Anmeldung von 3 Teilnehmern aus einem Unternehmen zum gleichen Termin erhalten Sie einen Rabatt von 10% auf den Gesamtpreis.\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von IFM Institut für Managementberatung GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,2\u003c/strong\u003e (aus \u003cstrong\u003e187\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von IFM Institut für Managementberatung GmbH\" title=\"Logo von IFM Institut für Managementberatung GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/6159/thumb_institut-fur-managementberatung-03ad8d438330e1cdee0d79f0a4b1b2fc.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/institut-fur-managementberatung/bewusstsein-fuer-it-sicherheit-schaffen/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/institut-fur-managementberatung/bewusstsein-fuer-it-sicherheit-schaffen/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1043317\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1043317\" id=\"training-1043317\" value=\"1043317\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Inhouse: IT-Sicherheit: (Anti-) Hacking für Admins - Angriffe erkennen und Schutzmaßnahmen verstärken (Inhouse)\" href=\"/symplasson/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken-inhouse\"\u003eIT-Sicherheit: (Anti-) Hacking für Admins - Angriffe erkennen und Schutzmaßnahmen verstärken (Inhouse)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von SYMPLASSON Informationstechnik GmbH\" title=\"Logo von SYMPLASSON Informationstechnik GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Häufigkeit von Cyberangriffen auf Unternehmensdaten aus dem Internet, insbesondere direkt auch aus dem internen Computernetzwerk nimmt …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eInhouse\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von SYMPLASSON Informationstechnik GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,4\u003c/strong\u003e (aus \u003cstrong\u003e15\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von SYMPLASSON Informationstechnik GmbH\" title=\"Logo von SYMPLASSON Informationstechnik GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1012133\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1012133\" id=\"training-1012133\" value=\"1012133\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Microsoft Cybersecurity Architect (SC-100T00)\" href=\"/fast-lane-institute-for-knowledge-transfer-gmbh-2/microsoft-cybersecurity-architect-sc-100t00\"\u003eMicrosoft Cybersecurity Architect (SC-100T00)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" title=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMontag 23. September 2024 in Hamburg und 6 andere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eKursinhalt Erstellen einer allgemeinen Sicherheitsstrategie und -architektur Entwerfen einer Strategie für Sicherheitsvorgänge Entwerfen ei…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.201,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Fast Lane Institute for Knowledge Transfer GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,9\u003c/strong\u003e (aus \u003cstrong\u003e31\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" title=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fast-lane-institute-for-knowledge-transfer-gmbh-2/microsoft-cybersecurity-architect-sc-100t00/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fast-lane-institute-for-knowledge-transfer-gmbh-2/microsoft-cybersecurity-architect-sc-100t00/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-918113\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-918113\" id=\"training-918113\" value=\"918113\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: CompTIA Cybersecurity Analyst (CYSA+)\" href=\"/fast-lane-institute-for-knowledge-transfer-gmbh-2/comptia-cybersercurity-analyst-cysa\"\u003eCompTIA Cybersecurity Analyst (CYSA+)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" title=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMontag 16. Dezember 2024 in Hamburg und 1 anderer Termin\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eKursinhalt 1. Threat Management Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes. Give…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.963,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 16 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Fast Lane Institute for Knowledge Transfer GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,9\u003c/strong\u003e (aus \u003cstrong\u003e31\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" title=\"Logo von Fast Lane Institute for Knowledge Transfer GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fast-lane-institute-for-knowledge-transfer-gmbh-2/comptia-cybersercurity-analyst-cysa/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fast-lane-institute-for-knowledge-transfer-gmbh-2/comptia-cybersercurity-analyst-cysa/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"IT-Grundlagen und IT-Sicherheit für Datenschutzbeauftragte IT-Sicherheit gemäß DSGVO\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/22805/thumb_tuev-nord-akademi-d1498f6690cd07705ebd0fd8c95ce810.png\",\"description\":\"Da es sich um ein Grundlagen-Seminar handelt, werden keine besonderen Kenntnisse vorausgesetzt. Eine Teilnahme eignet sich jedoch insbesondere zur Ergänzung des Seminars „Datenschutz\\u0026amp;hellip;\",\"startDate\":\"2024-04-23\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"TÜV NORD Akademie GmbH \\u0026 Co. KG OnlineCampus, 22525, Hamburg, Große Bahnstraße 31\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"53.573075\",\"longitude\":\"9.937924\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuev-nord-akademi/it-grundlagen-und-it-sicherheit-fuer-datenschutzbeauftragte-it-sicherheit-gemaess-dsgvo\",\"price\":\"1170.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-01-16\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuev-nord-akademi#EducationalOrganization\",\"url\":\"https://www.springest.de/tuev-nord-akademi\",\"name\":\"TÜV NORD Akademie GmbH \\u0026 Co. KG\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/22805/thumb_tuev-nord-akademi-d1498f6690cd07705ebd0fd8c95ce810.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"SC-100 Microsoft Cybersecurity Architect\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\",\"description\":\"Die Teilnehmer lernen auch, wie man Lösungen unter Verwendung von Zero-Trust-Prinzipien entwirft und architektonisch gestaltet und Sicherheitsanforderungen für Cloud-Infrastrukturen \\u0026amp;hellip;\",\"startDate\":\"2024-04-02\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Dresden\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"51.050409\",\"longitude\":\"13.737262\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/prokoda/sc-100-microsoft-cybersecurity-architect\",\"price\":\"2690.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-03\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/prokoda#EducationalOrganization\",\"url\":\"https://www.springest.de/prokoda\",\"name\":\"PROKODA GmbH\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\",\"description\":\"Dieses Seminar vermittelt den Teilnehmern das nötige Wissen für Design und Evaluierung von Cybersecuritystrategien in folgenden Bereichen: Zero Trust, Governance Risk Compliance (GRC\\u0026amp;hellip;\",\"startDate\":\"2024-05-21\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"München\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"48.135125\",\"longitude\":\"11.581981\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/prokoda/microsoft-cybersecurity-architect\",\"price\":\"2550.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-02-06\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/prokoda#EducationalOrganization\",\"url\":\"https://www.springest.de/prokoda\",\"name\":\"PROKODA GmbH\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/5361/thumb_prokoda.