{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-school\"\u003e\u003ci class=\"ma-school material-icons icon--medium\"\u003eschool\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eSuivez vos ambitions\u003c/h3\u003e\u003cp\u003ePlus de 5.000 formations à votre disposition sur notre plateforme.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e14 Formations Cybersecurity\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eVoir aussi: \u003ca title=\"34 Formations Développeur / Developer\" rel=\"nofollow\" href=\"/programmation-informatique/developpeur/plus-de-10-participants\"\u003eDéveloppeur / Developer\u003c/a\u003e, \u003ca title=\"53 Formations CompTIA\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/comptia/plus-de-10-participants\"\u003eCompTIA\u003c/a\u003e, \u003ca title=\"27 Formations Data privacy\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/data-privacy/plus-de-10-participants\"\u003eData privacy\u003c/a\u003e, \u003ca title=\"3 Formations IT Architect\" rel=\"nofollow\" href=\"/programmation-informatique/architect/plus-de-10-participants\"\u003eIT Architect\u003c/a\u003e et \u003ca title=\"11 Formations Hacking\" rel=\"nofollow\" href=\"/programmation-informatique/hacking/plus-de-10-participants\"\u003eHacking\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eVoir aussi: \u003ca title=\"34 Formations Développeur / Developer\" rel=\"nofollow\" href=\"/programmation-informatique/developpeur/plus-de-10-participants\"\u003eDéveloppeur / Developer\u003c/a\u003e, \u003ca title=\"53 Formations CompTIA\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/comptia/plus-de-10-participants\"\u003eCompTIA\u003c/a\u003e et \u003ca title=\"27 Formations Data privacy\" rel=\"nofollow\" href=\"/automatisation-ICT-IT/data-privacy/plus-de-10-participants\"\u003eData privacy\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 filtre actif\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Tri\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003eplus de 10 participants\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eModifier les filtres\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Comparer\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eChanger tri\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eTrier\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants\" data-link-type=\"sort\" href=\"#\"\u003ePertinence et commentaires\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/price-high-low\" data-link-type=\"sort\" href=\"#\"\u003ePrix (élevé \u0026gt; bas)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/price-low-high\" data-link-type=\"sort\" href=\"#\"\u003ePrix (bas \u0026gt; élevé)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/duration-high-low\" data-link-type=\"sort\" href=\"#\"\u003eDurée (long \u0026gt; court)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/duration-low-high\" data-link-type=\"sort\" href=\"#\"\u003eDurée (court \u0026gt; long)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-669008\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-669008\" id=\"training-669008\" value=\"669008\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/158458/thumbnail-server-90389.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Web Applications, Infrastructure and Security\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security\"\u003eWeb Applications, Infrastructure and Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/158458/thumbnail-server-90389.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eThis Web Applications, Infrastructure and Security training offers a unique overall view of Web Applications, Infrastructure, Architecture …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.295 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 heures\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"Web Applications, Infrastructure and Security a une moyenne de 9,1\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security#id-commentaires\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 9,1\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(19 commentaire(s))\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,1 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eWeb Infra Academy (EN) a une moyenne de \u003cstrong\u003e9,1\u003c/strong\u003e (basée sur \u003cstrong\u003e24\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/web-applications-infrastructure-and-security/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-750148\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-750148\" id=\"training-750148\" value=\"750148\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: CISM - Certified Information Security Management\" href=\"/international-training-network/cism-certified-information-security-management\"\u003eCISM - Certified Information Security Management\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo International Training Network\" title=\"Logo International Training Network\" src=\"https://static-3.springest.com/uploads/institute/logo/27466/thumb_international-training-network-e0f0575217d7f04051ea1ac100da1c0e.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eInformation générale Introduction Cette formation CISM, Responsable Sécurité certifié ISACA couvre en 4 journées toutes les compétences pou…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.695 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003cspan class=\"product-level\"\u003eDébutant\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo International Training Network\" title=\"Logo International Training Network\" src=\"https://static-3.springest.com/uploads/institute/logo/27466/thumb_international-training-network-e0f0575217d7f04051ea1ac100da1c0e.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/international-training-network/cism-certified-information-security-management/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/international-training-network/cism-certified-information-security-management/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1113992\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1113992\" id=\"training-1113992\" value=\"1113992\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Cybersecurity Fundamentals\" href=\"/b2b-learning/cybersecurity-fundamentals\"\u003eCybersecurity Fundamentals\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo B2B Learning\" title=\"Logo B2B Learning\" src=\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eLundi 08 avril 2024 à Bruxelles - Français et 1 autre date\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDiscover the secrets of cybersecurity: a 2-day immersion course Dive into the heart of cyber security with our intensive, interactive cours…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e1.195 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: Prices for open courses are valid for one person. All prices are exclusive 21% vat.