{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-school\"\u003e\u003ci class=\"ma-school material-icons icon--medium\"\u003eschool\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eSuivez vos ambitions\u003c/h3\u003e\u003cp\u003ePlus de 5.000 formations à votre disposition sur notre plateforme.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e7 Formations Cybersecurity\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eVoir aussi: \u003ca title=\"34 Formations Développeur / Developer\" rel=\"nofollow\" href=\"/programmation-informatique/developpeur/4-10-jours\"\u003eDéveloppeur / Developer\u003c/a\u003e, \u003ca title=\"53 Formations CompTIA\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/comptia/4-10-jours\"\u003eCompTIA\u003c/a\u003e, \u003ca title=\"27 Formations Data privacy\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/data-privacy/4-10-jours\"\u003eData privacy\u003c/a\u003e, \u003ca title=\"3 Formations IT Architect\" rel=\"nofollow\" href=\"/programmation-informatique/architect/4-10-jours\"\u003eIT Architect\u003c/a\u003e et \u003ca title=\"11 Formations Hacking\" rel=\"nofollow\" href=\"/programmation-informatique/hacking/4-10-jours\"\u003eHacking\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eVoir aussi: \u003ca title=\"34 Formations Développeur / Developer\" rel=\"nofollow\" href=\"/programmation-informatique/developpeur/4-10-jours\"\u003eDéveloppeur / Developer\u003c/a\u003e, \u003ca title=\"53 Formations CompTIA\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/comptia/4-10-jours\"\u003eCompTIA\u003c/a\u003e et \u003ca title=\"27 Formations Data privacy\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/data-privacy/4-10-jours\"\u003eData privacy\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 filtre actif\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Tri\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003ede 4 à 10 jours\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eModifier les filtres\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Comparer\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChanger tri\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eTrier\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/automatisation-ICT-IT/cyber-security/4-10-jours\" data-link-type=\"sort\" href=\"#\"\u003ePertinence et commentaires\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/4-10-jours/price-high-low\" data-link-type=\"sort\" href=\"#\"\u003ePrix (élevé \u0026gt; bas)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/4-10-jours/price-low-high\" data-link-type=\"sort\" href=\"#\"\u003ePrix (bas \u0026gt; élevé)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/4-10-jours/duration-high-low\" data-link-type=\"sort\" href=\"#\"\u003eDurée (long \u0026gt; court)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/4-10-jours/duration-low-high\" data-link-type=\"sort\" href=\"#\"\u003eDurée (court \u0026gt; long)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-750148\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-750148\" id=\"training-750148\" value=\"750148\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: CISM - Certified Information Security Management\" href=\"/international-training-network/cism-certified-information-security-management\"\u003eCISM - Certified Information Security Management\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo International Training Network\" title=\"Logo International Training Network\" src=\"https://static-3.springest.com/uploads/institute/logo/27466/thumb_international-training-network-e0f0575217d7f04051ea1ac100da1c0e.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eInformation générale Introduction Cette formation CISM, Responsable Sécurité certifié ISACA couvre en 4 journées toutes les compétences pou…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.695 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003cspan class=\"product-level\"\u003eDébutant\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo International Training Network\" title=\"Logo International Training Network\" src=\"https://static-3.springest.com/uploads/institute/logo/27466/thumb_international-training-network-e0f0575217d7f04051ea1ac100da1c0e.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/international-training-network/cism-certified-information-security-management/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/international-training-network/cism-certified-information-security-management/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-785575\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-785575\" id=\"training-785575\" value=\"785575\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\"\u003eUnderstanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e1 début garanti\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 08 avril 2024 et 1 autre date\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.995 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1005130\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1005130\" id=\"training-1005130\" value=\"1005130\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Microsoft Cybersecurity Architect (SC-100) [M-SC100]\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100\"\u003eMicrosoft Cybersecurity Architect (SC-100) [M-SC100]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e1 début garanti\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 29 avril 2024 et 10 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Tru…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.145 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1009378\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1009378\" id=\"training-1009378\" value=\"1009378\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Microsoft Cybersecurity Architect | SC-100 | SC100\" href=\"/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100\"\u003eMicrosoft Cybersecurity Architect | SC-100 | SC100\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 29 avril 2024 et 8 autres dates\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eA cet endroit: mardi 21 mai 2024 à Nieuwegein Engels et 3 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eMicrosoft Cybersecurity Architect | SC-100 This course prepares students with the background to design and evaluate cybersecurity strategie…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.095 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: \u0026quot;Excl. Examen \u0026amp;amp; BTW\u0026quot;\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain a une moyenne de \u003cstrong\u003e7,6\u003c/strong\u003e (basée sur \u003cstrong\u003e57\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-581555\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-581555\" id=\"training-581555\" value=\"581555\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Cybersecurity Foundations [9701]\" href=\"/global-knowledge/cybersecurity-foundations-9701\"\u003eCybersecurity Foundations [9701]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 10 juin 2024 et 2 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network. In this cybersecurity course, …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.995 