{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-business\"\u003e\u003ci class=\"ma-business material-icons icon--medium\"\u003ebusiness\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003ePour votre entreprise également\u003c/h3\u003e\u003cp\u003eDes formations intra-entreprises faites sur mesure pour vous.\t\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e30 Formations Cybersecurity\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eVoir aussi: \u003ca title=\"34 Formations Développeur / Developer\" href=\"/programmation-informatique/developpeur\"\u003eDéveloppeur / Developer\u003c/a\u003e, \u003ca title=\"53 Formations CompTIA\" href=\"/automatisation-ICT-IT/comptia\"\u003eCompTIA\u003c/a\u003e, \u003ca title=\"27 Formations Data privacy\" href=\"/automatisation-ICT-IT/data-privacy\"\u003eData privacy\u003c/a\u003e, \u003ca title=\"3 Formations IT Architect\" href=\"/programmation-informatique/architect\"\u003eIT Architect\u003c/a\u003e et \u003ca title=\"10 Formations Hacking\" href=\"/programmation-informatique/hacking\"\u003eHacking\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eVoir aussi: \u003ca title=\"34 Formations Développeur / Developer\" href=\"/programmation-informatique/developpeur\"\u003eDéveloppeur / Developer\u003c/a\u003e, \u003ca title=\"53 Formations CompTIA\" href=\"/automatisation-ICT-IT/comptia\"\u003eCompTIA\u003c/a\u003e et \u003ca title=\"27 Formations Data privacy\" href=\"/automatisation-ICT-IT/data-privacy\"\u003eData privacy\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e Filters\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Tri\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Comparer\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChanger tri\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eTrier\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/automatisation-ICT-IT/cyber-security\" data-link-type=\"sort\" href=\"#\"\u003ePertinence et commentaires\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/price-high-low\" data-link-type=\"sort\" href=\"#\"\u003ePrix (élevé \u0026gt; bas)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/price-low-high\" data-link-type=\"sort\" href=\"#\"\u003ePrix (bas \u0026gt; élevé)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/duration-high-low\" data-link-type=\"sort\" href=\"#\"\u003eDurée (long \u0026gt; court)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/duration-low-high\" data-link-type=\"sort\" href=\"#\"\u003eDurée (court \u0026gt; long)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-669008\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-669008\" id=\"training-669008\" value=\"669008\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/158458/thumbnail-server-90389.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Web Applications, Infrastructure and Security\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security\"\u003eWeb Applications, Infrastructure and Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/158458/thumbnail-server-90389.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eThis Web Applications, Infrastructure and Security training offers a unique overall view of Web Applications, Infrastructure, Architecture …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.295 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 heures\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"Web Applications, Infrastructure and Security a une moyenne de 9,1\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security#id-commentaires\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 9,1\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(19 commentaire(s))\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,1 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eWeb Infra Academy (EN) a une moyenne de \u003cstrong\u003e9,1\u003c/strong\u003e (basée sur \u003cstrong\u003e24\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1060325\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1060325\" id=\"training-1060325\" value=\"1060325\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2019443/thumbnail-Cyber_Security_Expert.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity - Cyber Security Expert - Masterprogramma - Een uniek trainings- en certificeringsprogramma!\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma\"\u003eCybersecurity - Cyber Security Expert - Masterprogramma - Een uniek trainings- en certificeringsprogramma!\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2019443/thumbnail-Cyber_Security_Expert.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCyber Security Expert - Masteropleiding Een uniek opleidings- en certificeringsprogramma! De masteropleiding Cyber Security geeft u alle va…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e2.950 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"Cybersecurity - Cyber Security Expert - Masterprogramma - Een uniek trainings- en certificeringsprogramma! a une moyenne de 9,7\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma#id-commentaires\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 9,7\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(3 commentaire(s))\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eAdding Value Consulting (AVC) a une moyenne de \u003cstrong\u003e9,5\u003c/strong\u003e (basée sur \u003cstrong\u003e139\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-467191\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-467191\" id=\"training-467191\" value=\"467191\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersécurité: A faire et à éviter\" href=\"/febelfin-academy/cybersecurite-a-faire-et-a-eviter\"\u003eCybersécurité: A faire et à éviter\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Febelfin Academy\" title=\"Logo Febelfin Academy\" src=\"https://static-4.springest.com/uploads/institute/logo/17608/thumb_febelfin-academy-670949a49ade4821231b62662283d1e4.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eCette formation en e-learning a comme objectif d’apprendre à chaque collaborateur à déceler les pièges et à appliquer des techniques simple…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e115 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: Prijs: prestatie in het kader van permanente beroepsopleiding, vrijgesteld van BTW\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eFebelfin Academy a une moyenne de \u003cstrong\u003e8\u003c/strong\u003e (basée sur \u003cstrong\u003e1\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Febelfin Academy\" title=\"Logo Febelfin Academy\" src=\"https://static-4.springest.com/uploads/institute/logo/17608/thumb_febelfin-academy-670949a49ade4821231b62662283d1e4.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/febelfin-academy/cybersecurite-a-faire-et-a-eviter/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/febelfin-academy/cybersecurite-a-faire-et-a-eviter/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-467119\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-467119\" id=\"training-467119\" value=\"467119\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity: Do\u0026#39;s \u0026amp; Don\u0026#39;ts\" href=\"/febelfin-academy/cybersecurity-do-s-don-ts\"\u003eCybersecurity: Do\u0026#39;s \u0026amp; Don\u0026#39;ts\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Febelfin Academy\" title=\"Logo Febelfin Academy\" src=\"https://static-4.springest.com/uploads/institute/logo/17608/thumb_febelfin-academy-670949a49ade4821231b62662283d1e4.