{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-phone\"\u003e\u003ci class=\"ma-phone material-icons icon--medium\"\u003ephone\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eHilfe beim Suchen und Buchen\u003c/h3\u003e\u003cp\u003eStellen Sie eine Frage, nutzen Sie unseren Kundenservice oder rufen Sie einen unserer Bildungsberater an.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e56 IT-Sicherheit Seminare\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eVerwandte Themen: \u003ca title=\"58 IT-Management \u0026amp; Strategie Kurse\" rel=\"nofollow\" href=\"/it/it-management-strategie/tagsueber\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" rel=\"nofollow\" href=\"/it/itberater/tagsueber\"\u003eIT-Berater\u003c/a\u003e, \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" rel=\"nofollow\" href=\"/it/hacking/tagsueber\"\u003eHacking\u003c/a\u003e, \u003ca title=\"3 Cisco Network Security Kurse\" rel=\"nofollow\" href=\"/it/cisco network security/tagsueber\"\u003eCisco Network Security\u003c/a\u003e, \u003ca title=\"41 Ethical Hacking Kurse und Seminare\" rel=\"nofollow\" href=\"/it/ethical-hacking/tagsueber\"\u003eEthical Hacking\u003c/a\u003e und \u003ca title=\"22 Penetration Testing Kurse\" rel=\"nofollow\" href=\"/it/penetration-testing/tagsueber\"\u003ePenetration Testing\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eVerwandte Themen: \u003ca title=\"58 IT-Management \u0026amp; Strategie Kurse\" rel=\"nofollow\" href=\"/it/it-management-strategie/tagsueber\"\u003eIT-Management \u0026amp; Strategie\u003c/a\u003e, \u003ca title=\"7 IT-Berater Seminare\" rel=\"nofollow\" href=\"/it/itberater/tagsueber\"\u003eIT-Berater\u003c/a\u003e und \u003ca title=\"122 Hacking Kurse \u0026amp; Seminare\" rel=\"nofollow\" href=\"/it/hacking/tagsueber\"\u003eHacking\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 aktiver Filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sortieren\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003eTagsüber\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eFilter ändern\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChange sorting\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSortieren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/it/it-sicherheit/tagsueber\" data-link-type=\"sort\" href=\"#\"\u003eBewertungen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/tagsueber/preis-hoch-niedrig\" data-link-type=\"sort\" href=\"#\"\u003ePreis (hoch \u0026gt; niedrig)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/tagsueber/preis-niedrig-hoch\" data-link-type=\"sort\" href=\"#\"\u003ePreis (niedrig \u0026gt; hoch)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/tagsueber/dauer-lang-kurz\" data-link-type=\"sort\" href=\"#\"\u003eDauer (lang \u0026gt; kurz)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/it/it-sicherheit/tagsueber/dauer-kurz-lang\" data-link-type=\"sort\" href=\"#\"\u003eDauer (kurz \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1079235\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1079235\" id=\"training-1079235\" value=\"1079235\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/fachtag-akademie/fachtagung-sil-funktionale-sicherheit-explosionsschutz-schaltschraenke-it-security#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2136266/thumbnail-BIld_FachTag_Akademie_Springest.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Fachtagung SIL Funktionale Sicherheit, Explosionsschutz, Schaltschränke, IT Security\" href=\"/fachtag-akademie/fachtagung-sil-funktionale-sicherheit-explosionsschutz-schaltschraenke-it-security\"\u003eFachtagung SIL Funktionale Sicherheit, Explosionsschutz, Schaltschränke, IT Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von FachTaG Akademie GmbH\" title=\"Logo von FachTaG Akademie GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/34412/thumb_fachtag-akademie-06ee50a47ec3d2ff0041d6baa48a69f1.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eNovember 2024 in noch ausstehend\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/fachtag-akademie/fachtagung-sil-funktionale-sicherheit-explosionsschutz-schaltschraenke-it-security#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2136266/thumbnail-BIld_FachTag_Akademie_Springest.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eDie ENGIE Deutschland als einer der führenden Spezialisten im Anlagenbau und der Prozesstechnik vertreten durch die ENGIE Power Solutions u…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.178,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 40 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 40\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"Fachtagung SIL Funktionale Sicherheit, Explosionsschutz, Schaltschränke, IT Security hat eine durchschnittliche Bewertung von 9,5\" href=\"/fachtag-akademie/fachtagung-sil-funktionale-sicherheit-explosionsschutz-schaltschraenke-it-security#bewertungen\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 10\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(2 Bewertungen)\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,7 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von FachTaG Akademie GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,7\u003c/strong\u003e (aus \u003cstrong\u003e3\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von FachTaG Akademie GmbH\" title=\"Logo von FachTaG Akademie GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/34412/thumb_fachtag-akademie-06ee50a47ec3d2ff0041d6baa48a69f1.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fachtag-akademie/fachtagung-sil-funktionale-sicherheit-explosionsschutz-schaltschraenke-it-security/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fachtag-akademie/fachtagung-sil-funktionale-sicherheit-explosionsschutz-schaltschraenke-it-security/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-996966\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-996966\" id=\"training-996966\" value=\"996966\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Veranstaltung: Prüfung und Bewertung von IT-Sicherheit und Datenschutz\" href=\"/hochschule-bremen-international-graduate-center/pruefung-und-bewertung-von-it-sicherheit-und-datenschutz\"\u003ePrüfung und Bewertung von IT-Sicherheit und Datenschutz\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Graduate \u0026amp; Professional School\" title=\"Logo von HSB Graduate \u0026amp; Professional School\" src=\"https://static-2.springest.com/uploads/institute/logo/24800/thumb_hochschule-bremen-international-graduate-center-0b59f645fc42c8e303b66672bffc166a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eBremen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eCyberangriffe können hohe finanzielle Schäden verursachen, die insbesondere kleine und mittlere Unternehmen (KMU) sowie Selbstständige an d…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eVeranstaltung\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 590,00 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 15 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 15\u003c/span\u003e\u003cspan class=\"duration\"\u003e16 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Graduate \u0026amp; Professional School\" title=\"Logo von HSB Graduate \u0026amp; Professional School\" src=\"https://static-2.springest.com/uploads/institute/logo/24800/thumb_hochschule-bremen-international-graduate-center-0b59f645fc42c8e303b66672bffc166a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-788999\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-788999\" id=\"training-788999\" value=\"788999\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Informations- und IT-Sicherheit\" href=\"/easylearn-schweiz-ag/informations-und-it-sicherheit\"\u003eInformations- und IT-Sicherheit\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von easylearn schweiz ag\" title=\"Logo von easylearn schweiz ag\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eLerninhalteDer e-Learning-Kurs zu Informations- und IT-Sicherheit vermittelt Ihnen und Ihren Mitarbeitenden wichtiges Wissen zu aktuellen T…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 89,00 MwSt.-befreit\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e MwSt.