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e14 heures\u003c/span\u003e\u003cspan class=\"product-level\"\u003eDébutant\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo B2B Learning\" title=\"Logo B2B Learning\" src=\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/b2b-learning/cybersecurity-fundamentals/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/b2b-learning/cybersecurity-fundamentals/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-760774\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-760774\" id=\"training-760774\" value=\"760774\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/476861/thumbnail-computer-1213930.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: WEBINAR Web Applications, Infrastructure and Security\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security\"\u003eWEBINAR Web Applications, Infrastructure and Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/476861/thumbnail-computer-1213930.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eThis is a webinar: live connected to the instructor using Skype or Zoom from a location that suits you. This Web Applications, Infrastructu…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e1.599 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this webinaire / webinar.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 heures\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,1 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eWeb Infra Academy (EN) a une moyenne de \u003cstrong\u003e9,1\u003c/strong\u003e (basée sur \u003cstrong\u003e24\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Web Infra Academy (EN)\" title=\"Logo Web Infra Academy (EN)\" src=\"https://static-4.springest.com/uploads/institute/logo/23599/thumb_marcel-punselie-bf7c1e10c7f21312158aceaadc77c6c5.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/web-infra-academy-en/webinar-web-applications-infrastructure-and-security/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-785575\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-785575\" id=\"training-785575\" value=\"785575\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\"\u003eUnderstanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e1 début garanti\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 08 avril 2024 et 1 autre date\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.995 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1005130\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1005130\" id=\"training-1005130\" value=\"1005130\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Microsoft Cybersecurity Architect (SC-100) [M-SC100]\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100\"\u003eMicrosoft Cybersecurity Architect (SC-100) [M-SC100]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e1 début garanti\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 29 avril 2024 et 10 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Tru…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.145 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/microsoft-cybersecurity-architect-m-sc100/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1099285\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1099285\" id=\"training-1099285\" value=\"1099285\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Cyber Security for Industrial Automation (ICS/SCADA) and OT\" href=\"/imf-academy-2/cyber-security-for-industrial-automation-ics-scada-and-ot\"\u003eCyber Security for Industrial Automation (ICS/SCADA) and OT\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo IMF Academy\" title=\"Logo IMF Academy\" src=\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eJeudi 26 septembre 2024 in Amsterdam\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eThe industrial sector suffered the most of cyber attacks last year! Industrial and civil infrastructure are an increasingly important targe…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e4.380 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: VAT not included\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 15 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 15\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 heures\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo IMF Academy\" title=\"Logo IMF Academy\" src=\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf-academy-2/cyber-security-for-industrial-automation-ics-scada-and-ot/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf-academy-2/cyber-security-for-industrial-automation-ics-scada-and-ot/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-951076\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-951076\" id=\"training-951076\" value=\"951076\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: HBO module Cybersecurity en privacy\" href=\"/schouten-nelissen/post-hbo-cybersecurity-en-privacy\"\u003eHBO module Cybersecurity en privacy\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo SUAS (a company of Schouten \u0026amp; Nelissen)\" title=\"Logo SUAS (a company of Schouten \u0026amp; Nelissen)\" src=\"https://static-1.springest.com/uploads/institute/logo/6/thumb_schouten-nelissen-621785ed9d63938aa2bef0169b10d873.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003eDébut garanti\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eJeudi 19 septembre 2024 à ZALTBOMMEL et 1 autre date\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eResultaat Je weet wat het belang van privacy is voor bedrijfsprocessen Je begrijpt de urgentie van informatiebeveiliging Je bedenkt maatreg…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e1.679,90 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 20 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eSUAS (a company of Schouten \u0026amp; Nelissen) a une moyenne de \u003cstrong\u003e8,5\u003c/strong\u003e (basée sur \u003cstrong\u003e968\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"bovnl-award__icon\"\u003e\u003cspan class=\"tooltip-parent bovnl-award__tooltip align-right\"\u003e\u003cimg src=\"https://static-1.springest.com/assets/redesign/awards/bovnl-winner-icon-2020-c861b3f9588eaa55fa936ce2463a2a8fda15a2709011275c27711ae48c0a45a6.png\" /\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGagnant du prix \"Meilleur fournisseur d'apprentissage des Pays-Bas 2020\": #3 in Vitaliteit \u0026amp; Gezondheid. Read \u003ca href=\"https://www.springest.nl/keurmerken/bovnl-18/\"\u003ehere\u003c/a\u003e about these awards.