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Die IT-Security-Policy - Kurs\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/12115/thumb_protranet-institut-2-d2b49bd7b159a7aa4f3c46b33303364d.png\",\"description\":\"Die Trainings-Schwerpunkte werden nach Ihrem persönlichen Beratungsgespräch festgelegt. In diesem Training sind folgende Themen vorgesehen: - Grundlagen eines effektiven Sicherheitsm\\u0026amp;hellip;\",\"startDate\":\"2024-04-04\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Berlin\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.520007\",\"longitude\":\"13.404954\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/protranet-institut-2/die-it-security-policy-kurs\",\"price\":\"1190.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-03-22\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/protranet-institut-2#EducationalOrganization\",\"url\":\"https://www.springest.de/protranet-institut-2\",\"name\":\"PROTRANET GmbH\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/12115/thumb_protranet-institut-2-d2b49bd7b159a7aa4f3c46b33303364d.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect (SC-100T00)\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\",\"description\":\"Kursinhalt Erstellen einer allgemeinen Sicherheitsstrategie und -architektur Entwerfen einer Strategie für Sicherheitsvorgänge Entwerfen einer Identitätssicherheitsstrategie Bewerten\\u0026amp;hellip;\",\"startDate\":\"2024-05-21\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"München\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"48.135125\",\"longitude\":\"11.581981\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/fast-lane-institute-for-knowledge-transfer-gmbh-2/microsoft-cybersecurity-architect-sc-100t00\",\"price\":\"2690.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-07-21\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/fast-lane-institute-for-knowledge-transfer-gmbh-2#EducationalOrganization\",\"url\":\"https://www.springest.de/fast-lane-institute-for-knowledge-transfer-gmbh-2\",\"name\":\"Fast Lane Institute for Knowledge Transfer GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"CompTIA Cybersecurity Analyst (CYSA+)\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\",\"description\":\"Kursinhalt 1. Threat Management Given a scenario, apply environmental reconnaissance techniques using appropriate tools and processes. Given a scenario, analyse the results of a netw\\u0026amp;hellip;\",\"startDate\":\"2024-09-09\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"München\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"48.135125\",\"longitude\":\"11.581981\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/fast-lane-institute-for-knowledge-transfer-gmbh-2/comptia-cybersercurity-analyst-cysa\",\"price\":\"2490.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/fast-lane-institute-for-knowledge-transfer-gmbh-2#EducationalOrganization\",\"url\":\"https://www.springest.de/fast-lane-institute-for-knowledge-transfer-gmbh-2\",\"name\":\"Fast Lane Institute for Knowledge Transfer GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/17193/thumb_fast-lane-institute-for-knowledge-transfer-gmbh-9a5d7f19f0f5ae8ca3b3348aab6ac9d0.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003cdiv class=\"message--session-filters\"\u003eIhre Präferenzen werden zur Zeit zum Filtern verwendet.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAdd filters\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/it/it-sicherheit\"\u003eAlle Filter entfernen\u003c/a\u003e\u003cdiv class=\"filter filter--price is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePreis\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 1.000 bis € 2.000 - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/1000-2000/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 bis € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 2.000 bis € 4.000 - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/2000-4000/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 bis € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePreis unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eRegion\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Augsburg - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/augsburg/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugsburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Berlin - 17\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/berlin/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBerlin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bielefeld - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bielefeld/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBielefeld\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bochum - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bochum/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBochum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bonn - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bonn/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBonn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Braunschweig - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/braunschweig/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBraunschweig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bremen - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bremen/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBremen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Chemnitz - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/chemnitz/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eChemnitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Darmstadt - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/darmstadt/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDarmstadt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Dortmund - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/dortmund/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDortmund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Dresden - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/dresden/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDresden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Düsseldorf - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/duesseldorf/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDüsseldorf\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Duisburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/duisburg/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDuisburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Erfurt - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/erfurt/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErfurt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Essen - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/essen/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEssen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Frankfurt am Main - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/frankfurt-am-main/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt am Main\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Frankfurt an der Oder - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/frankfurt-an-der-oder/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt an der Oder\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"Hamburg - 12\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/it/it-sicherheit\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHamburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Hannover - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/hannover\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHannover\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Heidelberg - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/heidelberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHeidelberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Karlsruhe - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/karlsruhe\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKarlsruhe\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Kassel - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/kassel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKassel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Kiel - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/kiel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKiel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Knittlingen - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/knittlingen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKnittlingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Köln - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/koeln\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKöln\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Lausitz - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/lausitz\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLausitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Leipzig - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/leipzig\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLeipzig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Magdeburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/magdeburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMagdeburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mannheim - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/mannheim\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMannheim\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mecklenburg-Vorpommern - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/mecklenburg-vorpommern\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMecklenburg-Vorpommern\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"München - 36\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/muenchen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünchen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e36\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Münster - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/muenster\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünster\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Neubrandenburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/neubrandenburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNeubrandenburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Nürnberg - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/nuernberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNürnberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Paderborn - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/paderborn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePaderborn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Potsdam - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/potsdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePotsdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Regensburg - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/regensburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRegensburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Rostock - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/rostock\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRostock\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Saarbrücken - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/saarbruecken\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSaarbrücken\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Schwerin - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/schwerin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSchwerin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Stralsund - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/stralsund\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStralsund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Stuttgart - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/stuttgart\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStuttgart\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Trier - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/trier\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTrier\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Ulm - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/ulm\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUlm\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Wiesbaden - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/wiesbaden\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWiesbaden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Würzburg - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/wuerzburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWürzburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Wuppertal - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/wuppertal\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWuppertal\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVeranstaltungsort nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e148\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link is-expanded\" data-target=\"filter--regions\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eWeniger\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMethode\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Präsenzkurs - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/praesenzkurs/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePräsenzkurs\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Inhouse - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/inhouse/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInhouse\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Live Online - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/live-online/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLive Online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eStartdatum\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"hat ein Startdatum - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/startdatum-bekannt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ehat ein Startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"April 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/april-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eApril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mai 2024 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/mai-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMai 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juni 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/juni-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuni 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juli 2024 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/juli-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuli 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"August 2024 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/august-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugust 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"September 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/september-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSeptember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Oktober 2024 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/oktober-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOktober 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"November 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/november-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNovember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dezember 2024 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/dezember-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDezember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartdatum unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDauer\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 Tag - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/1-Tag/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 Tag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 bis 3 Tage - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/2-3-Tage/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 bis 3 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 bis 10 Tage - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/4-10-Tage/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 bis 10 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDauer unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTageszeit\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Tagsüber - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTagsüber\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Am Abend - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-abend/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Abend\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Unter der Woche - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/unter-der-woche/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUnter der Woche\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Am Wochenende - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-wochenende/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Wochenende\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Samstag - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/samstag/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSamstag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTageszeit nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--moments\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMaximale Teilnehmerzahl\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 bis 10 Teilnehmer - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/6-bis-10-teilnehmer/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 bis 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mehr als 10 Teilnehmer - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/10-plus-teilnehmer/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMehr als 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTeilnehmerzahl unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eAnbieter\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"GFU Cyrus AG - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/gfu-cyrus/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGFU Cyrus AG\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"PROKODA GmbH - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/prokoda/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePROKODA GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Fast Lane Institute for Knowledge Transfer GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fast-lane-institute-for-knowledge-transfer-gmbh-2/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFast Lane Institute for Knowledge Transfer GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IFM Institut für Managementberatung GmbH - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/institut-fur-managementberatung/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIFM Institut für Managementberatung GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"PROTRANET GmbH - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/protranet-institut-2/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePROTRANET GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IT-Trainings - Dipl.-Ing. Thorsten Kebel - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/computer-systeme-dipl-ing-thorsten-kebel/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIT-Trainings - Dipl.-Ing. Thorsten Kebel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SYMPLASSON Informationstechnik GmbH - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/symplasson/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSYMPLASSON Informationstechnik GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"TÜV NORD Akademie GmbH \u0026amp; Co. KG - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tuev-nord-akademi/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTÜV NORD Akademie GmbH \u0026amp; Co. KG\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eBesondere Gruppierung\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Sofort Buchbar - 14\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSofort Buchbar\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Staatliche Zentralstelle für Fernunterricht (ZFU) - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg/staatliche-zentralstelle-fuer-fernunterricht-zfu\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStaatliche Zentralstelle für Fernunterricht (ZFU)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section usp-box\"\u003e\u003ch3\u003eMehr lernen? Weiterbildung beginnt auf Springest.de\u003c/h3\u003e\u003cul class=\"usp-list--colored usp-list--default\"\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"school\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAlles zum Lernen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 53.000 Weiterbildungen, Kurse, Seminare und E-Learnings.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"phone\"\u003e\u003ch4 class=\"usp-list__title\"\u003eHilfe beim Suchen und Buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eStellen Sie eine Frage, nutzen Sie unseren \u003ca href='https://springestsupport.freshdesk.com/de/support/solutions/103000218542'\u003eKundenservice\u003c/a\u003e oder rufen Sie einen unserer Bildungsberater an.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"thumb_up\"\u003e\u003ch4 class=\"usp-list__title\"\u003eKostenlos Informationen beantragen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eAlle Informationen kostenlos erhalten, vergleichen und mit Ihren Kollegen oder Vorgesetzten besprechen.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"star\"\u003e\u003ch4 class=\"usp-list__title\"\u003eBewertungen und Teilnehmer\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 10.000 unabhängige Bewertungen helfen Ihnen, den besten Bildungsanbieter zu finden.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"business\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAuch für Ihre Organisation\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eGruppenrabatt, Inhouse Schulung und Social Learning mit Kollegen: Jederzeit verfügbar.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"event_available\"\u003e\u003ch4 class=\"usp-list__title\"\u003eSofort buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eSofort anfangen? Buchen Sie und der Bildungsanbieter hilft Ihnen weiter.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003ch3 class=\"panel__content-title\"\u003e\u003cspan\u003e8\u003c/span\u003e Fragen zu Automation und ICT/IT\u003c/h3\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich möchte Microsoft Office / Excel / Outlook erlernen \" href=\"/fragen-antworten/ich-moechte-microsoft-office-excel-outlook-erlernen\"\u003eIch möchte Microsoft Office / Excel / Outlook erlernen \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \" href=\"/fragen-antworten/ich-suche-einen-programmier-grundkurs-c-java-oder-php-welche-weiterbildungen-gibt-es\"\u003eIch suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Gibt es ein passendes SAP Seminar?\" href=\"/fragen-antworten/seminar-sap-gesucht\"\u003eGibt es ein passendes SAP Seminar?\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym (1 Kommentar(e))\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/fragen/it\"\u003eFragen zur Kategorie Automation und ICT/IT ansehen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eWeiterbildungstrends\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"IT-Sicherheit\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e181\u003c/strong\u003e Kurse\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e51\u003c/strong\u003e Anbieter\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003cstrong class=\"count\"\u003e12\u003c/strong\u003e Bewertungen\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e7.4\u003c/strong\u003e Bewertung \u003cspan class=\"meta-info\"\u003e(durchschnittlich)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 1,00 - € 4.380,00\u003c/strong\u003e Preisklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-29T11:22:26.935Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":1,"filter_types":["regions"],"filters":["hamburg"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original","funnel_ab_050":true}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-29T11:22:26.935Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":1,"filter_types":["regions"],"filters":["hamburg"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original","funnel_ab_050":true}}],"filters":"/hamburg"}