-befreit\u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eZeitspanne\u003c/strong\u003e Preis pro Jahr\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eFür\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von easylearn schweiz ag\" title=\"Logo von easylearn schweiz ag\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/easylearn-schweiz-ag/informations-und-it-sicherheit/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/easylearn-schweiz-ag/informations-und-it-sicherheit/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-994253\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-994253\" id=\"training-994253\" value=\"994253\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Veranstaltung: IT-Sicherheit und Datenschutz für Mittelstand und Selbstständige\" href=\"/hochschule-bremen-international-graduate-center/it-sicherheit-und-datenschutz-fuer-mittelstand-und-selbststaendige\"\u003eIT-Sicherheit und Datenschutz für Mittelstand und Selbstständige\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Graduate \u0026amp; Professional School\" title=\"Logo von HSB Graduate \u0026amp; Professional School\" src=\"https://static-2.springest.com/uploads/institute/logo/24800/thumb_hochschule-bremen-international-graduate-center-0b59f645fc42c8e303b66672bffc166a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eBremen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003ePhishing, Hacking, Datenklau – die kriminellen Machenschaften im Internet nehmen zu und stellen ein echtes Geschäftsrisiko dar. Während grö…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eVeranstaltung\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.990,00 MwSt.-befreit\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e MwSt.-befreit\u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 15 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 15\u003c/span\u003e\u003cspan class=\"duration\"\u003e60 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Graduate \u0026amp; Professional School\" title=\"Logo von HSB Graduate \u0026amp; Professional School\" src=\"https://static-2.springest.com/uploads/institute/logo/24800/thumb_hochschule-bremen-international-graduate-center-0b59f645fc42c8e303b66672bffc166a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-996964\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-996964\" id=\"training-996964\" value=\"996964\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Veranstaltung: Betriebliche Umsetzung von IT-Sicherheit und Datenschutz\" href=\"/hochschule-bremen-international-graduate-center/betriebliche-umsetzung-von-it-sicherheit-und-datenschutz\"\u003eBetriebliche Umsetzung von IT-Sicherheit und Datenschutz\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Graduate \u0026amp; Professional School\" title=\"Logo von HSB Graduate \u0026amp; Professional School\" src=\"https://static-2.springest.com/uploads/institute/logo/24800/thumb_hochschule-bremen-international-graduate-center-0b59f645fc42c8e303b66672bffc166a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eBremen\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDie Vorschriften für Datenschutz und IT-Sicherheit haben sich im Zeitalter der Digitalisierung und der damit einhergehenden Risiken deutlic…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eVeranstaltung\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 790,00 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 15 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 15\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 Stunden\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Graduate \u0026amp; Professional School\" title=\"Logo von HSB Graduate \u0026amp; Professional School\" src=\"https://static-2.springest.com/uploads/institute/logo/24800/thumb_hochschule-bremen-international-graduate-center-0b59f645fc42c8e303b66672bffc166a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-718290\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-718290\" id=\"training-718290\" value=\"718290\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: IT-Sicherheit in der Entwicklung von Webapplikationen\" href=\"/ohm-professional-school/it-sicherheit-in-der-entwicklung-von-webapplikationen\"\u003eIT-Sicherheit in der Entwicklung von Webapplikationen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von OHM Professional School gGmbH\" title=\"Logo von OHM Professional School gGmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/20953/thumb_ohm-professional-school-402ed13ab3ffaeb0b2165be770391f57.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eIT-Sicherheit bei der Entwicklung von Web-Applikationen Webapplikationen sind naturgemäß mit hohen Risiken behaftet und oft Ziel von Hacker…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.190,00 MwSt.-befreit\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e MwSt.-befreit\u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eEUR 1150,00 Frühbucherpreis bei Buchung bis 8 Wochen vor Termin\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eFür\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von OHM Professional School gGmbH\" title=\"Logo von OHM Professional School gGmbH\" src=\"https://static-4.springest.com/uploads/institute/logo/20953/thumb_ohm-professional-school-402ed13ab3ffaeb0b2165be770391f57.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-666315\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-666315\" id=\"training-666315\" value=\"666315\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: IT-Security Manager/-in (IHK)\" href=\"/hsb/it-security-manager-in-ihk\"\u003eIT-Security Manager/-in (IHK)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Akademie - ein Bereich der HSB Personal \u0026amp; Service GmbH\" title=\"Logo von HSB Akademie - ein Bereich der HSB Personal \u0026amp; Service GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/6927/thumb_hsb.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eUnternehmen stehen vor der Herausforderung, Ihre Daten und Netzwerke jederzeit vor Fremdangriffen und -zugriffen zu schützen. Schwachstelle…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 2.305,00 MwSt.-befreit\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e MwSt.-befreit\u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eFür\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von HSB Akademie - ein Bereich der HSB Personal \u0026amp; Service GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,5\u003c/strong\u003e (aus \u003cstrong\u003e2\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von HSB Akademie - ein Bereich der HSB Personal \u0026amp; Service GmbH\" title=\"Logo von HSB Akademie - ein Bereich der HSB Personal \u0026amp; Service GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/6927/thumb_hsb.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/hsb/it-security-manager-in-ihk/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/hsb/it-security-manager-in-ihk/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-939246\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-939246\" id=\"training-939246\" value=\"939246\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity Automotive Professional (TÜV)\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-automotive-professional-tuev\"\u003eCybersecurity Automotive Professional (TÜV)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von isits AG International School of IT Security\" title=\"Logo von isits AG International School of IT Security\" src=\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDieses fortgeschrittene IT-Security-Training konzentriert sich auf die Anforderungen von ISO/SAE DIS 21434 und Cybersicherheitsmanagement i…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.410,64 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 Tage\u003c/span\u003e\u003cspan class=\"product-level\"\u003eFür\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von isits AG International School of IT Security haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,4\u003c/strong\u003e (aus \u003cstrong\u003e9\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von isits AG International School of IT Security\" title=\"Logo von isits AG International School of IT