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze e-learning cursus heeft als objectief om iedere werknemer op een interactieve manier te wijzen op de mogelijke valkuilen van cybercrim…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e115 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: Prijs: prestatie in het kader van permanente beroepsopleiding, vrijgesteld van BTW\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eFebelfin Academy a une moyenne de \u003cstrong\u003e8\u003c/strong\u003e (basée sur \u003cstrong\u003e1\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Febelfin Academy\" title=\"Logo Febelfin Academy\" src=\"https://static-4.springest.com/uploads/institute/logo/17608/thumb_febelfin-academy-670949a49ade4821231b62662283d1e4.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/febelfin-academy/cybersecurity-do-s-don-ts/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/febelfin-academy/cybersecurity-do-s-don-ts/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-750148\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-750148\" id=\"training-750148\" value=\"750148\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: CISM - Certified Information Security Management\" href=\"/international-training-network/cism-certified-information-security-management\"\u003eCISM - Certified Information Security Management\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo International Training Network\" title=\"Logo International Training Network\" src=\"https://static-3.springest.com/uploads/institute/logo/27466/thumb_international-training-network-e0f0575217d7f04051ea1ac100da1c0e.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eInformation générale Introduction Cette formation CISM, Responsable Sécurité certifié ISACA couvre en 4 journées toutes les compétences pou…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.695 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003cspan class=\"product-level\"\u003eDébutant\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo International Training Network\" title=\"Logo International Training Network\" src=\"https://static-3.springest.com/uploads/institute/logo/27466/thumb_international-training-network-e0f0575217d7f04051ea1ac100da1c0e.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/international-training-network/cism-certified-information-security-management/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/international-training-network/cism-certified-information-security-management/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1113992\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1113992\" id=\"training-1113992\" value=\"1113992\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Cybersecurity Fundamentals\" href=\"/b2b-learning/cybersecurity-fundamentals\"\u003eCybersecurity Fundamentals\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo B2B Learning\" title=\"Logo B2B Learning\" src=\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eLundi 08 avril 2024 à Bruxelles - Français et 1 autre date\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDiscover the secrets of cybersecurity: a 2-day immersion course Dive into the heart of cyber security with our intensive, interactive cours…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e1.195 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: Prices for open courses are valid for one person. All prices are exclusive 21% vat.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e14 heures\u003c/span\u003e\u003cspan class=\"product-level\"\u003eDébutant\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo B2B Learning\" title=\"Logo B2B Learning\" src=\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/b2b-learning/cybersecurity-fundamentals/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/b2b-learning/cybersecurity-fundamentals/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1113990\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1113990\" id=\"training-1113990\" value=\"1113990\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Formation à distance: Cyber Security Master\u0026#39;s Program - Blended Learning\" href=\"/b2b-learning/cyber-security-master-s-program-blended-learning\"\u003eCyber Security Master\u0026#39;s Program - Blended Learning\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo B2B Learning\" title=\"Logo B2B Learning\" src=\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003e365 day-access / 1 introduction course / 4 specialist courses / 2 electives Our Cyber Security Expert Master’s Program provides cybersecuri…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eFormation à distance\u003c/span\u003e\u003cspan class=\"price\"\u003e2.750 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: This course includes the certification\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eIntermédiaire\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo B2B Learning\" title=\"Logo B2B Learning\" src=\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/b2b-learning/cyber-security-master-s-program-blended-learning/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/b2b-learning/cyber-security-master-s-program-blended-learning/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1008383\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1008383\" id=\"training-1008383\" value=\"1008383\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dutchtrain/cybersecurity-privacy-training#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/1702020/thumbnail-Cybersecurity___Privacy_training__NEW_500x292__1_.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity \u0026amp; Privacy Training\" href=\"/dutchtrain/cybersecurity-privacy-training\"\u003eCybersecurity \u0026amp; Privacy Training\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dutchtrain/cybersecurity-privacy-training#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/1702020/thumbnail-Cybersecurity___Privacy_training__NEW_500x292__1_.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCybersecurity \u0026amp; Privacy Training Werken binnen een organisatie betekent werken met gegevens. Elke dag worden gegevens geregistreerd, gemute…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e129 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: Excl. BTW\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain a une moyenne de \u003cstrong\u003e7,6\u003c/strong\u003e (basée sur \u003cstrong\u003e57\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/cybersecurity-privacy-training/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/cybersecurity-privacy-training/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-760774\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-760774\" id=\"training-760774\" value=\"760774\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/476861/thumbnail-computer-1213930.