{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-phone\"\u003e\u003ci class=\"ma-phone material-icons icon--medium\"\u003ephone\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eHilfe beim Suchen und Buchen\u003c/h3\u003e\u003cp\u003eStellen Sie eine Frage, nutzen Sie unseren Kundenservice oder rufen Sie einen unserer Bildungsberater an.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e182 IT-Sicherheit Seminare (Seite 8)\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eVerwandte Themen: \u003ca title=\"58 IT-Management \u0026amp; Strategie Kurse\" href=\"/it/it-management-strategie\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" href=\"/it/itberater\"\u003eIT-Berater\u003c/a\u003e, \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" href=\"/it/hacking\"\u003eHacking\u003c/a\u003e, \u003ca title=\"3 Cisco Network Security Kurse\" href=\"/it/cisco network security\"\u003eCisco Network Security\u003c/a\u003e, \u003ca title=\"41 Ethical Hacking Kurse und Seminare\" href=\"/it/ethical-hacking\"\u003eEthical Hacking\u003c/a\u003e und \u003ca title=\"22 Penetration Testing Kurse\" href=\"/it/penetration-testing\"\u003ePenetration Testing\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eVerwandte Themen: \u003ca title=\"58 IT-Management \u0026amp; Strategie Kurse\" href=\"/it/it-management-strategie\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" href=\"/it/itberater\"\u003eIT-Berater\u003c/a\u003e und \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" href=\"/it/hacking\"\u003eHacking\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e Filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sortieren\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChange sorting\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSortieren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/it/it-sicherheit\" data-link-type=\"sort\" href=\"#\"\u003eBewertungen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/preis-hoch-niedrig\" data-link-type=\"sort\" href=\"#\"\u003ePreis (hoch \u0026gt; niedrig)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/preis-niedrig-hoch\" data-link-type=\"sort\" href=\"#\"\u003ePreis (niedrig \u0026gt; hoch)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/dauer-lang-kurz\" data-link-type=\"sort\" href=\"#\"\u003eDauer (lang \u0026gt; kurz)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/dauer-kurz-lang\" data-link-type=\"sort\" href=\"#\"\u003eDauer (kurz \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-866689\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-866689\" id=\"training-866689\" value=\"866689\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: CBROPS - Understanding Cisco Cybersecurity Operations Fundamentals\" href=\"/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals\"\u003eCBROPS - Understanding Cisco Cybersecurity Operations Fundamentals\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ExperTeach GmbH\" title=\"Logo von ExperTeach GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Montag 21. Oktober 2024 in Frankfurt\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 21. Oktober 2024\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDer Kurs vermittelt ein Verständnis der Komponenten der Netzwerkinfrastruktur, des Betriebs und der Schwachstellen der TCP/IP-Protokollsuit…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 4.754,05 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,1 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von ExperTeach GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,1\u003c/strong\u003e (aus \u003cstrong\u003e36\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ExperTeach GmbH\" title=\"Logo von ExperTeach GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-785680\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-785680\" id=\"training-785680\" value=\"785680\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\" href=\"/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\"\u003eUnderstanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e2 Termine mit garantierter Durchführung\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Montag 8. April 2024 in Nieuwegein (Iepenhoeve 5) und 1 weiterer Termin\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 8. April 2024 und 2 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.623,95 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 16 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-665998\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-665998\" id=\"training-665998\" value=\"665998\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: CompTIA CySA+ Cybersecurity Analyst [GK5867]\" href=\"/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867\"\u003eCompTIA CySA+ Cybersecurity Analyst [GK5867]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 13. Mai 2024 und 3 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and re…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.381,95 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 16 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-691132\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-691132\" id=\"training-691132\" value=\"691132\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity - IT-Sicherheit für Medizinprodukte\" href=\"/tuevsued-akademie/cybersecurity-it-sicherheit-fuer-medizinprodukte\"\u003eCybersecurity - IT-Sicherheit für Medizinprodukte\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Dienstag 19. März 2024 in München und 2 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Freitag 3. Mai 2024 und 3 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003e*Begriffe und regulatorische Anforderungen im Bereich Cybersicherheit: MDR, FDA *Normative Anforderungen und Quellen: AAMI TIR 57, IEC TR 6…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 903,21 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 20 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e8 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV SÜD Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,6\u003c/strong\u003e (aus \u003cstrong\u003e109\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1013482\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1013482\" id=\"training-1013482\" value=\"1013482\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Automotive Cybersecurity Level 2 (Professional) nach ISO / SAE 21434\" href=\"/tuevsued-akademie/automotive-cybersecurity-level-2-professional-nach-iso-sae-21434\"\u003eAutomotive Cybersecurity Level 2 (Professional) nach ISO / SAE 21434\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Mittwoch 27. März 2024 und 4 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Montag 29. April 2024 in München und 4 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003e*Vermittelt Kenntnisse hinsichtlich der Umsetzung der ISO/SAE 21434, mit Schwerpunkt auf dem Cybersecurity-Lebenszyklus: #Standards und Vor…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.130,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 20 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e16 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV SÜD Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,6\u003c/strong\u003e (aus \u003cstrong\u003e109\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1039251\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1039251\" id=\"training-1039251\" value=\"1039251\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: EC-Council ICS/SCADA Cybersecurity + Exam voucher [EICS-SCADA]\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada\"\u003eEC-Council ICS/SCADA Cybersecurity + Exam voucher [EICS-SCADA]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Mittwoch 22. Mai 2024 und 3 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network