Security\" src=\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-automotive-professional-tuev/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-automotive-professional-tuev/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1065458\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1065458\" id=\"training-1065458\" value=\"1065458\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Fehlerkultur in der IT-Sicherheit\" href=\"/isits-ag-international-school-of-it-security/fehlerkultur-in-der-it-sicherheit\"\u003eFehlerkultur in der IT-Sicherheit\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von isits AG International School of IT Security\" title=\"Logo von isits AG International School of IT Security\" src=\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eBochum\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eWie können wir sicherstellen, dass wir adäquat auf Sicherheitsfragen reagieren und Fehler vermeiden? Eine positive Fehlerkultur ist dadurch…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 659,35 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e8 Stunden\u003c/span\u003e\u003cspan class=\"product-level\"\u003eFür\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von isits AG International School of IT Security haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,4\u003c/strong\u003e (aus \u003cstrong\u003e9\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von isits AG International School of IT Security\" title=\"Logo von isits AG International School of IT Security\" src=\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/isits-ag-international-school-of-it-security/fehlerkultur-in-der-it-sicherheit/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/isits-ag-international-school-of-it-security/fehlerkultur-in-der-it-sicherheit/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-915703\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-915703\" id=\"training-915703\" value=\"915703\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT-Sicherheit: (Anti-) Hacking für Admins Angriffe erkennen und Schutzmaßnahmen verstärken\" href=\"/computer-systeme-dipl-ing-thorsten-kebel/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken\"\u003eIT-Sicherheit: (Anti-) Hacking für Admins Angriffe erkennen und Schutzmaßnahmen verstärken\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" title=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" src=\"https://static-2.springest.com/uploads/institute/logo/12161/thumb_computer-systeme-dipl-ing-thorsten-kebel-122784597098ab9f0d5610be1916a633.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eBerlin, Bochum und 17 andere Orte\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eAngesprochener Teilnehmerkreis: System- und Netzwerkadministratoren, IT- und Systemverantwortliche, IT-Architekten sowie IT-Sicherheitsbeau…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.011,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 8 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von IT-Trainings - Dipl.-Ing. Thorsten Kebel haben eine durchschnittliche Bewertung von \u003cstrong\u003e7,5\u003c/strong\u003e (aus \u003cstrong\u003e2\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" title=\"Logo von IT-Trainings - Dipl.-Ing. Thorsten Kebel\" src=\"https://static-2.springest.com/uploads/institute/logo/12161/thumb_computer-systeme-dipl-ing-thorsten-kebel-122784597098ab9f0d5610be1916a633.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computer-systeme-dipl-ing-thorsten-kebel/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computer-systeme-dipl-ing-thorsten-kebel/it-sicherheit-anti-hacking-fur-admins-angriffe-erkennen-und-schutzmassnahmen-verstarken/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-670601\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-670601\" id=\"training-670601\" value=\"670601\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag/it-grundlagen-aus-sicht-des-datenschutzes-und-der-it-sicherheit#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/528927/thumbnail-Empfang_3_Sofa_IMG_4023_2000px.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: IT-Grundlagen aus Sicht des Datenschutzes und der IT-Sicherheit (DGI®)\" href=\"/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag/it-grundlagen-aus-sicht-des-datenschutzes-und-der-it-sicherheit\"\u003eIT-Grundlagen aus Sicht des Datenschutzes und der IT-Sicherheit (DGI®)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von DGI Deutsche Gesellschaft für Informationssicherheit AG\" title=\"Logo von DGI Deutsche Gesellschaft für Informationssicherheit AG\" src=\"https://static-3.springest.com/uploads/institute/logo/17593/thumb_dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag-bbbb6dfabb5491890176cd666958b83d.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Mittwoch 10. April 2024 und 2 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Mittwoch 10. April 2024 in Kurfürstendamm 57, 10707 Berlin und 2 weitere Termine\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag/it-grundlagen-aus-sicht-des-datenschutzes-und-der-it-sicherheit#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/528927/thumbnail-Empfang_3_Sofa_IMG_4023_2000px.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eErlernen Sie die Grundlagen der Informationstechnologie (IT) im Kontext der Einhaltung von datenschutzrechtlichen Anforderungen an Ihre Org…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.416,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eWeitere Informationen\u003c/strong\u003e \u003cem\u003eAlle genannten Preise sind Nettopreise und werden zuzüglich der aktuellen gesetzlichen Mehrwertsteuer berechnet.\r\n\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 16 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003cspan class=\"product-level\"\u003eFür\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,3 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von DGI Deutsche Gesellschaft für Informationssicherheit AG haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,3\u003c/strong\u003e (aus \u003cstrong\u003e3\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von DGI Deutsche Gesellschaft für Informationssicherheit AG\" title=\"Logo von DGI Deutsche Gesellschaft für Informationssicherheit AG\" src=\"https://static-3.springest.com/uploads/institute/logo/17593/thumb_dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag-bbbb6dfabb5491890176cd666958b83d.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag/it-grundlagen-aus-sicht-des-datenschutzes-und-der-it-sicherheit/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag/it-grundlagen-aus-sicht-des-datenschutzes-und-der-it-sicherheit/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-680818\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-680818\" id=\"training-680818\" value=\"680818\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-awareness-beauftragter-tuev#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-2.springest.com/uploads/product_image/image/178317/thumbnail-Isits_AG-019_Zuschnitt.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Cybersecurity-Awareness-Beauftragter (TÜV)\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-awareness-beauftragter-tuev\"\u003eCybersecurity-Awareness-Beauftragter (TÜV)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von isits AG International School of IT Security\" title=\"Logo von isits AG International School of IT Security\" src=\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eVor Ort: Montag 17. Juni 2024 in Bochum\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 14. Oktober 2024\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-awareness-beauftragter-tuev#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-2.springest.com/uploads/product_image/image/178317/thumbnail-Isits_AG-019_Zuschnitt.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eIhre Mitarbeiter sind neben den technischen und organisatorischen Maßnahmen ein wichtiges Glied in der Sicherheitskette. Da jede Kette nur …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.080,42 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eBis zu 12 Personen können an dieser Weiterbildung teilnehmen.