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo SUAS (a company of Schouten \u0026amp; Nelissen)\" title=\"Logo SUAS (a company of Schouten \u0026amp; Nelissen)\" src=\"https://static-1.springest.com/uploads/institute/logo/6/thumb_schouten-nelissen-621785ed9d63938aa2bef0169b10d873.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/schouten-nelissen/post-hbo-cybersecurity-en-privacy/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/schouten-nelissen/post-hbo-cybersecurity-en-privacy/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1009378\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1009378\" id=\"training-1009378\" value=\"1009378\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Microsoft Cybersecurity Architect | SC-100 | SC100\" href=\"/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100\"\u003eMicrosoft Cybersecurity Architect | SC-100 | SC100\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 29 avril 2024 et 8 autres dates\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eA cet endroit: mardi 21 mai 2024 à Nieuwegein Engels et 3 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eMicrosoft Cybersecurity Architect | SC-100 This course prepares students with the background to design and evaluate cybersecurity strategie…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.095 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: \u0026quot;Excl. Examen \u0026amp;amp; BTW\u0026quot;\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain a une moyenne de \u003cstrong\u003e7,6\u003c/strong\u003e (basée sur \u003cstrong\u003e57\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-916331\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-916331\" id=\"training-916331\" value=\"916331\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dutchtrain/cyber-security-fundamentals-csx-isaca#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/1192671/thumbnail-Cyber_Security_Fundamentals__CSX_500x292.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Cyber Security Fundamentals | CSX | ISACA + examen\" href=\"/dutchtrain/cyber-security-fundamentals-csx-isaca\"\u003eCyber Security Fundamentals | CSX | ISACA + examen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/dutchtrain/cyber-security-fundamentals-csx-isaca#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/1192671/thumbnail-Cyber_Security_Fundamentals__CSX_500x292.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCyber Security Fundamentals | CSX Het Cybersecurity Fundamentals (CSX) certificaat is het eerste onderdeel van ISACA’s Cybersecurity Nexus …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e1.300 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: \u0026quot;Excl. Examen \u0026amp;amp; BTW\u0026quot;\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain a une moyenne de \u003cstrong\u003e7,6\u003c/strong\u003e (basée sur \u003cstrong\u003e57\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/cyber-security-fundamentals-csx-isaca/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/cyber-security-fundamentals-csx-isaca/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-778297\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-778297\" id=\"training-778297\" value=\"778297\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Information Security Management Professional based on IEC/ISO 27001 incl. examen\" href=\"/dutchtrain/information-security-management-professional-based-on-iec-iso-27001-incl-examen\"\u003eInformation Security Management Professional based on IEC/ISO 27001 incl. examen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: mercredi 17 avril 2024 et 4 autres dates\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eA cet endroit: mercredi 17 avril 2024 à Nieuwegein et 2 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eInformation Security Management Professional based on IEC/ISO 27001 incl. examen Informatiebeveiliging wordt steeds belangrijker. De global…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e1.695 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: \u0026quot;Excl. Examen \u0026amp;amp; BTW\u0026quot;\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 12 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain a une moyenne de \u003cstrong\u003e7,6\u003c/strong\u003e (basée sur \u003cstrong\u003e57\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo DutchTrain\" title=\"Logo DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/information-security-management-professional-based-on-iec-iso-27001-incl-examen/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/information-security-management-professional-based-on-iec-iso-27001-incl-examen/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-581555\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-581555\" id=\"training-581555\" value=\"581555\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: Cybersecurity Foundations [9701]\" href=\"/global-knowledge/cybersecurity-foundations-9701\"\u003eCybersecurity Foundations [9701]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 10 juin 2024 et 2 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network. In this cybersecurity course, …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.995 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/cybersecurity-foundations-9701/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/cybersecurity-foundations-9701/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1064601\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1064601\" id=\"training-1064601\" value=\"1064601\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: BCS Certificate in Information Security Management Principles (CISMP) [CISMP]\" href=\"/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp\"\u003eBCS Certificate in Information Security Management Principles (CISMP) [CISMP]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eEn ligne: lundi 10 juin 2024 et 2 autres dates\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course is to provide training for their CISMP examination. The course will provide you with the knowledge and understanding o…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e2.595 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 16 people can participate in this cours.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 jours\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eNote du fournisseur: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e4,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Belgium BV a une moyenne de \u003cstrong\u003e4,5\u003c/strong\u003e (basée sur \u003cstrong\u003e2\u003c/strong\u003e avis)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Global Knowledge Belgium BV\" title=\"Logo Global Knowledge Belgium BV\" src=\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-988720\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-988720\" id=\"training-988720\" value=\"988720\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/cybiant/isaca-cybersecurity-fundamentals#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/1546035/thumbnail-ISACA_Cybersecurity_Fundamentals_Badge.