{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-business\"\u003e\u003ci class=\"ma-business material-icons icon--medium\"\u003ebusiness\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eAuch für Ihr Unternehmen\u003c/h3\u003e\u003cp\u003eVolumenrabatt, Inhouse-Seminare, soziales Lernen mit Ihren Kollegen und immer neue Einsichten.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e182 IT-Sicherheit Seminare (Seite 7)\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eVerwandte Themen: \u003ca title=\"58 IT-Management \u0026amp; Strategie Kurse\" href=\"/it/it-management-strategie\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" href=\"/it/itberater\"\u003eIT-Berater\u003c/a\u003e, \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" href=\"/it/hacking\"\u003eHacking\u003c/a\u003e, \u003ca title=\"3 Cisco Network Security Kurse\" href=\"/it/cisco network security\"\u003eCisco Network Security\u003c/a\u003e, \u003ca title=\"41 Ethical Hacking Kurse und Seminare\" href=\"/it/ethical-hacking\"\u003eEthical Hacking\u003c/a\u003e und \u003ca title=\"22 Penetration Testing Kurse\" href=\"/it/penetration-testing\"\u003ePenetration Testing\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eVerwandte Themen: \u003ca title=\"58 IT-Management \u0026amp; Strategie Kurse\" href=\"/it/it-management-strategie\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" href=\"/it/itberater\"\u003eIT-Berater\u003c/a\u003e und \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" href=\"/it/hacking\"\u003eHacking\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e Filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sortieren\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChange sorting\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSortieren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/it/it-sicherheit\" data-link-type=\"sort\" href=\"#\"\u003eBewertungen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/preis-hoch-niedrig\" data-link-type=\"sort\" href=\"#\"\u003ePreis (hoch \u0026gt; niedrig)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/preis-niedrig-hoch\" data-link-type=\"sort\" href=\"#\"\u003ePreis (niedrig \u0026gt; hoch)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/dauer-lang-kurz\" data-link-type=\"sort\" href=\"#\"\u003eDauer (lang \u0026gt; kurz)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/dauer-kurz-lang\" data-link-type=\"sort\" href=\"#\"\u003eDauer (kurz \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1081361\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1081361\" id=\"training-1081361\" value=\"1081361\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity - rechtliche und technische Grundlagen\" href=\"/gfu-cyrus/cybersecurity-rechtliche-und-technische-grundlagen\"\u003eCybersecurity - rechtliche und technische Grundlagen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eAugsburg, Berlin und 45 andere Orte\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eSeminarziel In diesem zweitägigen Seminar werden den Teilnehmern die Grundzüge der durch eine ausgeprägte Vernetzung von rechtlichen und te…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.034,90 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e6,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von GFU Cyrus AG haben eine durchschnittliche Bewertung von \u003cstrong\u003e6,9\u003c/strong\u003e (aus \u003cstrong\u003e8\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/cybersecurity-rechtliche-und-technische-grundlagen/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/cybersecurity-rechtliche-und-technische-grundlagen/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1081379\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1081379\" id=\"training-1081379\" value=\"1081379\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Praktische Grundlagen der IT-Sicherheit\" href=\"/gfu-cyrus/praktische-grundlagen-der-it-sicherheit\"\u003ePraktische Grundlagen der IT-Sicherheit\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eAugsburg, Berlin und 45 andere Orte\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eSeminarziel Das Ziel des Seminars ist ein kompakter Einstieg in die IT-Sicherheit. Die Teilnehmer lernen sicher mit den wichtigsten Grundbe…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.404,20 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e1 Tag\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e6,9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von GFU Cyrus AG haben eine durchschnittliche Bewertung von \u003cstrong\u003e6,9\u003c/strong\u003e (aus \u003cstrong\u003e8\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von GFU Cyrus AG\" title=\"Logo von GFU Cyrus AG\" src=\"https://static-1.springest.com/uploads/institute/logo/5440/thumb_gfu-cyrus-4a14ba526bd7258928e99e1d96d7bcd8.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/praktische-grundlagen-der-it-sicherheit/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gfu-cyrus/praktische-grundlagen-der-it-sicherheit/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-788453\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-788453\" id=\"training-788453\" value=\"788453\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity Incident - First Response.\" href=\"/tuev-rheinland-akademie/cybersecurity-incident-first-response\"\u003eCybersecurity Incident - First Response.\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV Rheinland Akademie GmbH\" title=\"Logo von TÜV Rheinland Akademie GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/24869/thumb_tuev-rheinland-akademie-9d36d087d94db79210fd01baf4033e0b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Dienstag 25. Juni 2024\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eReagieren Unternehmensverantwortliche richtig auf einen Einbruch in das IT-System oder beim Verdacht auf eine Manipulation des Systems? Im …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.069,81 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eIn diesem Preis sind Erfrischungsgetränke, Mittagessen und Teilnehmerunterlagen enthalten.\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV Rheinland Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,2\u003c/strong\u003e (aus \u003cstrong\u003e130\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV Rheinland Akademie GmbH\" title=\"Logo von TÜV Rheinland Akademie GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/24869/thumb_tuev-rheinland-akademie-9d36d087d94db79210fd01baf4033e0b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tuev-rheinland-akademie/cybersecurity-incident-first-response/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tuev-rheinland-akademie/cybersecurity-incident-first-response/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1066891\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1066891\" id=\"training-1066891\" value=\"1066891\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cyberangriff im Unternehmen – Was tun im Ernstfall?\" href=\"/dashoefer/cyberangriff-im-unternehmen-was-tun-im-ernstfall\"\u003eCyberangriff im Unternehmen – Was tun im Ernstfall?\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Verlag Dashöfer GmbH\" title=\"Logo von Verlag Dashöfer GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/4386/thumb_dashoefer.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eDienstag 7. Mai 2024 in Webinar und 1 anderer Termin\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eUnternehmen jedweder Größe und Branche erleben tagtäglich Cyberangriffe und kriminelle Attacken, die Schäden in Milliardenhöhe verursachen …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 415,31 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eBei drei oder mehr Teilnehmern aus einer Firma erhalten der dritte und alle folgenden Teilnehmer einen Rabatt von 10 Prozent auf den Seminarpreis.