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max.: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 Tage\u003c/span\u003e\u003cspan class=\"product-level\"\u003eFür\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von isits AG International School of IT Security haben eine durchschnittliche Bewertung von \u003cstrong\u003e9,4\u003c/strong\u003e (aus \u003cstrong\u003e9\u003c/strong\u003e Bewertungen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von isits AG International School of IT Security\" title=\"Logo von isits AG International School of IT Security\" src=\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-awareness-beauftragter-tuev/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/isits-ag-international-school-of-it-security/cybersecurity-awareness-beauftragter-tuev/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-821947\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-821947\" id=\"training-821947\" value=\"821947\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Veranstaltung: Grundlagen der IT-Sicherheit\" href=\"/comconsult-research-gmbh/grundlagen-der-it-sicherheit\"\u003eGrundlagen der IT-Sicherheit\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ComConsult GmbH\" title=\"Logo von ComConsult GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eDienstag 4. Juni 2024 in Siegburg / online und 1 anderer Termin\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDieses Seminar vermittelt die Grundlagen der IT-Sicherheit, von den Angriffsmethoden über Gegenmaßnahmen bis zu betrieblichen Herausforderu…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eVeranstaltung\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.892,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 Tage\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von ComConsult GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9\u003c/strong\u003e (aus \u003cstrong\u003e1\u003c/strong\u003e Bewertung)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ComConsult GmbH\" title=\"Logo von ComConsult GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-997080\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-997080\" id=\"training-997080\" value=\"997080\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: OT- und IoT-Geräte gegen Cyberangriffe absichern\" href=\"/comconsult-research-gmbh/sicheres-netzwerk-trotz-heterogener-systemlandschaft-ot-und-iot-geraete-absichern\"\u003eOT- und IoT-Geräte gegen Cyberangriffe absichern\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ComConsult GmbH\" title=\"Logo von ComConsult GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Montag 27. Mai 2024 und 1 weiterer Termin\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eHäufig sind nicht Server und Clients die Schwachstelle eines Unternehmensnetzwerks, sondern smarte Geräte wie Kameras und Produktionsmaschi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.178,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e1 Tag\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von ComConsult GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9\u003c/strong\u003e (aus \u003cstrong\u003e1\u003c/strong\u003e Bewertung)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ComConsult GmbH\" title=\"Logo von ComConsult GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/comconsult-research-gmbh/sicheres-netzwerk-trotz-heterogener-systemlandschaft-ot-und-iot-geraete-absichern/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/comconsult-research-gmbh/sicheres-netzwerk-trotz-heterogener-systemlandschaft-ot-und-iot-geraete-absichern/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1042541\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1042541\" id=\"training-1042541\" value=\"1042541\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Präsenzkurs: Sofortmaßnahmen bei einem Cyberangriff\" href=\"/comconsult-research-gmbh/sofortmassnahmen-bei-einem-cyberangriff\"\u003eSofortmaßnahmen bei einem Cyberangriff\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ComConsult GmbH\" title=\"Logo von ComConsult GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: Dienstag 4. Juni 2024\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eCyberangriffe können jedes Unternehmen und jede Organisation treffen. Natürlich können Sie mit Sicherheitsmaßnahmen das Risiko weit senken …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.178,10 inkl. MwSt. \u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eMwSt.\u003c/strong\u003e inkl. MwSt. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003ekompletter Preis\u003c/strong\u003e Kompletter Preis. Es fallen keine zusätzlichen Kosten mehr an.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e1 Tag\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eBewertung: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBildungsangebote von ComConsult GmbH haben eine durchschnittliche Bewertung von \u003cstrong\u003e9\u003c/strong\u003e (aus \u003cstrong\u003e1\u003c/strong\u003e Bewertung)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo von ComConsult GmbH\" title=\"Logo von ComConsult GmbH\" src=\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/comconsult-research-gmbh/sofortmassnahmen-bei-einem-cyberangriff/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/comconsult-research-gmbh/sofortmassnahmen-bei-einem-cyberangriff/informationsanfrage/informationsanfrage\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info anfragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergleichen\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e1\u003cspan class=\"pagination__max-pages\"\u003e von 4\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 2\" href=\"/it/it-sicherheit/tagsueber/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 3\" href=\"/it/it-sicherheit/tagsueber/3\"\u003e3\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Seite 4\" href=\"/it/it-sicherheit/tagsueber/4\"\u003e4\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Weiter\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/it/it-sicherheit/tagsueber/2\"\u003eWeiter \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Fachtagung SIL Funktionale Sicherheit, Explosionsschutz, Schaltschränke, IT Security\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/34412/thumb_fachtag-akademie-06ee50a47ec3d2ff0041d6baa48a69f1.png\",\"description\":\"Die ENGIE Deutschland als einer der führenden Spezialisten im Anlagenbau und der Prozesstechnik vertreten durch die ENGIE Power Solutions und die FachTaG Akademie, spezialisiert auf \\u0026amp;hellip;\",\"startDate\":\"2024-11-30\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"noch ausstehend\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/fachtag-akademie/fachtagung-sil-funktionale-sicherheit-explosionsschutz-schaltschraenke-it-security\",\"price\":\"990.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-01-02\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/fachtag-akademie#EducationalOrganization\",\"url\":\"https://www.springest.de/fachtag-akademie\",\"name\":\"FachTaG Akademie GmbH\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/34412/thumb_fachtag-akademie-06ee50a47ec3d2ff0041d6baa48a69f1.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"IT-Grundlagen aus Sicht des Datenschutzes und der IT-Sicherheit (DGI®)\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/17593/thumb_dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag-bbbb6dfabb5491890176cd666958b83d.png\",\"description\":\"Erlernen Sie die Grundlagen der Informationstechnologie (IT) im Kontext der Einhaltung von datenschutzrechtlichen Anforderungen an Ihre Organisation Als Datenschutzbeauftragter oder \\u0026amp;hellip;\",\"startDate\":\"2024-04-10\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag/it-grundlagen-aus-sicht-des-datenschutzes-und-der-it-sicherheit\",\"price\":\"1190.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-22\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag#EducationalOrganization\",\"url\":\"https://www.springest.de/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag\",\"name\":\"DGI Deutsche Gesellschaft für Informationssicherheit AG\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/17593/thumb_dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag-bbbb6dfabb5491890176cd666958b83d.