ar…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.018,95 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 16 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1006327\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1006327\" id=\"training-1006327\" value=\"1006327\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Industrial Cybersecurity Professional (Level 2)\" href=\"/tuevsued-akademie/industrial-cybersecurity-professional-level-2\"\u003eIndustrial Cybersecurity Professional (Level 2)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Mittwoch 27. März 2024 und 3 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Montag 29. April 2024 in München und 3 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003e* Sicherer Produktentwicklungslebenszyklus für IoT- und IACS Systeme (Schwerpunkt 62443-4-1, 62443-4-2) * Sicherheitsmanagement * Sicherhei…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.170,56 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 20 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e18 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV SÜD Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,6\u003c/strong\u003e (aus \u003cstrong\u003e109\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-883137\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-883137\" id=\"training-883137\" value=\"883137\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Automotive Cybersecurity Level 1 nach ISO/SAE 21434\" href=\"/tuevsued-akademie/automotive-cyber-security-foundation\"\u003eAutomotive Cybersecurity Level 1 nach ISO/SAE 21434\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Dienstag 2. April 2024 in Filderstadt und 3 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Dienstag 7. Mai 2024 und 4 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003e*Einführung und Transformation der Mobilität *Herausforderungen im Automobilbereich *Grundlagen der Cybersecurity *Grundlagen der Automotiv…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.295,51 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 20 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e16 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV SÜD Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,6\u003c/strong\u003e (aus \u003cstrong\u003e109\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1034986\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1034986\" id=\"training-1034986\" value=\"1034986\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Automotive Cybersecurity for ISO 26262\" href=\"/tuevsued-akademie/automotive-cybersecurity-for-iso-26262\"\u003eAutomotive Cybersecurity for ISO 26262\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 17. Juni 2024 und 1 weiterer Termin\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003e* Unterschiede zwischen ISO 21434 und ISO 26262 * Item Definition nach beiden Standards * HARA vs. TARA * Assurance Level vs. ASIL * Validi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 940,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 20 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e8 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV SÜD Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,6\u003c/strong\u003e (aus \u003cstrong\u003e109\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077931\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077931\" id=\"training-1077931\" value=\"1077931\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity-Awareness Koordinator - TÜV\" href=\"/tuevsued-akademie/cybersecurity-awareness-koordinator-tuev\"\u003eCybersecurity-Awareness Koordinator - TÜV\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Dienstag 4. Juni 2024 und 2 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDer Kurs Cybersecurity Awareness Koordinator - TÜV vermittelt den Teilnehmenden alle notwendigen Kenntnisse und Fähigkeiten, um Mitarbeiter…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.785,00 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 20 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e16 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von TÜV SÜD Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e8,6\u003c/strong\u003e (aus \u003cstrong\u003e109\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von TÜV SÜD Akademie GmbH\" title=\"Logo von TÜV SÜD Akademie GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077942\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077942\" id=\"training-1077942\" value=\"1077942\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity Roles, Processes \u0026amp; Operating System Security [8H111G]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g\"\u003eCybersecurity Roles, Processes \u0026amp; Operating System Security [8H111G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course provides information about cybersecurity people, processes, and technology. You will learn the key cybersecurity roles…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 423,50 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von Global Knowledge Network Netherlands B.V. haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,6\u003c/strong\u003e (aus \u003cstrong\u003e153\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Global Knowledge Network Netherlands B.V.\" title=\"Logo von Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-887948\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-887948\" id=\"training-887948\" value=\"887948\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/software-support-media-gmbh/it-security-camp-im-juni-2021-remote#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-2.springest.com/uploads/product_image/image/1009317/thumbnail-ISC20_Social_Media_Logo_54884_v1.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Veranstaltung: IT Security Camp im Juni 2021 | remote\" href=\"/software-support-media-gmbh/it-security-camp-im-juni-2021-remote\"\u003eIT Security Camp im Juni 2021 | remote\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Software \u0026amp; Support Media GmbH\" title=\"Logo von Software \u0026amp; Support Media GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13913/thumb_software-support-media-gmbh-fcc77c9dd71e3cb38f65b2194c1ad35c.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMünchen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/software-support-media-gmbh/it-security-camp-im-juni-2021-remote#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-2.springest.com/uploads/product_image/image/1009317/thumbnail-ISC20_Social_Media_Logo_54884_v1.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eVom 28. bis 30. Juni 2021 präsentiert die Entwickler Akademie das IT Security Camp ein weiteres Mal im Online-Format. Das Camp bietet währe…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eVeranstaltung\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 2.070,60 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Software \u0026amp; Support Media GmbH\" title=\"Logo von Software \u0026amp; Support Media GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13913/thumb_software-support-media-gmbh-fcc77c9dd71e3cb38f65b2194c1ad35c.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-71731\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-71731\" id=\"training-71731\" value=\"71731\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Fernstudium: IT-Sicherheit in Rechnersystemen und -netzwerken\" href=\"/ils/it-sicherheit-in-rechnersystemen-und-netzwerken\"\u003eIT-Sicherheit in Rechnersystemen und -netzwerken\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ILS - Institut für Lernsysteme GmbH\" title=\"Logo von ILS - Institut für Lernsysteme GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/4637/thumb_ils.