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: WEBINAR Web Applications, Infrastructure and Security\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security\"\u003eWEBINAR Web Applications, Infrastructure and Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/476861/thumbnail-computer-1213930.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eThis is a webinar: live connected to the instructor using Skype or Zoom from a location that suits you. This Web Applications, Infrastructu…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e1.599 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this webinaire / webinar.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 heures\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,1 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eWeb Infra Academy (EN) a une moyenne de \u003cstrong\u003e9,1\u003c/strong\u003e (basée sur \u003cstrong\u003e24\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-891330\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-891330\" id=\"training-891330\" value=\"891330\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dutchtrain/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-exam-200-201#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/1018231/thumbnail-Understanding_Cisco_Cybersecurity_Operations_Fundamentals___CBROPS___200-201_500x292.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Understanding Cisco Cybersecurity Operations Fundamentals (CBROPS) | Exam 200-201\" href=\"/dutchtrain/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-exam-200-201\"\u003eUnderstanding Cisco Cybersecurity Operations Fundamentals (CBROPS) | Exam 200-201\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dutchtrain/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-exam-200-201#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/1018231/thumbnail-Understanding_Cisco_Cybersecurity_Operations_Fundamentals___CBROPS___200-201_500x292.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eUnderstanding Cisco Cybersecurity Operations Fundamentals (CBROPS) | Exam 200-201 The Understanding Cisco Cybersecurity Operations Fundamen…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e395 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: \u0026quot;Excl. Examen \u0026amp;amp; BTW\u0026quot;\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain a une moyenne de \u003cstrong\u003e7,6\u003c/strong\u003e (basée sur \u003cstrong\u003e57\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-exam-200-201/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/understanding-cisco-cybersecurity-operations-fundamentals-cbrops-exam-200-201/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-785575\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-785575\" id=\"training-785575\" value=\"785575\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\"\u003eUnderstanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e1 début garanti\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 08 avril 2024 et 1 autre date\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.995 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1005130\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1005130\" id=\"training-1005130\" value=\"1005130\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Microsoft Cybersecurity Architect (SC-100) [M-SC100]\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100\"\u003eMicrosoft Cybersecurity Architect (SC-100) [M-SC100]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e1 début garanti\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 29 avril 2024 et 10 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Tru…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.145 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077564\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077564\" id=\"training-1077564\" value=\"1077564\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/introductie-cursus-cyber-security-elearning-een-uniek-leer-en-certificeringstraject#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2122459/thumbnail-cyber_sec.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cyber Security - Introductie Cursus - eLearning\" href=\"/adding-value-consulting-avc/introductie-cursus-cyber-security-elearning-een-uniek-leer-en-certificeringstraject\"\u003eCyber Security - Introductie Cursus - eLearning\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/introductie-cursus-cyber-security-elearning-een-uniek-leer-en-certificeringstraject#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2122459/thumbnail-cyber_sec.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCyber Security - Introductie Cursus - eLearning De cursus Cyber Security voor beginners van AVC is ontworpen om je een basiskennis te geven…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e395 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eAdding Value Consulting (AVC) a une moyenne de \u003cstrong\u003e9,5\u003c/strong\u003e (basée sur \u003cstrong\u003e139\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/introductie-cursus-cyber-security-elearning-een-uniek-leer-en-certificeringstraject/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/introductie-cursus-cyber-security-elearning-een-uniek-leer-en-certificeringstraject/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1010431\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1010431\" id=\"training-1010431\" value=\"1010431\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/comptia-cysa-1-jaar-toegang-inclusief-examen-elearning#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/1809634/thumbnail-Get_it_certified.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: CompTIA Cybersecurity Analyst (CySA+), inclusief examen – eLearning\" href=\"/adding-value-consulting-avc/comptia-cysa-1-jaar-toegang-inclusief-examen-elearning\"\u003eCompTIA Cybersecurity Analyst (CySA+), inclusief examen – eLearning\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/comptia-cysa-1-jaar-toegang-inclusief-examen-elearning#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/1809634/thumbnail-Get_it_certified.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCompTIA CySA+ - 1 jaar toegang, inclusief examen – eLearning CompTIA Cybersecurity Analyst (CySA+) is een prestatiegerichte kwalificatie vo…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e590 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eAdding Value Consulting (AVC) a une moyenne de \u003cstrong\u003e9,5\u003c/strong\u003e (basée sur \u003cstrong\u003e139\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/comptia-cysa-1-jaar-toegang-inclusief-examen-elearning/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/comptia-cysa-1-jaar-toegang-inclusief-examen-elearning/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1012263\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1012263\" id=\"training-1012263\" value=\"1012263\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/resilia-practitioner-inclusief-het-officiele-online-examen#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/1809844/thumbnail-RESILIA.