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity-Awareness-Beauftragter (TÜV)\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\",\"description\":\"Ihre Mitarbeiter sind neben den technischen und organisatorischen Maßnahmen ein wichtiges Glied in der Sicherheitskette. Da jede Kette nur so stark wie ihr schwächstes Glied ist, müs\\u0026amp;hellip;\",\"startDate\":\"2024-06-17\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Bochum\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/isits-ag-international-school-of-it-security/cybersecurity-awareness-beauftragter-tuev\",\"price\":\"1748.25\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-19\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/isits-ag-international-school-of-it-security#EducationalOrganization\",\"url\":\"https://www.springest.de/isits-ag-international-school-of-it-security\",\"name\":\"isits AG International School of IT Security\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/20099/thumb_isits-ag-international-school-of-it-security-583aedd7d41718882ceadea4fbbc761a.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Grundlagen der IT-Sicherheit\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\",\"description\":\"Dieses Seminar vermittelt die Grundlagen der IT-Sicherheit, von den Angriffsmethoden über Gegenmaßnahmen bis zu betrieblichen Herausforderungen und Lösungen. Dabei werden ebenfalls E\\u0026amp;hellip;\",\"startDate\":\"2024-06-04\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\" Siegburg / online\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"50.799847\",\"longitude\":\"7.207451\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/comconsult-research-gmbh/grundlagen-der-it-sicherheit\",\"price\":\"1590.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-23\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/comconsult-research-gmbh#EducationalOrganization\",\"url\":\"https://www.springest.de/comconsult-research-gmbh\",\"name\":\"ComConsult GmbH\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"OT- und IoT-Geräte gegen Cyberangriffe absichern\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\",\"description\":\"Häufig sind nicht Server und Clients die Schwachstelle eines Unternehmensnetzwerks, sondern smarte Geräte wie Kameras und Produktionsmaschinen. In diesem Seminar erfahren Sie, wie Si\\u0026amp;hellip;\",\"startDate\":\"2024-05-27\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/comconsult-research-gmbh/sicheres-netzwerk-trotz-heterogener-systemlandschaft-ot-und-iot-geraete-absichern\",\"price\":\"990.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-25\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/comconsult-research-gmbh#EducationalOrganization\",\"url\":\"https://www.springest.de/comconsult-research-gmbh\",\"name\":\"ComConsult GmbH\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Sofortmaßnahmen bei einem Cyberangriff\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\",\"description\":\"Cyberangriffe können jedes Unternehmen und jede Organisation treffen. Natürlich können Sie mit Sicherheitsmaßnahmen das Risiko weit senken – doch nicht auf null setzen. In diesem Sem\\u0026amp;hellip;\",\"startDate\":\"2024-06-04\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.de/comconsult-research-gmbh/sofortmassnahmen-bei-einem-cyberangriff\",\"price\":\"990.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-25\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://www.springest.de/comconsult-research-gmbh#EducationalOrganization\",\"url\":\"https://www.springest.de/comconsult-research-gmbh\",\"name\":\"ComConsult GmbH\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/22537/thumb_comconsult-research-gmbh-0036dac016a28ae3fe77bb0a674e5101.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003cdiv class=\"message--session-filters\"\u003eIhre Präferenzen werden zur Zeit zum Filtern verwendet.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAdd filters\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/it/it-sicherheit\"\u003eAlle Filter entfernen\u003c/a\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eBeliebte Kurse\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Garantierte Durchführung - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/garantierte-durchfuehrung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGarantierte Durchführung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePreis\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Kostenlos - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/kostenlos\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKostenlos\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 0 bis € 500 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/0-500\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 0 bis € 500\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 500 bis € 1.000 - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/500-1000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 500 bis € 1.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 1.000 bis € 2.000 - 21\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/1000-2000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 bis € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e21\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"€ 2.000 bis € 4.000 - 21\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 bis € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e21\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePreis unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--price\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eRegion\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Augsburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/augsburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugsburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Berlin - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/berlin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBerlin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bielefeld - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/bielefeld\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBielefeld\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bochum - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/bochum\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBochum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bonn - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/bonn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBonn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Braunschweig - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/braunschweig\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBraunschweig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Bremen - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/bremen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBremen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Chemnitz - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/chemnitz\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eChemnitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Darmstadt - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/darmstadt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDarmstadt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dortmund - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/dortmund\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDortmund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dresden - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/dresden\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDresden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Düsseldorf - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/duesseldorf\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDüsseldorf\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Duisburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/duisburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDuisburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Erfurt - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/erfurt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErfurt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Essen - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/essen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEssen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Frankfurt am Main - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/frankfurt-am-main\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt am Main\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Frankfurt