\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,3 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Verlag Dashöfer GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,3\u003c/strong\u003e (aus \u003cstrong\u003e24\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Verlag Dashöfer GmbH\" title=\"Logo von Verlag Dashöfer GmbH\" src=\"https://static-1.springest.com/uploads/institute/logo/4386/thumb_dashoefer.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dashoefer/cyberangriff-im-unternehmen-was-tun-im-ernstfall/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dashoefer/cyberangriff-im-unternehmen-was-tun-im-ernstfall/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-866689\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-866689\" id=\"training-866689\" value=\"866689\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: CBROPS - Understanding Cisco Cybersecurity Operations Fundamentals\" href=\"/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals\"\u003eCBROPS - Understanding Cisco Cybersecurity Operations Fundamentals\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ExperTeach GmbH\" title=\"Logo von ExperTeach GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Montag 21. Oktober 2024 in Frankfurt\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 21. Oktober 2024\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDer Kurs vermittelt ein Verständnis der Komponenten der Netzwerkinfrastruktur, des Betriebs und der Schwachstellen der TCP/IP-Protokollsuit…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 4.754,05 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,1 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von ExperTeach GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,1\u003c/strong\u003e (aus \u003cstrong\u003e36\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ExperTeach GmbH\" title=\"Logo von ExperTeach GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1039249\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1039249\" id=\"training-1039249\" value=\"1039249\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: EC-Council Certified Cybersecurity Technician (CCT) + Exam voucher [ECCT]\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct\"\u003eEC-Council Certified Cybersecurity Technician (CCT) + Exam voucher [ECCT]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 3. Juni 2024 und 2 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This EC-Council training will prepare you for the Certified Cybersecurity Technician certification (C|CT). It is an entry-level cy…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 4.591,95 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 16 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-875000\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-875000\" id=\"training-875000\" value=\"875000\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: CompTIA Cybersecurity Analyst (CS0-002) Exam Prep Bundle + examen [COMPTIA-CYBERSEC-AN-PLUS]\" href=\"/global-knowledge-network-netherlands-b-v/e-learning-comptia-cybersecurity-analyst-cs0-001-exam-prep-bundle-examen-comptia-cybersec-an-plus\"\u003eCompTIA Cybersecurity Analyst (CS0-002) Exam Prep Bundle + examen [COMPTIA-CYBERSEC-AN-PLUS]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW CompTIA Cybersecurity Analyst (CySA+) is an IT workforce certification that applies behavioral analytics to networks and devices t…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 785,29 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/e-learning-comptia-cybersecurity-analyst-cs0-001-exam-prep-bundle-examen-comptia-cybersec-an-plus/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/e-learning-comptia-cybersecurity-analyst-cs0-001-exam-prep-bundle-examen-comptia-cybersec-an-plus/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077943\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077943\" id=\"training-1077943\" value=\"1077943\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity Compliance Framework \u0026amp; System Administration [8H121G]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-compliance-framework-system-administration-8h121g\"\u003eCybersecurity Compliance Framework \u0026amp; System Administration [8H121G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course provides the basic commands for user and server administration as it relates to security. You will need this skill to …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 568,70 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-compliance-framework-system-administration-8h121g/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-compliance-framework-system-administration-8h121g/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1078758\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1078758\" id=\"training-1078758\" value=\"1078758\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity für Steuer- und Wirtschaftsprüfungskanzleien - Gefahren durch Cyberangriffe und Wege zur Prävention\" href=\"/nwb-verlag-gmbh-co-kg/cybersecurity-fur-steuer-und-wirtschaftsprufungskanzleien-gefahren-durch-cyberangriffe-und-wege-zur-pravention-2\"\u003eCybersecurity für Steuer- und Wirtschaftsprüfungskanzleien - Gefahren durch Cyberangriffe und Wege zur Prävention\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von NWB Akademie - NWB Verlag GmbH \u0026amp; Co. KG\" title=\"Logo von NWB Akademie - NWB Verlag GmbH \u0026amp; Co. KG\" src=\"https://static-1.springest.com/uploads/institute/logo/22347/thumb_nwb-verlag-gmbh-co-kg-d18603e29cf2ff2336dd537b26b8fa04.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMontag 30. September 2024 in Online und 1 anderer Termin\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Digitalisierung schreitet schneller voran denn je. Spätestens seit der Pandemie ist mobiles Arbeiten an vielen Stellen zum Alltag gewor…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 232,05 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von NWB Akademie - NWB Verlag GmbH \u0026amp; Co. KG haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,5\u003c/strong\u003e (aus \u003cstrong\u003e46\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von NWB Akademie - NWB Verlag GmbH \u0026amp; Co. KG\" title=\"Logo von NWB Akademie - NWB Verlag GmbH \u0026amp; Co. KG\" src=\"https://static-1.springest.com/uploads/institute/logo/22347/thumb_nwb-verlag-gmbh-co-kg-d18603e29cf2ff2336dd537b26b8fa04.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/nwb-verlag-gmbh-co-kg/cybersecurity-fur-steuer-und-wirtschaftsprufungskanzleien-gefahren-durch-cyberangriffe-und-wege-zur-pravention-2/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/nwb-verlag-gmbh-co-kg/cybersecurity-fur-steuer-und-wirtschaftsprufungskanzleien-gefahren-durch-cyberangriffe-und-wege-zur-pravention-2/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-663237\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-663237\" id=\"training-663237\" value=\"663237\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Sicherheit in vernetzten Systemen\" href=\"/integrata-ag/sicherheit-in-vernetzten-systemen\"\u003eSicherheit in vernetzten Systemen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Cegos Integrata GmbH\" title=\"Logo von Cegos Integrata GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMontag 22. April 2024 in München und 4 andere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eIT-Sicherheit und aktuelle Risikobewertung Grundbegriffe Vielfalt der Bedrohungen Risiko-Analyse/-Management Sicherheitskonzepte Security S…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.130,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Cegos Integrata GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,5\u003c/strong\u003e (aus \u003cstrong\u003e42\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Cegos Integrata GmbH\" title=\"Logo von Cegos Integrata GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/integrata-ag/sicherheit-in-vernetzten-systemen/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/integrata-ag/sicherheit-in-vernetzten-systemen/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-663240\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-663240\" id=\"training-663240\" value=\"663240\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Risikoanalyse in der IT-Sicherheit\" href=\"/integrata-ag/risikoanalyse-in-der-it-sicherheit\"\u003eRisikoanalyse in der IT-Sicherheit\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Cegos Integrata GmbH\" title=\"Logo von Cegos Integrata GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e1 Termin mit garantierter Durchführung\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eDonnerstag 15. August 2024 in online Training und 2 andere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eEinführung \u0026amp; Definitionen: Risiko-Begriff ISO/IEC 73 Quantitative vs. qualitative Risikoanalysen Standards: BS 7799-3/ISO 27005 Die Rolle v…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.654,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Cegos Integrata GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,5\u003c/strong\u003e (aus \u003cstrong\u003e42\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Cegos Integrata GmbH\" title=\"Logo von Cegos Integrata GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/integrata-ag/risikoanalyse-in-der-it-sicherheit/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/integrata-ag/risikoanalyse-in-der-it-sicherheit/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1038878\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1038878\" id=\"training-1038878\" value=\"1038878\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT-Sicherheit: (Anti-) Hacking für Admins - Angriffe erkennen und Schutzmaßnahmen verstärken\" href=\"/symplasson/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken\"\u003eIT-Sicherheit: (Anti-) Hacking für Admins - Angriffe erkennen und Schutzmaßnahmen verstärken\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von SYMPLASSON Informationstechnik GmbH\" title=\"Logo von SYMPLASSON Informationstechnik GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 22. April 2024 und 4 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Häufigkeit von Cyberangriffen auf Unternehmensdaten aus dem Internet, insbesondere direkt auch aus dem internen Computernetzwerk nimmt …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.130,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von SYMPLASSON Informationstechnik GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,4\u003c/strong\u003e (aus \u003cstrong\u003e15\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von SYMPLASSON Informationstechnik GmbH\" title=\"Logo von SYMPLASSON Informationstechnik GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/symplasson/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/symplasson/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1043317\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1043317\" id=\"training-1043317\" value=\"1043317\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Inhouse: IT-Sicherheit: (Anti-) Hacking für Admins - Angriffe erkennen und Schutzmaßnahmen verstärken (Inhouse)\" href=\"/symplasson/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken-inhouse\"\u003eIT-Sicherheit: (Anti-) Hacking für Admins - Angriffe erkennen und Schutzmaßnahmen verstärken (Inhouse)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von SYMPLASSON Informationstechnik GmbH\" title=\"Logo von SYMPLASSON Informationstechnik GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eHamburg\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Häufigkeit von Cyberangriffen auf Unternehmensdaten aus dem Internet, insbesondere direkt auch aus dem internen Computernetzwerk nimmt …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eInhouse\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von SYMPLASSON Informationstechnik GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,4\u003c/strong\u003e (aus \u003cstrong\u003e15\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von SYMPLASSON Informationstechnik GmbH\" title=\"Logo von SYMPLASSON Informationstechnik GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077942\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077942\" id=\"training-1077942\" value=\"1077942\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity Roles, Processes \u0026amp; Operating System Security [8H111G]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g\"\u003eCybersecurity Roles, Processes \u0026amp; Operating System Security [8H111G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course provides information about cybersecurity people, processes, and technology. You will learn the key cybersecurity roles…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 423,50 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-665998\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-665998\" id=\"training-665998\" value=\"665998\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: CompTIA CySA+ Cybersecurity Analyst [GK5867]\" href=\"/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867\"\u003eCompTIA CySA+ Cybersecurity Analyst [GK5867]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 13. Mai 2024 und 3 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and re…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.381,95 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 16 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list is-centered\"\u003e\u003cli class=\"pagination__item--prev\"\u003e\u003ca title=\"Zurück\" class=\"pagination__button button--link\" data-link-type=\"pagination\" rel=\"prev\" href=\"/it/it-sicherheit/6\"\u003e\u003ci class=\"ma-chevron_left material-icons icon--small\"\u003echevron_left\u003c/i\u003e Zurück\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 1\" href=\"/it/it-sicherheit\"\u003e1\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 2\" href=\"/it/it-sicherheit/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 3\" href=\"/it/it-sicherheit/3\"\u003e3\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 4\" href=\"/it/it-sicherheit/4\"\u003e4\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 5\" href=\"/it/it-sicherheit/5\"\u003e5\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 6\" href=\"/it/it-sicherheit/6\"\u003e6\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e7\u003cspan class=\"pagination__max-pages\"\u003e von 13\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 8\" href=\"/it/it-sicherheit/8\"\u003e8\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 9\" href=\"/it/it-sicherheit/9\"\u003e9\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 10\" href=\"/it/it-sicherheit/10\"\u003e10\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 11\" href=\"/it/it-sicherheit/11\"\u003e11\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 12\" href=\"/it/it-sicherheit/12\"\u003e12\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 13\" href=\"/it/it-sicherheit/13\"\u003e13\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Weiter\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/it/it-sicherheit/8\"\u003eWeiter \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity Incident - First Response.\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/24869/thumb_tuev-rheinland-akademie-9d36d087d94db79210fd01baf4033e0b.png\",\"description\":\"Reagieren Unternehmensverantwortliche richtig auf einen Einbruch in das IT-System oder beim Verdacht auf eine Manipulation des Systems? Im Vordergrund des Seminars steht die Informat\\u0026amp;hellip;\",\"startDate\":\"2024-06-25\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Virtual Classroom extern K950S31185N2411360\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuev-rheinland-akademie/cybersecurity-incident-first-response\",\"price\":\"899.