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"En classe: ISACA® Cybersecurity Fundamentals\" href=\"/cybiant/isaca-cybersecurity-fundamentals\"\u003eISACA® Cybersecurity Fundamentals\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Cybiant\" title=\"Logo Cybiant\" src=\"https://static-2.springest.com/uploads/institute/logo/29514/thumb_cybiant-380a5f8fc970412f928a577a5e23551c.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/cybiant/isaca-cybersecurity-fundamentals#produit-images\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/1546035/thumbnail-ISACA_Cybersecurity_Fundamentals_Badge.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eGain Foundational knowledge of cybersecurity with ISACA® Cybersecurity Fundamentals. Get to know cybersecurity’s key concepts and roles. Cr…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e918 €\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003eTVA: hors TVA\r\n\u003c/li\u003e\u003cli\u003eEntièreté du prix: Le prix indiqué est complet, il n'y a pas de coûts supplémentaire cachés.\u003c/li\u003e\u003cli\u003eInfo supplémentaire: Prices are exclusive of VAT. VAT is calculated based on location of delivery\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eUp to 25 people can participate in this formation.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 25\u003c/span\u003e\u003cspan class=\"duration\"\u003e12 heures\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo Cybiant\" title=\"Logo Cybiant\" src=\"https://static-2.springest.com/uploads/institute/logo/29514/thumb_cybiant-380a5f8fc970412f928a577a5e23551c.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/cybiant/isaca-cybersecurity-fundamentals/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/cybiant/isaca-cybersecurity-fundamentals/demande-informations/demande-informations\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Plus d’info\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Comparer\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity Fundamentals\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\",\"description\":\"Discover the secrets of cybersecurity: a 2-day immersion course Dive into the heart of cyber security with our intensive, interactive course, specially designed to transform theory a\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Bruxelles - Français\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"50.842611\",\"longitude\":\"4.367422\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/b2b-learning/cybersecurity-fundamentals\",\"price\":\"1195.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-03-07\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/b2b-learning#EducationalOrganization\",\"url\":\"https://fr.springest.be/b2b-learning\",\"name\":\"B2B Learning\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/23649/thumb_b2b-learning-fa3f9f1648e11975065f9ec51d0e9c56.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\",\"price\":\"2995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-15\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect (SC-100) [M-SC100]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), secur\\u0026amp;hellip;\",\"startDate\":\"2024-04-29\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/microsoft-cybersecurity-architect-m-sc100\",\"price\":\"2145.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-23\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cyber Security for Industrial Automation (ICS/SCADA) and OT\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\",\"description\":\"The industrial sector suffered the most of cyber attacks last year! Industrial and civil infrastructure are an increasingly important target for cyber attacks. The risk of a cyber at\\u0026amp;hellip;\",\"startDate\":\"2024-09-26\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Amsterdam\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.370216\",\"longitude\":\"4.895168\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/imf-academy-2/cyber-security-for-industrial-automation-ics-scada-and-ot\",\"price\":\"4380.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-12-13\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/imf-academy-2#EducationalOrganization\",\"url\":\"https://fr.springest.be/imf-academy-2\",\"name\":\"IMF Academy\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/9653/thumb_imf-academy-97faba1b6bad3166e974128fae05463d.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"HBO module Cybersecurity en privacy\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/6/thumb_schouten-nelissen-621785ed9d63938aa2bef0169b10d873.png\",\"description\":\"Resultaat Je weet wat het belang van privacy is voor bedrijfsprocessen Je begrijpt de urgentie van informatiebeveiliging Je bedenkt maatregelen voor betere informatiebeveiliging Je o\\u0026amp;hellip;\",\"startDate\":\"2024-09-19\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"ZALTBOMMEL\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"51.813554\",\"longitude\":\"5.250773\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/schouten-nelissen/post-hbo-cybersecurity-en-privacy\",\"price\":\"1679.9\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-03-02\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/schouten-nelissen#EducationalOrganization\",\"url\":\"https://fr.springest.be/schouten-nelissen\",\"name\":\"SUAS (a company of Schouten \\u0026 Nelissen)\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/6/thumb_schouten-nelissen-621785ed9d63938aa2bef0169b10d873.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect | SC-100 | SC100\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\",\"description\":\"Microsoft Cybersecurity Architect | SC-100 This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Gover\\u0026amp;hellip;\",\"startDate\":\"2024-04-29\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Dynamic Virtual Classroom - Engels\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/dutchtrain/microsoft-cybersecurity-architect-sc-100-sc100\",\"price\":\"2095.