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: RESILIA ™ Practitioner - Cyber Security, Cyberweerbaarheid -inclusief het officiële online examen\" href=\"/adding-value-consulting-avc/resilia-practitioner-inclusief-het-officiele-online-examen\"\u003eRESILIA ™ Practitioner - Cyber Security, Cyberweerbaarheid -inclusief het officiële online examen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/resilia-practitioner-inclusief-het-officiele-online-examen#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/1809844/thumbnail-RESILIA.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eRESILIA™ Practitioner - Cyber Security - inclusief het officiële online examen WAT IS RESILIA™ PRACTITIONER? RESILIA Practitioner is een kw…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e750 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eAdding Value Consulting (AVC) a une moyenne de \u003cstrong\u003e9,5\u003c/strong\u003e (basée sur \u003cstrong\u003e139\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Adding Value Consulting (AVC)\" title=\"Logo Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/resilia-practitioner-inclusief-het-officiele-online-examen/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/resilia-practitioner-inclusief-het-officiele-online-examen/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Comparer\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e1\u003cspan class=\"pagination__max-pages\"\u003e of 2\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Page 2\" href=\"/automatisation-ICT-IT/cyber-security/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Next\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/automatisation-ICT-IT/cyber-security/2\"\u003eNext \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity Fundamentals\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\",\"description\":\"Discover the secrets of cybersecurity: a 2-day immersion course Dive into the heart of cyber security with our intensive, interactive course, specially designed to transform theory a\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Bruxelles - Français\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"50.842611\",\"longitude\":\"4.367422\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/b2b-learning/cybersecurity-fundamentals\",\"price\":\"1195.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-03-07\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/b2b-learning#EducationalOrganization\",\"url\":\"https://fr.springest.be/b2b-learning\",\"name\":\"B2B Learning\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\",\"price\":\"2995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-15\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect (SC-100) [M-SC100]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), secur\\u0026amp;hellip;\",\"startDate\":\"2024-04-29\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/microsoft-cybersecurity-architect-m-sc100\",\"price\":\"2145.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-23\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAjouter filtres\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePopulaire\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Début garanti - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/debut-garanti\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDébut garanti\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePrix\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 0 € à 500 € - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/0-500\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 0 € à 500 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 500 € à 1.000 € - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/500-1000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 500 € à 1.000 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 1.000 € à 2.000 € - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/1000-2000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 1.000 € à 2.000 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"de 2.000 € à 4.000 € - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 2.000 € à 4.000 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"4.000 € and higher - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4000-higher\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4.000 € and higher\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--price\" data-expand-title=\"Plus\" data-collapse-title=\"Moins\" href=\"#\"\u003ePlus\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eNiveau:\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Niveaux - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/niveaux\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiveaux\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eType\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"En classe - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/en-classe\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEn classe\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Learning - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/e-learning\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Classe virtuelle - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/classe-virtuelle\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eClasse virtuelle\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Formation à distance - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/formation-a-distance\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFormation à distance\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDate de début\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"date de début connue - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/ate-connue\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edate de début connue\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"avril 2024 - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/avril-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eavril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"mai 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/mai-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emai 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juin 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/juin-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuin 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juillet 2024 - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/juillet-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuillet 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"août 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/aout-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eaoût 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"septembre 2024 - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/septembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eseptembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"octobre 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/octobre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eoctobre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"novembre 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/novembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enovembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"décembre 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/decembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edécembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"janvier 2025 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/janvier-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejanvier 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"février 2025 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/fevrier-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003efévrier 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Plus\" data-collapse-title=\"Moins\" href=\"#\"\u003ePlus\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDurée\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 jour max. - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/1-jour\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 jour max.