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-02-29\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuev-rheinland-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/tuev-rheinland-akademie\",\"name\":\"TÜV Rheinland Akademie GmbH\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/24869/thumb_tuev-rheinland-akademie-9d36d087d94db79210fd01baf4033e0b.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cyberangriff im Unternehmen – Was tun im Ernstfall?\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/4386/thumb_dashoefer.png\",\"description\":\"Unternehmen jedweder Größe und Branche erleben tagtäglich Cyberangriffe und kriminelle Attacken, die Schäden in Milliardenhöhe verursachen – dabei hat auch die Pandemie und damit ver\\u0026amp;hellip;\",\"startDate\":\"2024-05-07\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Webinar\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/dashoefer/cyberangriff-im-unternehmen-was-tun-im-ernstfall\",\"price\":\"349.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-07-11\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/dashoefer#EducationalOrganization\",\"url\":\"https://www.springest.de/dashoefer\",\"name\":\"Verlag Dashöfer GmbH\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/4386/thumb_dashoefer.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"CBROPS - Understanding Cisco Cybersecurity Operations Fundamentals\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\",\"description\":\"Der Kurs vermittelt ein Verständnis der Komponenten der Netzwerkinfrastruktur, des Betriebs und der Schwachstellen der TCP/IP-Protokollsuite (Transmission Control Protocol/Internet P\\u0026amp;hellip;\",\"startDate\":\"2024-10-21\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Frankfurt\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"50.110922\",\"longitude\":\"8.682127\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals\",\"price\":\"3995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-29\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/experteach-gmbh#EducationalOrganization\",\"url\":\"https://www.springest.de/experteach-gmbh\",\"name\":\"ExperTeach GmbH\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"EC-Council Certified Cybersecurity Technician (CCT) + Exam voucher [ECCT]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW This EC-Council training will prepare you for the Certified Cybersecurity Technician certification (C|CT). It is an entry-level cybersecurity program created by EC-Council, \\u0026amp;hellip;\",\"startDate\":\"2024-06-03\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct\",\"price\":\"3795.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-10-30\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity für Steuer- und Wirtschaftsprüfungskanzleien - Gefahren durch Cyberangriffe und Wege zur Prävention\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/22347/thumb_nwb-verlag-gmbh-co-kg-d18603e29cf2ff2336dd537b26b8fa04.png\",\"description\":\"Die Digitalisierung schreitet schneller voran denn je. Spätestens seit der Pandemie ist mobiles Arbeiten an vielen Stellen zum Alltag geworden und Aktenschränke wurden in Rekordzeit \\u0026amp;hellip;\",\"startDate\":\"2024-09-30\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Online\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"37.688331\",\"longitude\":\"-95.460253\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/nwb-verlag-gmbh-co-kg/cybersecurity-fur-steuer-und-wirtschaftsprufungskanzleien-gefahren-durch-cyberangriffe-und-wege-zur-pravention-2\",\"price\":\"195.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-07-29\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/nwb-verlag-gmbh-co-kg#EducationalOrganization\",\"url\":\"https://www.springest.de/nwb-verlag-gmbh-co-kg\",\"name\":\"NWB Akademie - NWB Verlag GmbH \\u0026 Co. KG\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/22347/thumb_nwb-verlag-gmbh-co-kg-d18603e29cf2ff2336dd537b26b8fa04.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Sicherheit in vernetzten Systemen\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\",\"description\":\"IT-Sicherheit und aktuelle Risikobewertung Grundbegriffe Vielfalt der Bedrohungen Risiko-Analyse/-Management Sicherheitskonzepte Security Scanner Business Contingency/Disaster Recove\\u0026amp;hellip;\",\"startDate\":\"2024-04-22\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"München\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"48.135125\",\"longitude\":\"11.581981\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/integrata-ag/sicherheit-in-vernetzten-systemen\",\"price\":\"1790.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-19\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/integrata-ag#EducationalOrganization\",\"url\":\"https://www.springest.de/integrata-ag\",\"name\":\"Cegos Integrata GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Risikoanalyse in der IT-Sicherheit\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\",\"description\":\"Einführung \\u0026amp; Definitionen: Risiko-Begriff ISO/IEC 73 Quantitative vs. qualitative Risikoanalysen Standards: BS 7799-3/ISO 27005 Die Rolle von Risikoanalysen im Rahmen von ISO 17799/2\\u0026amp;hellip;\",\"startDate\":\"2024-08-15\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"online Training\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"26.652013\",\"longitude\":\"-80.081947\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/integrata-ag/risikoanalyse-in-der-it-sicherheit\",\"price\":\"1390.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-19\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/integrata-ag#EducationalOrganization\",\"url\":\"https://www.springest.de/integrata-ag\",\"name\":\"Cegos Integrata GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/22700/thumb_integrata-ag-e6cdf6086291f8a1407cc24c92f98cfd.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"IT-Sicherheit: (Anti-) Hacking für Admins - Angriffe erkennen und Schutzmaßnahmen verstärken\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\",\"description\":\"Die Häufigkeit von Cyberangriffen auf Unternehmensdaten aus dem Internet, insbesondere direkt auch aus dem internen Computernetzwerk nimmt aufgrund der weltweiten, wirtschaftlichen u\\u0026amp;hellip;\",\"startDate\":\"2024-04-22\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/symplasson/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken\",\"price\":\"1790.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-19\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/symplasson#EducationalOrganization\",\"url\":\"https://www.springest.de/symplasson\",\"name\":\"SYMPLASSON Informationstechnik GmbH\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/13276/thumb_symplasson-b22c99ca71d5b41e19fe870dee8bb930.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"CompTIA CySA+ Cybersecurity Analyst [GK5867]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitori\\u0026amp;hellip;\",\"startDate\":\"2024-05-13\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867\",\"price\":\"2795.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-21\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAdd filters\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eBeliebte Kurse\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Garantierte Durchführung - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/garantierte-durchfuehrung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGarantierte Durchführung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePreis\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Kostenlos - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/kostenlos\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKostenlos\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 0 bis € 500 - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/0-500\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 0 bis € 500\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 500 bis € 1.000 - 22\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/500-1000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 500 bis € 1.