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-02-28\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/dutchtrain#EducationalOrganization\",\"url\":\"https://fr.springest.be/dutchtrain\",\"name\":\"DutchTrain\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Information Security Management Professional based on IEC/ISO 27001 incl. examen\",\"image\":\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\",\"description\":\"Information Security Management Professional based on IEC/ISO 27001 incl. examen Informatiebeveiliging wordt steeds belangrijker. De globalisering van de economie leidt tot een toene\\u0026amp;hellip;\",\"startDate\":\"2024-04-17\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Dynamic Virtual Classroom\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/dutchtrain/information-security-management-professional-based-on-iec-iso-27001-incl-examen\",\"price\":\"1695.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-01-29\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/dutchtrain#EducationalOrganization\",\"url\":\"https://fr.springest.be/dutchtrain\",\"name\":\"DutchTrain\",\"logo\":\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-ea01eddc84413f105d34a27d89a5af8a.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity Foundations [9701]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW Exclusive - Investigate cybersecurity threats and master techniques needed to protect your network. In this cybersecurity course, you will gain a global perspective of the c\\u0026amp;hellip;\",\"startDate\":\"2024-06-10\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/cybersecurity-foundations-9701\",\"price\":\"2995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-03-10\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"BCS Certificate in Information Security Management Principles (CISMP) [CISMP]\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\",\"description\":\"OVERVIEW This course is to provide training for their CISMP examination. The course will provide you with the knowledge and understanding of the main principals required to be an eff\\u0026amp;hellip;\",\"startDate\":\"2024-06-10\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://fr.springest.be/global-knowledge/bcs-certificate-in-information-security-management-principles-cismp-cismp\",\"price\":\"2595.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-30\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://fr.springest.be/global-knowledge#EducationalOrganization\",\"url\":\"https://fr.springest.be/global-knowledge\",\"name\":\"Global Knowledge Belgium BV\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/11636/thumb_global-knowledge-61f1fafffab55c4fc9b5b4a3be17c654.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section ad-box\"\u003e\u003c/section\u003e\u003cdiv class=\"message--session-filters\"\u003eLes résultats de recherche sont en ce moment filtrés selon vos préférences.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eAjouter filtres\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/automatisation-ICT-IT/cyber-security\"\u003eRetirer tous les filtres\u003c/a\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePopulaire\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Début garanti - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/debut-garanti\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDébut garanti\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePrix\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 500 € à 1.000 € - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/500-1000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 500 € à 1.000 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 1.000 € à 2.000 € - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/1000-2000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 1.000 € à 2.000 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 2.000 € à 4.000 € - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 2.000 € à 4.000 €\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4.000 € and higher - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/4000-higher\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4.000 € and higher\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eNiveau:\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Niveaux - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/niveaux\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNiveaux\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eType\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"En classe - 14\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/en-classe/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEn classe\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Classe virtuelle - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/classe-virtuelle/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eClasse virtuelle\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDate de début\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"date de début connue - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/ate-connue\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edate de début connue\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"avril 2024 - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/avril-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eavril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"mai 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/mai-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emai 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juin 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/juin-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuin 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juillet 2024 - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/juillet-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuillet 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"août 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/aout-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eaoût 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"septembre 2024 - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/septembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eseptembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"octobre 2024 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/octobre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eoctobre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"novembre 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/novembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enovembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"décembre 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/decembre-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edécembre 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"janvier 2025 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/janvier-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejanvier 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"février 2025 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/fevrier-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003efévrier 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Plus\" data-collapse-title=\"Moins\" href=\"#\"\u003ePlus\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eDurée\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 jour max. - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/1-jour/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 jour max.