an der Oder - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/frankfurt-an-der-oder\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrankfurt an der Oder\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Hamburg - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/hamburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHamburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Hannover - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/hannover\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHannover\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Heidelberg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/heidelberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHeidelberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Karlsruhe - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/karlsruhe\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKarlsruhe\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Kassel - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/kassel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKassel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Kiel - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/kiel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKiel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Knittlingen - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/knittlingen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKnittlingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Köln - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/koeln\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKöln\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Lausitz - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/lausitz\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLausitz\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Leipzig - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/leipzig\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLeipzig\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Magdeburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/magdeburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMagdeburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mannheim - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/mannheim\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMannheim\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mecklenburg-Vorpommern - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/mecklenburg-vorpommern\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMecklenburg-Vorpommern\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"München - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/muenchen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünchen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Münster - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/muenster\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMünster\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Neubrandenburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/neubrandenburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNeubrandenburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Nürnberg - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/nuernberg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNürnberg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Paderborn - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/paderborn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePaderborn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Potsdam - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/potsdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePotsdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Regensburg - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/regensburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRegensburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Rostock - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/rostock\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRostock\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Saarbrücken - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/saarbruecken\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSaarbrücken\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Schwerin - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/schwerin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSchwerin\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stralsund - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/stralsund\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStralsund\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stuttgart - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/stuttgart\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStuttgart\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Trier - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/trier\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTrier\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Ulm - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/ulm\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUlm\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Wiesbaden - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/wiesbaden\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWiesbaden\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Würzburg - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/wuerzburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWürzburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Wuppertal - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/wuppertal\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWuppertal\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVeranstaltungsort nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e30\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--regions\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eNiveau\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Für Anfänger - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fuer-anfaenger/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFür Anfänger\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Für Fortgeschrittene - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fuer-fortgeschrittene/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFür Fortgeschrittene\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiveau unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e46\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMethode\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Präsenzkurs - 32\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/praesenzkurs/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePräsenzkurs\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e32\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Live Online - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/live-online/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLive Online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Tagung/Kongress - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagung-kongress/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTagung/Kongress\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"E-Learning - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/e-learning/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Inhouse - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/inhouse/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInhouse\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--location\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eStartdatum\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"hat ein Startdatum - 23\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/startdatum-bekannt\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ehat ein Startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e23\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"März 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/maerz-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMärz 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"April 2024 - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/april-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eApril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Mai 2024 - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/mai-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMai 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juni 2024 - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/juni-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuni 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Juli 2024 - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/juli-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eJuli 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"August 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/august-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAugust 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"September 2024 - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/september-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSeptember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Oktober 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/oktober-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOktober 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"November 2024 - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/november-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNovember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Dezember 2024 - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/dezember-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDezember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartdatum unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e33\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDauer\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 Tag - 17\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/1-Tag/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 Tag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 bis 3 Tage - 26\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/2-3-Tage/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 bis 3 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e26\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 bis 10 Tage - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/4-10-Tage/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 bis 10 Tage\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"10 Tage bis 1 Jahr - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/10-365-Tage/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e10 Tage bis 1 Jahr\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDauer unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--duration_days\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTageszeit\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"Tagsüber - 56\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/it/it-sicherheit\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTagsüber\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e56\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Unter der Woche - 22\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/unter-der-woche/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUnter der Woche\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e22\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Am Abend - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-abend/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Abend\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Am Wochenende - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-wochenende/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Wochenende\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Nachmittags - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/nachmittags/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNachmittags\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Samstag - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/samstag/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSamstag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Am Morgen - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/am-morgen/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAm Morgen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Sonntag - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/sonntag/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSonntag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTageszeit nicht bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e126\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link is-expanded\" data-target=\"filter--moments\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eWeniger\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMaximale Teilnehmerzahl\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 bis 10 Teilnehmer - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/6-bis-10-teilnehmer/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 bis 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mehr als 10 Teilnehmer - 28\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/10-plus-teilnehmer/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMehr als 10 Teilnehmer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e28\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTeilnehmerzahl unbekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eSprache\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Deutsch - 55\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/de/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDeutsch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e55\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Englisch - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/en/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEnglisch\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eAnbieter\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Software \u0026amp; Support Media GmbH - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/software-support-media-gmbh/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSoftware \u0026amp; Support Media GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"GFU Cyrus AG - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/gfu-cyrus/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGFU Cyrus AG\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"alfatraining Bildungszentrum GmbH - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/alfatraining-bildungszentrum-e-k/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ealfatraining Bildungszentrum GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ComConsult GmbH - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/comconsult-research-gmbh/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eComConsult GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"isits AG International School of IT Security - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/isits-ag-international-school-of-it-security/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eisits AG International School of IT Security\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cegos Integrata GmbH - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/integrata-ag/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCegos Integrata GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"HSB Graduate \u0026amp; Professional School - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hochschule-bremen-international-graduate-center/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHSB Graduate \u0026amp; Professional School\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IFM Institut für Managementberatung GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/institut-fur-managementberatung/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIFM Institut für Managementberatung GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SYMPLASSON Informationstechnik GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/symplasson/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSYMPLASSON Informationstechnik GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"FachTaG Akademie GmbH - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/fachtag-akademie/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFachTaG Akademie GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"PC-COLLEGE - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/pc-college-3/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePC-COLLEGE\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"HSB Akademie - ein Bereich der HSB Personal \u0026amp; Service GmbH - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/hsb/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHSB Akademie - ein Bereich der HSB Personal \u0026amp; Service GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IT-Trainings - Dipl.