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e22\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 1.000 bis € 2.000 - 35\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/1000-2000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 bis € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e35\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 2.000 bis € 4.000 - 55\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 bis € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e55\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 4.000 und teurer - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/4000-teurer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 4.000 und teurer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePreis unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e34\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--price\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eRegion\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Augsburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/augsburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugsburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Berlin - 16\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/berlin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBerlin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bielefeld - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bielefeld\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBielefeld\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bochum - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bochum\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBochum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bonn - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bonn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBonn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Braunschweig - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/braunschweig\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBraunschweig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bremen - 9\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bremen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBremen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Chemnitz - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/chemnitz\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eChemnitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Darmstadt - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/darmstadt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDarmstadt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dortmund - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/dortmund\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDortmund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dresden - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/dresden\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDresden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Düsseldorf - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/duesseldorf\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDüsseldorf\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Duisburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/duisburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDuisburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Erfurt - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/erfurt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErfurt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Essen - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/essen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEssen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Frankfurt am Main - 19\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/frankfurt-am-main\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt am Main\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Frankfurt an der Oder - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/frankfurt-an-der-oder\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt an der Oder\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Hamburg - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHamburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Hannover - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/hannover\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHannover\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Heidelberg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/heidelberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHeidelberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Karlsruhe - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/karlsruhe\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKarlsruhe\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Kassel - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/kassel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKassel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Kiel - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/kiel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKiel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Knittlingen - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/knittlingen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKnittlingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Köln - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/koeln\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKöln\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Lausitz - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/lausitz\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLausitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Leipzig - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/leipzig\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLeipzig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Magdeburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/magdeburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMagdeburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mannheim - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/mannheim\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMannheim\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mecklenburg-Vorpommern - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/mecklenburg-vorpommern\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMecklenburg-Vorpommern\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"München - 37\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/muenchen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünchen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e37\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Münster - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/muenster\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünster\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Neubrandenburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/neubrandenburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNeubrandenburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Nürnberg - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/nuernberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNürnberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Paderborn - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/paderborn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePaderborn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Potsdam - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/potsdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePotsdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Regensburg - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/regensburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRegensburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Rostock - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/rostock\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRostock\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Saarbrücken - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/saarbruecken\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSaarbrücken\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Schwerin - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/schwerin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSchwerin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stralsund - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/stralsund\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStralsund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stuttgart - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/stuttgart\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStuttgart\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Trier - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/trier\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTrier\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Ulm - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/ulm\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUlm\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Wiesbaden - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/wiesbaden\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWiesbaden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Würzburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/wuerzburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWürzburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Wuppertal - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/wuppertal\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWuppertal\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVeranstaltungsort nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e149\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--regions\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eNiveau\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Für Anfänger - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fuer-anfaenger\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFür Anfänger\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Für Fortgeschrittene - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fuer-fortgeschrittene\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFür Fortgeschrittene\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Studien - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/studien\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStudien\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Umschulungen - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/umschulungen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUmschulungen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiveau unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e163\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--meta_levels\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMethode\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Präsenzkurs - 122\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/praesenzkurs\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePräsenzkurs\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e122\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Live Online - 58\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/live-online\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLive Online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e58\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Learning - 38\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/e-learning\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e38\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Tagung/Kongress - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagung-kongress\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTagung/Kongress\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Inhouse - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/inhouse\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInhouse\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Fernstudium - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/fernstudium\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFernstudium\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--location\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eStartdatum\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"hat ein Startdatum - 100\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/startdatum-bekannt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ehat ein Startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e100\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"März 2024 - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/maerz-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMärz 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"April 2024 - 56\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/april-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eApril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e56\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mai 2024 - 61\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/mai-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMai 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e61\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juni 2024 - 66\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/juni-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuni 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e66\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juli 2024 - 26\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/juli-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuli 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e26\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"August 2024 - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/august-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugust 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"September 2024 - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/september-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSeptember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Oktober 2024 - 30\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/oktober-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOktober 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e30\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"November 2024 - 32\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/november-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNovember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e32\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dezember 2024 - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/dezember-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDezember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Januar 2025 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/januar-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJanuar 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Februar 2025 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/februar-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFebruar 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"März 2025 und später - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/maerz-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMärz 2025 und später\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartdatum unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e82\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDauer\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 Tag - 49\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/1-Tag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 Tag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e49\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 