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eFür wen ist dieser Lehrgang geeignet? Dieser Kurs ist ideal für Sie, wenn: Sie einen IT- oder Multimedia-Beruf ausüben und sich in dieses F…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eFernstudium\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von ILS - Institut für Lernsysteme GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e7\u003c/strong\u003e (aus \u003cstrong\u003e9\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ILS - Institut für Lernsysteme GmbH\" title=\"Logo von ILS - Institut für Lernsysteme GmbH\" src=\"https://static-2.springest.com/uploads/institute/logo/4637/thumb_ils.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/ils/it-sicherheit-in-rechnersystemen-und-netzwerken/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/ils/it-sicherheit-in-rechnersystemen-und-netzwerken/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1059174\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1059174\" id=\"training-1059174\" value=\"1059174\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/software-support-media-gmbh/it-security-camp-26-28-juni-2023-muenchen-online#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2018449/thumbnail-ISC23_Webbanner_G-551_mStoerer_v1_728x90_v1.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT Security Camp | 26. – 28. Juni 2023 | München \u0026amp; online\" href=\"/software-support-media-gmbh/it-security-camp-26-28-juni-2023-muenchen-online\"\u003eIT Security Camp | 26. – 28. Juni 2023 | München \u0026amp; online\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Software \u0026amp; Support Media GmbH\" title=\"Logo von Software \u0026amp; Support Media GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13913/thumb_software-support-media-gmbh-fcc77c9dd71e3cb38f65b2194c1ad35c.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMünchen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/software-support-media-gmbh/it-security-camp-26-28-juni-2023-muenchen-online#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2018449/thumbnail-ISC23_Webbanner_G-551_mStoerer_v1_728x90_v1.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eVom 26. – 28. Juni 2023 präsentiert die Entwickler Akademie das Intensivseminar für IT-Security. Das IT Security Camp bietet während drei W…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.854,81 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Software \u0026amp; Support Media GmbH\" title=\"Logo von Software \u0026amp; Support Media GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13913/thumb_software-support-media-gmbh-fcc77c9dd71e3cb38f65b2194c1ad35c.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/software-support-media-gmbh/it-security-camp-26-28-juni-2023-muenchen-online/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/software-support-media-gmbh/it-security-camp-26-28-juni-2023-muenchen-online/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-981029\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-981029\" id=\"training-981029\" value=\"981029\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/software-support-media-gmbh/it-security-summit-2022-16-18-mai-muenchen#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/1526791/thumbnail-ISS_MUC22_Webbanner_64926_v16.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Veranstaltung: IT Security Summit 2022 | 16. – 18. Mai, München\" href=\"/software-support-media-gmbh/it-security-summit-2022-16-18-mai-muenchen\"\u003eIT Security Summit 2022 | 16. – 18. Mai, München\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Software \u0026amp; Support Media GmbH\" title=\"Logo von Software \u0026amp; Support Media GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13913/thumb_software-support-media-gmbh-fcc77c9dd71e3cb38f65b2194c1ad35c.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMünchen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/software-support-media-gmbh/it-security-summit-2022-16-18-mai-muenchen#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/1526791/thumbnail-ISS_MUC22_Webbanner_64926_v16.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eDas große Trainingsevent bietet einen Konferenztag sowie zwei Workshoptage mit (inter-)national bekannten Trainern. Insgesamt erwarten die …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eVeranstaltung\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.805,31 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von Software \u0026amp; Support Media GmbH\" title=\"Logo von Software \u0026amp; Support Media GmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/13913/thumb_software-support-media-gmbh-fcc77c9dd71e3cb38f65b2194c1ad35c.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list is-centered\"\u003e\u003cli class=\"pagination__item--prev\"\u003e\u003ca title=\"Zurück\" class=\"pagination__button button--link\" data-link-type=\"pagination\" rel=\"prev\" href=\"/it/it-sicherheit/7\"\u003e\u003ci class=\"ma-chevron_left material-icons icon--small\"\u003echevron_left\u003c/i\u003e Zurück\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 1\" href=\"/it/it-sicherheit\"\u003e1\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 2\" href=\"/it/it-sicherheit/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 3\" href=\"/it/it-sicherheit/3\"\u003e3\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 4\" href=\"/it/it-sicherheit/4\"\u003e4\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 5\" href=\"/it/it-sicherheit/5\"\u003e5\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 6\" href=\"/it/it-sicherheit/6\"\u003e6\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 7\" href=\"/it/it-sicherheit/7\"\u003e7\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e8\u003cspan class=\"pagination__max-pages\"\u003e von 13\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 9\" href=\"/it/it-sicherheit/9\"\u003e9\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 10\" href=\"/it/it-sicherheit/10\"\u003e10\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 11\" href=\"/it/it-sicherheit/11\"\u003e11\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 12\" href=\"/it/it-sicherheit/12\"\u003e12\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 13\" href=\"/it/it-sicherheit/13\"\u003e13\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Weiter\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/it/it-sicherheit/9\"\u003eWeiter \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"CBROPS - Understanding Cisco Cybersecurity Operations Fundamentals\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\",\"description\":\"Der Kurs vermittelt ein Verständnis der Komponenten der Netzwerkinfrastruktur, des Betriebs und der Schwachstellen der TCP/IP-Protokollsuite (Transmission Control Protocol/Internet P\\u0026amp;hellip;\",\"startDate\":\"2024-10-21\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Frankfurt\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"50.110922\",\"longitude\":\"8.682127\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/experteach-gmbh/cbrops-understanding-cisco-cybersecurity-operations-fundamentals\",\"price\":\"3995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-29\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/experteach-gmbh#EducationalOrganization\",\"url\":\"https://www.springest.de/experteach-gmbh\",\"name\":\"ExperTeach GmbH\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/22592/thumb_experteach-gmbh-e5d33491dd34a0e6fe0dbbb3fa077f86.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Nieuwegein (Iepenhoeve 5)\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.048527\",\"longitude\":\"5.091026\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\",\"price\":\"2995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-21\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"CompTIA CySA+ Cybersecurity Analyst [GK5867]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW CompTIA Cybersecurity Analyst (CySA+) is a certification for cyber professionals tasked with incident detection, prevention and response through continuous security monitori\\u0026amp;hellip;\",\"startDate\":\"2024-05-13\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v/comptia-cysa-cybersecurity-analyst-gk5867\",\"price\":\"2795.