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 2 à 3 jours - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/2-3-jours/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 2 à 3 jours\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"de 4 à 10 jours - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/4-10-jours/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ede 4 à 10 jours\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMax Participants\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 à 10 participants - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/6-a-10-participants/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 à 10 participants\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"plus de 10 participants - 14\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eplus de 10 participants\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eLangue\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Anglais - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/en/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAnglais\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Néerlandais (Flandre) - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/nl/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNéerlandais (Flandre)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Français - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/fr/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFrançais\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eFournisseur\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Global Knowledge Belgium BV - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/global-knowledge/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Belgium BV\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"DutchTrain - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/dutchtrain/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Web Infra Academy (EN) - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/web-infra-academy-en/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWeb Infra Academy (EN)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SUAS (a company of Schouten \u0026amp; Nelissen) - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/schouten-nelissen/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSUAS (a company of Schouten \u0026amp; Nelissen)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IMF Academy - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/imf-academy-2/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIMF Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"B2B Learning - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/b2b-learning/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eB2B Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"International Training Network - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/international-training-network/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInternational Training Network\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cybiant - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/cybiant/plus-de-10-participants\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCybiant\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Plus\" data-collapse-title=\"Moins\" href=\"#\"\u003ePlus\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eLabels \u0026amp; Certificats\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\" - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisation-ICT-IT/cyber-security/plus-de-10-participants/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section q-and-a-box\"\u003e\u003cdiv class=\"panel with-border with-background--white\"\u003e\u003cdiv class=\"panel__content\"\u003e\u003cdiv class=\"with-border--bottom\"\u003e\u003ch3 class=\"panel__content-title\"\u003e2 questions à propos de la catégorie Automatisation \u0026amp; ICT/IT\u003c/h3\u003e\u003c/div\u003e\u003cul class=\"faq-list\"\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Devenir ingénieur MCSE à distance\" href=\"/qa/devenir-ingenieur-mcse-a-distance\"\u003eDevenir ingénieur MCSE à distance\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003ca class=\"member-avatar--link avatar avatar--tiny\" href=\"https://fr.springest.be/profile/kouassi\"\u003e\u003c/a\u003e \u003ca class=\"member-profile-link\" href=\"https://fr.springest.be/profile/kouassi\"\u003ekouassi /\u003c/a\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"faq-list__item\"\u003e\u003ca class=\"faq-list__link\" title=\"Développer des logiciels sécurisés\" href=\"/qa/developper-des-logiciels-securises\"\u003eDévelopper des logiciels sécurisés\u003c/a\u003e\u003cspan class=\"faq-list__author\"\u003eAsked by \u003ca class=\"member-avatar--link avatar avatar--tiny\" href=\"https://fr.springest.be/profile/ryan-d\"\u003e\u003c/a\u003e \u003ca class=\"member-profile-link\" href=\"https://fr.springest.be/profile/ryan-d\"\u003eRyan D.\u003c/a\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"/questions/automatisation-ICT-IT\"\u003eVoir toutes les questions\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eRésultats de recherche\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"Cybersecurity\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e30\u003c/strong\u003e cours\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e11\u003c/strong\u003e instituts de formations\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e9.1\u003c/strong\u003e note \u003cspan class=\"meta-info\"\u003e(moyenne)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e115,00 € - 4.380,00 €\u003c/strong\u003e (fourchette de prix)\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-28T15:42:59.798Z","subject_id":7064,"subject_name":"Cybersecurity","category_name":"Automatisation \u0026 ICT/IT","filter_size":1,"filter_types":["max_participants"],"filters":["plus-de-10-participants"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-28T15:42:59.798Z","subject_id":7064,"subject_name":"Cybersecurity","category_name":"Automatisation \u0026 ICT/IT","filter_size":1,"filter_types":["max_participants"],"filters":["plus-de-10-participants"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original"}}],"filters":"/plus-de-10-participants"}