bis 3 Tage - 53\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/2-3-Tage\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 bis 3 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e53\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 bis 10 Tage - 36\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/4-10-Tage\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 bis 10 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e36\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"10 Tage bis 1 Jahr - 37\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/10-365-Tage\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e10 Tage bis 1 Jahr\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e37\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"1 Jahr und länger - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/365-Tage-und-laenger\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 Jahr und länger\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDauer unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--duration_days\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTageszeit\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Tagsüber - 56\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTagsüber\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e56\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Unter der Woche - 22\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/unter-der-woche\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUnter der Woche\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e22\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Am Abend - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-abend\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Abend\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Am Wochenende - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-wochenende\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Wochenende\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Nachmittags - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/nachmittags\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNachmittags\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Samstag - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/samstag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSamstag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Am Morgen - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-morgen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Morgen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Sonntag - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/sonntag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSonntag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTageszeit nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e126\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--moments\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMaximale Teilnehmerzahl\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 bis 10 Teilnehmer - 31\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/6-bis-10-teilnehmer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 bis 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e31\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mehr als 10 Teilnehmer - 88\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/10-plus-teilnehmer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMehr als 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e88\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTeilnehmerzahl unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e63\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eSprache\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Deutsch - 139\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/de\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDeutsch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e139\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Niederländisch - 17\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/nl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiederländisch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Englisch - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/en\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEnglisch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSprache unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eAnbieter\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"COMCAVE.COLLEGE GmbH - 28\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/comcave-college-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCOMCAVE.COLLEGE GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e28\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Software \u0026amp; Support Media GmbH - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/software-support-media-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSoftware \u0026amp; Support Media GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"PROKODA GmbH - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/prokoda\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePROKODA GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Global Knowledge Network Netherlands B.V. - 14\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/global-knowledge-network-netherlands-b-v\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Network Netherlands B.V.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Coursera (CC) - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/coursera\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCoursera (CC)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Fast Lane Institute for Knowledge Transfer GmbH - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fast-lane-institute-for-knowledge-transfer-gmbh-2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFast Lane Institute for Knowledge Transfer GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"TÜV SÜD Akademie GmbH - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tuevsued-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTÜV SÜD Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"TÜV Rheinland Akademie GmbH - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tuev-rheinland-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTÜV Rheinland Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"GFU Cyrus AG - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/gfu-cyrus\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGFU Cyrus AG\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Sicher-Gebildet.de - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/sicher-gebildet-de\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSicher-Gebildet.de\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"alfatraining Bildungszentrum GmbH - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/alfatraining-bildungszentrum-e-k\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ealfatraining Bildungszentrum GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ComConsult GmbH - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/comconsult-research-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eComConsult GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ExperTeach GmbH - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/experteach-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eExperTeach GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"DutchTrain - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/dutchtrain\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"isits AG International School of IT Security - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/isits-ag-international-school-of-it-security\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eisits AG International School of IT Security\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cegos Integrata GmbH - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/integrata-ag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCegos Integrata GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"HSB Graduate \u0026amp; Professional School - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hochschule-bremen-international-graduate-center\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHSB Graduate \u0026amp; Professional School\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Filges IT-Beratung - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/filges\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFilges IT-Beratung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IFM Institut für Managementberatung GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/institut-fur-managementberatung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIFM Institut für Managementberatung GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"TÜV Thüringen Akademie GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tuev-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTÜV Thüringen Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SYMPLASSON Informationstechnik GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/symplasson\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSYMPLASSON Informationstechnik GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SanData IT-Trainingszentrum GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/sandata-it-trainingszentrum-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSanData IT-Trainingszentrum GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Adding Value Consulting (AVC) - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/adding-value-consulting-avc\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAdding Value Consulting (AVC)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"FachTaG Akademie GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fachtag-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFachTaG Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SUAS (a company of Schouten \u0026amp; Nelissen) - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/schouten-nelissen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSUAS (a company of Schouten \u0026amp; Nelissen)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eBesondere Gruppierung\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Sofort Buchbar - 109\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSofort Buchbar\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e109\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Staatliche Zentralstelle für Fernunterricht (ZFU) - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/staatliche-zentralstelle-fuer-fernunterricht-zfu\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStaatliche Zentralstelle für Fernunterricht (ZFU)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bildungsgutschein - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bildungsgutschein\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBildungsgutschein\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"BBB - Der Bundesverband der Träger beruflicher Bildung - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bbb-der-bundesverband-der-traeger-beruflicher-bildung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBBB - Der Bundesverband der Träger beruflicher Bildung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Beliebte Kurse - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/beliebte-kurse\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBeliebte Kurse\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Zertifiziert nach DIN ISO 29990 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/zertifiziert-nach-din-iso-29990\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZertifiziert nach DIN ISO 29990\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGruppierung - nicht relevant / bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e66\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--syndicates\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section usp-box\"\u003e\u003ch3\u003eMehr lernen? Weiterbildung beginnt auf Springest.de\u003c/h3\u003e\u003cul class=\"usp-list--colored usp-list--default\"\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"school\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAlles zum Lernen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 52.000 Weiterbildungen, Kurse, Seminare und E-Learnings.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"phone\"\u003e\u003ch4 class=\"usp-list__title\"\u003eHilfe beim Suchen und Buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eStellen Sie eine Frage, nutzen Sie unseren \u003ca href='https://springestsupport.freshdesk.com/de/support/solutions/103000218542'\u003eKundenservice\u003c/a\u003e oder rufen Sie einen unserer Bildungsberater an.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"thumb_up\"\u003e\u003ch4 class=\"usp-list__title\"\u003eKostenlos Informationen beantragen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eAlle Informationen kostenlos erhalten, vergleichen und mit Ihren Kollegen oder Vorgesetzten besprechen.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"star\"\u003e\u003ch4 class=\"usp-list__title\"\u003eBewertungen und Teilnehmer\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 10.000 unabhängige Bewertungen helfen Ihnen, den besten Bildungsanbieter zu finden.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"business\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAuch für Ihre Organisation\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eGruppenrabatt, Inhouse Schulung und Social Learning mit Kollegen: Jederzeit verfügbar.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"event_available\"\u003e\u003ch4 class=\"usp-list__title\"\u003eSofort buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eSofort anfangen? Buchen Sie und der Bildungsanbieter hilft Ihnen weiter.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003ch3 class=\"panel__content-title\"\u003e\u003cspan\u003e8\u003c/span\u003e Fragen zu Automation und ICT/IT\u003c/h3\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich möchte Microsoft Office / Excel / Outlook erlernen \" href=\"/fragen-antworten/ich-moechte-microsoft-office-excel-outlook-erlernen\"\u003eIch möchte Microsoft Office / Excel / Outlook erlernen \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \" href=\"/fragen-antworten/ich-suche-einen-programmier-grundkurs-c-java-oder-php-welche-weiterbildungen-gibt-es\"\u003eIch suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Gibt es ein passendes SAP Seminar?\" href=\"/fragen-antworten/seminar-sap-gesucht\"\u003eGibt es ein passendes SAP Seminar?\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym (1 Kommentar(e))\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/fragen/it\"\u003eFragen zur Kategorie Automation und ICT/IT ansehen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eWeiterbildungstrends\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"IT-Sicherheit\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e182\u003c/strong\u003e Kurse\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e51\u003c/strong\u003e Anbieter\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003cstrong class=\"count\"\u003e12\u003c/strong\u003e Bewertungen\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e7.4\u003c/strong\u003e Bewertung \u003cspan class=\"meta-info\"\u003e(durchschnittlich)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 1,00 - € 4.380,00\u003c/strong\u003e Preisklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-19T02:31:30.144Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":7,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation","funnel_ab_050":true}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-19T02:31:30.144Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":7,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation","funnel_ab_050":true}}],"filters":""}