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-21\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity - IT-Sicherheit für Medizinprodukte\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\",\"description\":\"*Begriffe und regulatorische Anforderungen im Bereich Cybersicherheit: MDR, FDA *Normative Anforderungen und Quellen: AAMI TIR 57, IEC TR 60601-4-5, IEC 62443, BSI-Empfehlung, IEC 81\\u0026amp;hellip;\",\"startDate\":\"2024-05-03\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Online - Virtuelles Klassenzimmer\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuevsued-akademie/cybersecurity-it-sicherheit-fuer-medizinprodukte\",\"price\":\"759.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-08-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuevsued-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/tuevsued-akademie\",\"name\":\"TÜV SÜD Akademie GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Automotive Cybersecurity Level 2 (Professional) nach ISO / SAE 21434\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\",\"description\":\"*Vermittelt Kenntnisse hinsichtlich der Umsetzung der ISO/SAE 21434, mit Schwerpunkt auf dem Cybersecurity-Lebenszyklus: #Standards und Vorschriften #Kultur \\u0026amp; Kompetenz #Automotive C\\u0026amp;hellip;\",\"startDate\":\"2024-03-27\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Online - Virtuelles Klassenzimmer\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuevsued-akademie/automotive-cybersecurity-level-2-professional-nach-iso-sae-21434\",\"price\":\"1790.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-08-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuevsued-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/tuevsued-akademie\",\"name\":\"TÜV SÜD Akademie GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"EC-Council ICS/SCADA Cybersecurity + Exam voucher [EICS-SCADA]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network architectures from attacks. Students will lea\\u0026amp;hellip;\",\"startDate\":\"2024-05-22\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada\",\"price\":\"2495.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-30\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://www.springest.de/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Industrial Cybersecurity Professional (Level 2)\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\",\"description\":\"* Sicherer Produktentwicklungslebenszyklus für IoT- und IACS Systeme (Schwerpunkt 62443-4-1, 62443-4-2) * Sicherheitsmanagement * Sicherheitsanforderungen # Threat Modeling * Sichere\\u0026amp;hellip;\",\"startDate\":\"2024-03-27\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Online - Virtuelles Klassenzimmer\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuevsued-akademie/industrial-cybersecurity-professional-level-2\",\"price\":\"1824.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-08-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuevsued-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/tuevsued-akademie\",\"name\":\"TÜV SÜD Akademie GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Automotive Cybersecurity Level 1 nach ISO/SAE 21434\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\",\"description\":\"*Einführung und Transformation der Mobilität *Herausforderungen im Automobilbereich *Grundlagen der Cybersecurity *Grundlagen der Automotive Cybersecurity *Internationales regulatori\\u0026amp;hellip;\",\"startDate\":\"2024-04-02\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Filderstadt\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"48.678197\",\"longitude\":\"9.216135\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuevsued-akademie/automotive-cyber-security-foundation\",\"price\":\"1929.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-08-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuevsued-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/tuevsued-akademie\",\"name\":\"TÜV SÜD Akademie GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Automotive Cybersecurity for ISO 26262\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\",\"description\":\"* Unterschiede zwischen ISO 21434 und ISO 26262 * Item Definition nach beiden Standards * HARA vs. TARA * Assurance Level vs. ASIL * Validierung in Safety und Security * Vulnerabilit\\u0026amp;hellip;\",\"startDate\":\"2024-06-17\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Online - Virtuelles Klassenzimmer\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuevsued-akademie/automotive-cybersecurity-for-iso-26262\",\"price\":\"790.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-08-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuevsued-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/tuevsued-akademie\",\"name\":\"TÜV SÜD Akademie GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity-Awareness Koordinator - TÜV\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\",\"description\":\"Der Kurs Cybersecurity Awareness Koordinator - TÜV vermittelt den Teilnehmenden alle notwendigen Kenntnisse und Fähigkeiten, um Mitarbeiterinnen und Mitarbeiter in ihrer Rolle als Hu\\u0026amp;hellip;\",\"startDate\":\"2024-06-04\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Online - Virtuelles Klassenzimmer\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/tuevsued-akademie/cybersecurity-awareness-koordinator-tuev\",\"price\":\"1500.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-10-05\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/tuevsued-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/tuevsued-akademie\",\"name\":\"TÜV SÜD Akademie GmbH\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/24386/thumb_tuevsued-akademie-0df33f32b4a22cf82a636bd0c82e6ad7.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAdd filters\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eBeliebte Kurse\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Garantierte Durchführung - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/garantierte-durchfuehrung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGarantierte Durchführung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePreis\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Kostenlos - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/kostenlos\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKostenlos\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 0 bis € 500 - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/0-500\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 0 bis € 500\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 500 bis € 1.000 - 22\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/500-1000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 500 bis € 1.