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 2 à 3 jours - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/2-3-jours\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 2 à 3 jours\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 4 à 10 jours - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 4 à 10 jours\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMax Participants\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 à 10 participants - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/6-a-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 à 10 participants\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"plus de 10 participants - 14\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eplus de 10 participants\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eLangue\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Anglais - 18\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/en\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAnglais\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e18\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Néerlandais (Flandre) - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/nl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNéerlandais (Flandre)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Français - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/fr\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrançais\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eFournisseur\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"DutchTrain - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/dutchtrain\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Global Knowledge Belgium BV - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/global-knowledge\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Belgium BV\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Adding Value Consulting (AVC) - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/adding-value-consulting-avc\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAdding Value Consulting (AVC)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IMF Academy - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/imf-academy-2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIMF Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Febelfin Academy - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/febelfin-academy\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFebelfin Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Web Infra Academy (EN) - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/web-infra-academy-en\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWeb Infra Academy (EN)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"B2B Learning - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/b2b-learning\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eB2B Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"DiviTrain - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/divitrain\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDiviTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SUAS (a company of Schouten \u0026amp; Nelissen) - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/schouten-nelissen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSUAS (a company of Schouten \u0026amp; Nelissen)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"International Training Network - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/international-training-network\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInternational Training Network\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cybiant - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/cybiant\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCybiant\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Plus\" data-collapse-title=\"Moins\" href=\"#\"\u003ePlus\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eLabels \u0026amp; Certificats\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\" - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003ch3 class=\"panel__content-title\"\u003e2 questions à propos de la catégorie Automatisation \u0026amp; ICT/IT\u003c/h3\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Devenir ingénieur MCSE à distance\" href=\"/qa/devenir-ingenieur-mcse-a-distance\"\u003eDevenir ingénieur MCSE à distance\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003ca class=\"member-avatar--link avatar avatar--tiny\" href=\"https://fr.springest.be/profile/kouassi\"\u003e\u003c/a\u003e \u003ca class=\"member-profile-link\" href=\"https://fr.springest.be/profile/kouassi\"\u003ekouassi /\u003c/a\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Développer des logiciels sécurisés\" href=\"/qa/developper-des-logiciels-securises\"\u003eDévelopper des logiciels sécurisés\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003ca class=\"member-avatar--link avatar avatar--tiny\" href=\"https://fr.springest.be/profile/ryan-d\"\u003e\u003c/a\u003e \u003ca class=\"member-profile-link\" href=\"https://fr.springest.be/profile/ryan-d\"\u003eRyan D.\u003c/a\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/questions/automatisation-ICT-IT\"\u003eVoir toutes les questions\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eRésultats de recherche\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"Cybersecurity\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e30\u003c/strong\u003e cours\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e11\u003c/strong\u003e instituts de formations\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e9.1\u003c/strong\u003e note \u003cspan class=\"meta-info\"\u003e(moyenne)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e115,00 € - 4.380,00 €\u003c/strong\u003e (fourchette de prix)\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-29T11:28:58.844Z","subject_id":7064,"subject_name":"Cybersecurity","category_name":"Automatisation \u0026 ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"ab_050_mobile_subject_cta":"button_variation"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-29T11:28:58.844Z","subject_id":7064,"subject_name":"Cybersecurity","category_name":"Automatisation \u0026 ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"ab_050_mobile_subject_cta":"button_variation"}}],"filters":""}