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/cybersecurity-foundations-9701/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/cybersecurity-foundations-9701/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-816620\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-816620\" id=\"training-816620\" value=\"816620\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Cybersecurity Fundamentals training and certification\" href=\"/imf-academy-2/cyber-security-fundamentals-training-and-certification\"\u003eCybersecurity Fundamentals training and certification\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo IMF Academy\" title=\"Logo IMF Academy\" src=\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMercredi 17 avril 2024 à Amsterdam et 1 autre date\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eWhy become a Cybersecurity professional? Why become a cybersecurity professional? Why take the ISACA Cybersecurity Fundamentals exam? Becau…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e4.380 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: VAT not included\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 8 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 8\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo IMF Academy\" title=\"Logo IMF Academy\" src=\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf-academy-2/cyber-security-fundamentals-training-and-certification/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf-academy-2/cyber-security-fundamentals-training-and-certification/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1064601\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1064601\" id=\"training-1064601\" value=\"1064601\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: BCS Certificate in Information Security Management Principles (CISMP) [CISMP]\" href=\"/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp\"\u003eBCS Certificate in Information Security Management Principles (CISMP) [CISMP]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 10 juin 2024 et 2 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course is to provide training for their CISMP examination. The course will provide you with the knowledge and understanding o…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.595 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Comparer\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\",\"price\":\"2995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-15\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect (SC-100) [M-SC100]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), secur\\u0026amp;hellip;\",\"startDate\":\"2024-04-29\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/microsoft-cybersecurity-architect-m-sc100\",\"price\":\"2145.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-23\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect | SC-100 | SC100\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\",\"description\":\"Microsoft Cybersecurity Architect | SC-100 This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Gover\\u0026amp;hellip;\",\"startDate\":\"2024-04-29\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Dynamic Virtual Classroom - Engels\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100\",\"price\":\"2095.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-02-28\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/dutchtrain#EducationalOrganization\",\"url\":\"https://fr.springest.be/dutchtrain\",\"name\":\"DutchTrain\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity Foundations [9701]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network. In this cybersecurity course, you will gain a global perspective of the c\\u0026amp;hellip;\",\"startDate\":\"2024-06-10\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/cybersecurity-foundations-9701\",\"price\":\"2995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-03-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity Fundamentals training and certification\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\",\"description\":\"Why become a Cybersecurity professional? Why become a cybersecurity professional? Why take the ISACA Cybersecurity Fundamentals exam? Because the protection of information is critica\\u0026amp;hellip;\",\"startDate\":\"2024-04-17\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Amsterdam\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.370216\",\"longitude\":\"4.895168\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/imf-academy-2/cyber-security-fundamentals-training-and-certification\",\"price\":\"4380.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-10-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/imf-academy-2#EducationalOrganization\",\"url\":\"https://fr.springest.be/imf-academy-2\",\"name\":\"IMF Academy\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"BCS Certificate in Information Security Management Principles (CISMP) [CISMP]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW This course is to provide training for their CISMP examination. The course will provide you with the knowledge and understanding of the main principals required to be an eff\\u0026amp;hellip;\",\"startDate\":\"2024-06-10\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp\",\"price\":\"2595.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-30\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003cdiv class=\"message--session-filters\"\u003eLes résultats de recherche sont en ce moment filtrés selon vos préférences.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAjouter filtres\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/automatisation-ICT-IT/cyber-security\"\u003eRetirer tous les filtres\u003c/a\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePopulaire\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Début garanti - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/debut-garanti\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDébut garanti\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePrix\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 2.000 € à 4.000 € - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 2.000 € à 4.000 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4.000 € and higher - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/4000-higher\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4.000 € and higher\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eNiveau:\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Niveaux - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/niveaux\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiveaux\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eType\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"En classe - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/en-classe\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEn classe\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Classe virtuelle - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/classe-virtuelle\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eClasse virtuelle\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDate de début\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"date de début connue - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/ate-connue\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edate de début connue\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"avril 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/avril-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eavril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"mai 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/mai-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emai 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juin 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/juin-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuin 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juillet 2024 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/juillet-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuillet 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"août 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/aout-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eaoût 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"septembre 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/septembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eseptembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"octobre 2024 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/octobre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eoctobre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"novembre 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/novembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enovembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"décembre 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/decembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edécembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"janvier 2025 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/janvier-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejanvier 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"février 2025 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/fevrier-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003efévrier 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Plus\" data-collapse-title=\"Moins\" href=\"#\"\u003ePlus\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDurée\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 jour max. - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/1-jour/4-10-jours\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 jour max.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 2 à 3 jours - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/2-3-jours/4-10-jours\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 2 à 3 jours\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"de 4 à 10 jours - 7\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 4 à 10 jours\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMax Participants\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 à 10 participants - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/6-a-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 à 10 participants\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"plus de 10 participants - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eplus de 10 participants\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eLangue\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Anglais - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/en\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAnglais\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Français - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/fr\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrançais\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Néerlandais (Flandre) - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/nl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNéerlandais (Flandre)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eFournisseur\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Global Knowledge Belgium BV - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/global-knowledge\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Belgium BV\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IMF Academy - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/imf-academy-2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIMF Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"DutchTrain - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/dutchtrain\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"International Training Network - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/international-training-network\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInternational Training Network\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003ch3 class=\"panel__content-title\"\u003e2 questions à propos de la catégorie Automatisation \u0026amp; ICT/IT\u003c/h3\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Devenir ingénieur MCSE à distance\" href=\"/qa/devenir-ingenieur-mcse-a-distance\"\u003eDevenir ingénieur MCSE à distance\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003ca class=\"member-avatar--link avatar avatar--tiny\" href=\"https://fr.springest.be/profile/kouassi\"\u003e\u003c/a\u003e \u003ca class=\"member-profile-link\" href=\"https://fr.springest.be/profile/kouassi\"\u003ekouassi /\u003c/a\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Développer des logiciels sécurisés\" href=\"/qa/developper-des-logiciels-securises\"\u003eDévelopper des logiciels sécurisés\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003ca class=\"member-avatar--link avatar avatar--tiny\" href=\"https://fr.springest.be/profile/ryan-d\"\u003e\u003c/a\u003e \u003ca class=\"member-profile-link\" href=\"https://fr.springest.be/profile/ryan-d\"\u003eRyan D.\u003c/a\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/questions/automatisation-ICT-IT\"\u003eVoir toutes les questions\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eRésultats de recherche\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"Cybersecurity\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e30\u003c/strong\u003e cours\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e11\u003c/strong\u003e instituts de formations\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e9.1\u003c/strong\u003e note \u003cspan class=\"meta-info\"\u003e(moyenne)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e115,00 € - 4.380,00 €\u003c/strong\u003e (fourchette de prix)\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-28T20:41:42.579Z","subject_id":7064,"subject_name":"Cybersecurity","category_name":"Automatisation \u0026 ICT/IT","filter_size":1,"filter_types":["duration_days"],"filters":["4-10-jours"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-28T20:41:42.579Z","subject_id":7064,"subject_name":"Cybersecurity","category_name":"Automatisation \u0026 ICT/IT","filter_size":1,"filter_types":["duration_days"],"filters":["4-10-jours"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}}],"filters":"/4-10-jours"}