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e22\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 1.000 bis € 2.000 - 35\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/1000-2000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 bis € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e35\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 2.000 bis € 4.000 - 55\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 bis € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e55\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 4.000 und teurer - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/4000-teurer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 4.000 und teurer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePreis unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e34\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--price\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eRegion\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Augsburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/augsburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugsburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Berlin - 16\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/berlin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBerlin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bielefeld - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bielefeld\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBielefeld\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bochum - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bochum\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBochum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bonn - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bonn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBonn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Braunschweig - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/braunschweig\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBraunschweig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bremen - 9\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/bremen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBremen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Chemnitz - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/chemnitz\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eChemnitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Darmstadt - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/darmstadt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDarmstadt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dortmund - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/dortmund\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDortmund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dresden - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/dresden\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDresden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Düsseldorf - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/duesseldorf\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDüsseldorf\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Duisburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/duisburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDuisburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Erfurt - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/erfurt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErfurt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Essen - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/essen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEssen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Frankfurt am Main - 19\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/frankfurt-am-main\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt am Main\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Frankfurt an der Oder - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/frankfurt-an-der-oder\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt an der Oder\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Hamburg - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHamburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Hannover - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/hannover\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHannover\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Heidelberg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/heidelberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHeidelberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Karlsruhe - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/karlsruhe\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKarlsruhe\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Kassel - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/kassel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKassel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Kiel - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/kiel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKiel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Knittlingen - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/knittlingen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKnittlingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Köln - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/koeln\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKöln\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Lausitz - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/lausitz\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLausitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Leipzig - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/leipzig\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLeipzig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Magdeburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/magdeburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMagdeburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mannheim - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/mannheim\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMannheim\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mecklenburg-Vorpommern - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/mecklenburg-vorpommern\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMecklenburg-Vorpommern\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"München - 37\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/muenchen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünchen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e37\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Münster - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/muenster\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünster\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Neubrandenburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/neubrandenburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNeubrandenburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Nürnberg - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/nuernberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNürnberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Paderborn - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/paderborn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePaderborn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Potsdam - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/potsdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePotsdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Regensburg - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/regensburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRegensburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Rostock - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/rostock\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRostock\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Saarbrücken - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/saarbruecken\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSaarbrücken\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Schwerin - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/schwerin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSchwerin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stralsund - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/stralsund\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStralsund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stuttgart - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/stuttgart\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStuttgart\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Trier - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/trier\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTrier\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Ulm - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/ulm\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUlm\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Wiesbaden - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/wiesbaden\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWiesbaden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Würzburg - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/wuerzburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWürzburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Wuppertal - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/wuppertal\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWuppertal\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVeranstaltungsort nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e149\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--regions\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eNiveau\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Für Anfänger - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fuer-anfaenger\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFür Anfänger\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Für Fortgeschrittene - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fuer-fortgeschrittene\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFür Fortgeschrittene\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Studien - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/studien\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStudien\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Umschulungen - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/umschulungen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUmschulungen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiveau unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e163\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--meta_levels\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMethode\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Präsenzkurs - 122\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/praesenzkurs\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePräsenzkurs\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e122\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Live Online - 58\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/live-online\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLive Online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e58\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Learning - 38\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/e-learning\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e38\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Tagung/Kongress - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagung-kongress\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTagung/Kongress\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Inhouse - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/inhouse\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInhouse\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Fernstudium - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/it/it-sicherheit/fernstudium\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFernstudium\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--location\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eStartdatum\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"hat ein Startdatum - 100\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/startdatum-bekannt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ehat ein Startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e100\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"März 2024 - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/maerz-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMärz 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"April 2024 - 56\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/april-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eApril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e56\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mai 2024 - 61\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/mai-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMai 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e61\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juni 2024 - 66\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/juni-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuni 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e66\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juli 2024 - 26\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/juli-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuli 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e26\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"August 2024 - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/august-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugust 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"September 2024 - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/september-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSeptember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Oktober 2024 - 30\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/oktober-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOktober 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e30\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"November 2024 - 32\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/november-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNovember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e32\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dezember 2024 - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/dezember-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDezember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Januar 2025 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/januar-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJanuar 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Februar 2025 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/februar-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFebruar 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"März 2025 und später - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/maerz-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMärz 2025 und später\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartdatum unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e82\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDauer\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 Tag - 49\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/1-Tag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 Tag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e49\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 bis 3 Tage - 53\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/2-3-Tage\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 bis 3 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e53\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 bis 10 Tage - 36\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/4-10-Tage\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 