-Ing. Thorsten Kebel - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/computer-systeme-dipl-ing-thorsten-kebel/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIT-Trainings - Dipl.-Ing. Thorsten Kebel\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"AKADEMIE HERKERT - FORUM VERLAG HERKERT GMBH - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/Akademie-Herkert/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAKADEMIE HERKERT - FORUM VERLAG HERKERT GMBH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"CampusLab GmbH - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/campuslab-gmbh/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCampusLab GmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISO in the Sun - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/iso-in-the-sun/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO in the Sun\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"DGI Deutsche Gesellschaft für Informationssicherheit AG - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/dgi-deutsche-gesellschaft-fuer-informationssicherheit-ag/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDGI Deutsche Gesellschaft für Informationssicherheit AG\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"OHM Professional School gGmbH - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/ohm-professional-school/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOHM Professional School gGmbH\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"NWB Akademie - NWB Verlag GmbH \u0026amp; Co. KG - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/nwb-verlag-gmbh-co-kg/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNWB Akademie - NWB Verlag GmbH \u0026amp; Co. KG\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"easylearn schweiz ag - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/easylearn-schweiz-ag/tagsueber\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eeasylearn schweiz ag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eBesondere Gruppierung\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Sofort Buchbar - 35\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSofort Buchbar\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e35\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"BBB - Der Bundesverband der Träger beruflicher Bildung - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/bbb-der-bundesverband-der-traeger-beruflicher-bildung\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBBB - Der Bundesverband der Träger beruflicher Bildung\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Bildungsgutschein - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/bildungsgutschein\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBildungsgutschein\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Beliebte Kurse - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/it/it-sicherheit/tagsueber/beliebte-kurse\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBeliebte Kurse\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden is-disabled\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-disabled\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGruppierung - nicht relevant / bekannt\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--syndicates\" data-expand-title=\"Mehr\" data-collapse-title=\"Weniger\" href=\"#\"\u003eMehr\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section usp-box\"\u003e\u003ch3\u003eMehr lernen? Weiterbildung beginnt auf Springest.de\u003c/h3\u003e\u003cul class=\"usp-list--colored usp-list--default\"\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"school\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAlles zum Lernen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 52.000 Weiterbildungen, Kurse, Seminare und E-Learnings.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"phone\"\u003e\u003ch4 class=\"usp-list__title\"\u003eHilfe beim Suchen und Buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eStellen Sie eine Frage, nutzen Sie unseren \u003ca href='https://springestsupport.freshdesk.com/de/support/solutions/103000218542'\u003eKundenservice\u003c/a\u003e oder rufen Sie einen unserer Bildungsberater an.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"thumb_up\"\u003e\u003ch4 class=\"usp-list__title\"\u003eKostenlos Informationen beantragen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eAlle Informationen kostenlos erhalten, vergleichen und mit Ihren Kollegen oder Vorgesetzten besprechen.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"star\"\u003e\u003ch4 class=\"usp-list__title\"\u003eBewertungen und Teilnehmer\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eMehr als 10.000 unabhängige Bewertungen helfen Ihnen, den besten Bildungsanbieter zu finden.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"business\"\u003e\u003ch4 class=\"usp-list__title\"\u003eAuch für Ihre Organisation\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eGruppenrabatt, Inhouse Schulung und Social Learning mit Kollegen: Jederzeit verfügbar.\u003c/span\u003e\u003c/li\u003e\u003cli class=\"usp-list__item with-icon-circle\" data-icon=\"event_available\"\u003e\u003ch4 class=\"usp-list__title\"\u003eSofort buchen\u003c/h4\u003e\u003cspan class=\"is-meta-text\"\u003eSofort anfangen? Buchen Sie und der Bildungsanbieter hilft Ihnen weiter.\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003ch3 class=\"panel__content-title\"\u003e\u003cspan\u003e8\u003c/span\u003e Fragen zu Automation und ICT/IT\u003c/h3\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich möchte Microsoft Office / Excel / Outlook erlernen \" href=\"/fragen-antworten/ich-moechte-microsoft-office-excel-outlook-erlernen\"\u003eIch möchte Microsoft Office / Excel / Outlook erlernen \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Ich suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \" href=\"/fragen-antworten/ich-suche-einen-programmier-grundkurs-c-java-oder-php-welche-weiterbildungen-gibt-es\"\u003eIch suche einen programmier Grundkurs C++, Java, oder PHP. Welche Weiterbildungen gibt es? \u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Gibt es ein passendes SAP Seminar?\" href=\"/fragen-antworten/seminar-sap-gesucht\"\u003eGibt es ein passendes SAP Seminar?\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eGefragt von \u003cdiv class=\"avatar avatar--tiny\"\u003e\u003c/div\u003e Anonym (1 Kommentar(e))\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/fragen/it\"\u003eFragen zur Kategorie Automation und ICT/IT ansehen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eWeiterbildungstrends\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"IT-Sicherheit\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e182\u003c/strong\u003e Kurse\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e51\u003c/strong\u003e Anbieter\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003cstrong class=\"count\"\u003e12\u003c/strong\u003e Bewertungen\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e7.4\u003c/strong\u003e Bewertung \u003cspan class=\"meta-info\"\u003e(durchschnittlich)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 1,00 - € 4.380,00\u003c/strong\u003e Preisklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-19T10:05:31.514Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":1,"filter_types":["moments"],"filters":["tagsueber"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation","funnel_ab_050":true}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-19T10:05:31.514Z","subject_id":1266,"subject_name":"IT-Sicherheit","category_name":"Automation und ICT/IT","filter_size":1,"filter_types":["moments"],"filters":["tagsueber"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation","funnel_ab_050":true}}],"filters":"/tagsueber"}