bis 10 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e36\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"10 Tage bis 1 Jahr - 37\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/10-365-Tage\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e10 Tage bis 1 Jahr\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e37\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"1 Jahr und länger - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/365-Tage-und-laenger\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 Jahr und länger\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDauer unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--duration_days\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTageszeit\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Tagsüber - 56\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTagsüber\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e56\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Unter der Woche - 22\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/unter-der-woche\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUnter der Woche\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e22\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Am Abend - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-abend\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Abend\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Am Wochenende - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-wochenende\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Wochenende\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Nachmittags - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/nachmittags\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNachmittags\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Samstag - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/samstag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSamstag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Am Morgen - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-morgen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Morgen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Sonntag - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/sonntag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSonntag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTageszeit nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e126\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--moments\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMaximale Teilnehmerzahl\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 bis 10 Teilnehmer - 31\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/6-bis-10-teilnehmer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 bis 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e31\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mehr als 10 Teilnehmer - 88\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/10-plus-teilnehmer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMehr als 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e88\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTeilnehmerzahl unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e63\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eSprache\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Deutsch - 139\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/de\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDeutsch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e139\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Niederländisch - 17\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/nl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiederländisch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Englisch - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/en\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEnglisch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSprache unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eAnbieter\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"COMCAVE.COLLEGE GmbH - 28\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/comcave-college-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCOMCAVE.COLLEGE GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e28\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Software \u0026amp; Support Media GmbH - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/software-support-media-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSoftware \u0026amp; Support Media GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"PROKODA GmbH - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/prokoda\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePROKODA GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Global Knowledge Network Netherlands B.V. - 14\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/global-knowledge-network-netherlands-b-v\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Network Netherlands B.V.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Coursera (CC) - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/coursera\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCoursera (CC)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Fast Lane Institute for Knowledge Transfer GmbH - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fast-lane-institute-for-knowledge-transfer-gmbh-2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFast Lane Institute for Knowledge Transfer GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"TÜV SÜD Akademie GmbH - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tuevsued-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTÜV SÜD Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"TÜV Rheinland Akademie GmbH - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tuev-rheinland-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTÜV Rheinland Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"GFU Cyrus AG - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/gfu-cyrus\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGFU Cyrus AG\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Sicher-Gebildet.de - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/sicher-gebildet-de\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSicher-Gebildet.de\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"alfatraining Bildungszentrum GmbH - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/alfatraining-bildungszentrum-e-k\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ealfatraining Bildungszentrum GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ComConsult GmbH - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/comconsult-research-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eComConsult GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ExperTeach GmbH - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/experteach-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eExperTeach GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"DutchTrain - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/dutchtrain\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"isits AG International School of IT Security - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/isits-ag-international-school-of-it-security\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eisits AG International School of IT Security\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cegos Integrata GmbH - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/integrata-ag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCegos Integrata GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"HSB Graduate \u0026amp; Professional School - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hochschule-bremen-international-graduate-center\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHSB Graduate \u0026amp; Professional School\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Filges IT-Beratung - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/filges\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFilges IT-Beratung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IFM Institut für Managementberatung GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/institut-fur-managementberatung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIFM Institut für Managementberatung GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"TÜV Thüringen Akademie GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tuev-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTÜV Thüringen Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SYMPLASSON Informationstechnik GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/symplasson\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSYMPLASSON Informationstechnik GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SanData IT-Trainingszentrum GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/sandata-it-trainingszentrum-gmbh\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSanData IT-Trainingszentrum GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Adding Value Consulting (AVC) - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/adding-value-consulting-avc\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAdding Value Consulting (AVC)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"FachTaG Akademie GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fachtag-akademie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFachTaG Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SUAS (a company of Schouten \u0026amp; Nelissen) - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/schouten-nelissen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSUAS (a company of Schouten \u0026amp; Nelissen)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eBesondere Gruppierung\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Sofort Buchbar - 109\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSofort Buchbar\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e109\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Staatliche Zentralstelle für Fernunterricht (ZFU) - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/staatliche-zentralstelle-fuer-fernunterricht-zfu\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStaatliche Zentralstelle für Fernunterricht (ZFU)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bildungsgutschein - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bildungsgutschein\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBildungsgutschein\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"BBB - Der Bundesverband der Träger beruflicher Bildung - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/bbb-der-bundesverband-der-traeger-beruflicher-bildung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBBB - Der Bundesverband der Träger beruflicher Bildung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Beliebte Kurse - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/beliebte-kurse\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBeliebte Kurse\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Zertifiziert nach DIN ISO 29990 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/zertifiziert-nach-din-iso-29990\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZertifiziert nach DIN ISO 29990\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGruppierung - nicht relevant / bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e66\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--syndicates\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section usp-box\"\u003e\u003ch3\u003eMehr lernen? Weiterbildung beginnt auf Springest.de\u003c/h3\u003e\u003cul class=\"usp-list--colored usp-list--default\"\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"school\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAlles zum Lernen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 52.000 Weiterbildungen, Kurse, Seminare und E-Learnings.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"phone\"\u003e\u003ch4 class=\"usp-list__title\"\u003eHilfe beim Suchen und Buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eStellen Sie eine Frage, nutzen Sie unseren \u003ca href='https://springestsupport.freshdesk.com/de/support/solutions/103000218542'\u003eKundenservice\u003c/a\u003e oder rufen Sie einen unserer Bildungsberater an.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"thumb_up\"\u003e\u003ch4 class=\"usp-list__title\"\u003eKostenlos Informationen beantragen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eAlle Informationen kostenlos erhalten, vergleichen und mit Ihren Kollegen oder Vorgesetzten besprechen.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"star\"\u003e\u003ch4 class=\"usp-list__title\"\u003eBewertungen und Teilnehmer\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 10.000 unabhängige Bewertungen helfen Ihnen, den besten Bildungsanbieter zu finden.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"business\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAuch für Ihre Organisation\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eGruppenrabatt, Inhouse Schulung und Social Learning mit Kollegen: Jederzeit verfügbar.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"event_available\"\u003e\u003ch4 class=\"usp-list__title\"\u003eSofort buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eSofort anfangen? Buchen Sie und der Bildungsanbieter hilft Ihnen weiter.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003ch3 class=\"panel__content-title\"\u003e\u003cspan\u003e8\u003c/span\u003e Fragen zu Automation und ICT/IT\u003c/h3\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich möchte Microsoft Office / Excel / Outlook erlernen \" href=\"/fragen-antworten/ich-moechte-microsoft-office-excel-outlook-erlernen\"\u003eIch möchte Microsoft Office / Excel / Outlook erlernen \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \" href=\"/fragen-antworten/ich-suche-einen-programmier-grundkurs-c-java-oder-php-welche-weiterbildungen-gibt-es\"\u003eIch suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Gibt es ein passendes SAP Seminar?\" href=\"/fragen-antworten/seminar-sap-gesucht\"\u003eGibt es ein passendes SAP Seminar?\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym (1 Kommentar(e))\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/fragen/it\"\u003eFragen zur Kategorie Automation und ICT/IT ansehen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eWeiterbildungstrends\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"IT-Sicherheit\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e182\u003c/strong\u003e Kurse\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e51\u003c/strong\u003e Anbieter\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003cstrong class=\"count\"\u003e12\u003c/strong\u003e Bewertungen\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e7.4\u003c/strong\u003e Bewertung \u003cspan class=\"meta-info\"\u003e(durchschnittlich)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 1,00 - € 4.380,00\u003c/strong\u003e Preisklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-19T10:34:15.089Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":8,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"ab_050_mobile_subject_cta":"button_variation","funnel_ab_050":true}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-19T10:34:15.089Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":8,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"ab_050_mobile_subject_cta":"button_variation","funnel_ab_050":true}}],"filters":""}