{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-school\"\u003e\u003ci class=\"ma-school material-icons icon--medium\"\u003eschool\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eAlles waarvan je verder kunt leren\u003c/h3\u003e\u003cp\u003eMeer dan 52.000 cursussen \u0026 opleidingen.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e20 Cyber Security trainingen, cursussen \u0026amp; opleidingen\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/it-ict-beveiliging/lssa\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"18 Certified Chief Information Security Officer (CCISO) trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cciso/lssa\"\u003eCertified Chief Information Security Officer (CCISO)\u003c/a\u003e, \u003ca title=\"19 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/penetration-testing/lssa\"\u003ePenetration testing\u003c/a\u003e, \u003ca title=\"30 Security Engineer trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/security-engineer/lssa\"\u003eSecurity Engineer\u003c/a\u003e, \u003ca title=\"7 OWASP trainingen\" rel=\"nofollow\" href=\"/automatisering-ict/owasp/lssa\"\u003eOWASP\u003c/a\u003e, \u003ca title=\"47 Cloud Security trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cloud-security/lssa\"\u003eCloud Security\u003c/a\u003e, \u003ca title=\"24 Threat intelligence trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/threat-intelligence/lssa\"\u003eThreat intelligence\u003c/a\u003e, \u003ca title=\"3 Trend Micro trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/trend-micro/lssa\"\u003eTrend Micro\u003c/a\u003e, \u003ca title=\"15 Baseline Informatiebeveiliging Overheid (BIO) trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/baseline-informatiebeveiliging-overheid-bio/lssa\"\u003eBaseline Informatiebeveiliging Overheid (BIO)\u003c/a\u003e en \u003ca title=\"Burp trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/burp/lssa\"\u003eBurp\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/it-ict-beveiliging/lssa\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"18 Certified Chief Information Security Officer (CCISO) trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cciso/lssa\"\u003eCertified Chief Information Security Officer (CCISO)\u003c/a\u003e en \u003ca title=\"19 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/penetration-testing/lssa\"\u003ePenetration testing\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 actieve filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sorteren\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003eLSSA\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eWijzig filters\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eSortering veranderen\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSorteren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/automatisering-ict/cyber-security/lssa\" data-link-type=\"sort\" href=\"#\"\u003eRelevantie en ervaringen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/lssa/prijs-hoog-laag\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (hoog \u0026gt; laag)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/lssa/prijs-laag-hoog\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (laag \u0026gt; hoog)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/lssa/duur-lang-kort\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (lang \u0026gt; kort)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/lssa/duur-kort-lang\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (kort \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077947\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077947\" id=\"training-1077947\" value=\"1077947\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity Breach Response Case Studies [8H161G]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-breach-response-case-studies-8h161g\"\u003eCybersecurity Breach Response Case Studies [8H161G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW In this course, you will explore incident response methodologies and security models, and will learn to recognize and categorize k…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 560\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-breach-response-case-studies-8h161g/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-breach-response-case-studies-8h161g/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-785680\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-785680\" id=\"training-785680\" value=\"785680\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\" href=\"/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\"\u003eUnderstanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e2 gegarandeerde startdata\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 8 april 2024 in Nieuwegein (Iepenhoeve 5) en 1 andere datum\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 8 april 2024 en 2 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.995\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1078847\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1078847\" id=\"training-1078847\" value=\"1078847\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Security On Demand: Certified Cybersecurity Analyst (CCSA) (inclusief examen) - Dag\" href=\"/computrain/security-on-demand-certified-cybersecurity-analyst-ccsa-inclusief-examen-dag\"\u003eSecurity On Demand: Certified Cybersecurity Analyst (CCSA) (inclusief examen) - Dag\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training is geschikt voor iedereen die werkzaam is bij een Security Operations Center. Je bent bijvoorbeeld werkzaam als: Security Pro…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.249\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eComputrain heeft een gemiddelde beoordeling van \u003cstrong\u003e7,2\u003c/strong\u003e (uit \u003cstrong\u003e97\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/security-on-demand-certified-cybersecurity-analyst-ccsa-inclusief-examen-dag/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/security-on-demand-certified-cybersecurity-analyst-ccsa-inclusief-examen-dag/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1078867\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1078867\" id=\"training-1078867\" value=\"1078867\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Introductie in Cybersecurity - Dag\" href=\"/computrain/introductie-in-cybersecurity-dag\"\u003eIntroductie in Cybersecurity - Dag\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eBen jij een gebruiker, teamleider of manager en werk je veel samen met cybersecurityspecialisten? Dan doe je tijdens deze training basisken…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 725\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eComputrain heeft een gemiddelde beoordeling van \u003cstrong\u003e7,2\u003c/strong\u003e (uit \u003cstrong\u003e97\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/introductie-in-cybersecurity-dag/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/introductie-in-cybersecurity-dag/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1078868\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1078868\" id=\"training-1078868\" value=\"1078868\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Introductie in Cybersecurity - Virtual Classroom\" href=\"/computrain/introductie-in-cybersecurity-virtual-classroom\"\u003eIntroductie in Cybersecurity - Virtual Classroom\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eBen jij een gebruiker, teamleider of manager en werk je veel samen met cybersecurityspecialisten? Dan doe je tijdens deze training basisken…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 670,50\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eComputrain heeft een gemiddelde beoordeling van \u003cstrong\u003e7,2\u003c/strong\u003e (uit \u003cstrong\u003e97\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/introductie-in-cybersecurity-virtual-classroom/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/introductie-in-cybersecurity-virtual-classroom/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1009959\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1009959\" id=\"training-1009959\" value=\"1009959\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100) - Dag\" href=\"/computrain/microsoft-cybersecurity-architect-sc-100-dag\"\u003eMicrosoft Cybersecurity Architect (SC-100) - Dag\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eDinsdag 21 mei 2024 in Amsterdam en 3 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze cursus is ontwikkeld voor de administrator, security engineer, security operations analyst en solution architect. Wil jij zelfstandig …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.495\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 12 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eComputrain heeft een gemiddelde beoordeling van \u003cstrong\u003e7,2\u003c/strong\u003e (uit \u003cstrong\u003e97\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/microsoft-cybersecurity-architect-sc-100-dag/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/microsoft-cybersecurity-architect-sc-100-dag/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1009960\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1009960\" id=\"training-1009960\" value=\"1009960\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100) - Virtual Classroom\" href=\"/computrain/microsoft-cybersecurity-architect-sc-100-virtual-classroom\"\u003eMicrosoft Cybersecurity Architect (SC-100) - Virtual Classroom\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze cursus is ontwikkeld voor de administrator, security engineer, security operations analyst en solution architect. In de Virtual Classr…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.277\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 12 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eComputrain heeft een gemiddelde beoordeling van \u003cstrong\u003e7,2\u003c/strong\u003e (uit \u003cstrong\u003e97\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Computrain\" title=\"Logo van Computrain\" src=\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/microsoft-cybersecurity-architect-sc-100-virtual-classroom/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/computrain/microsoft-cybersecurity-architect-sc-100-virtual-classroom/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1039249\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1039249\" id=\"training-1039249\" value=\"1039249\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: EC-Council Certified Cybersecurity Technician (CCT) + Exam voucher [ECCT]\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct\"\u003eEC-Council Certified Cybersecurity Technician (CCT) + Exam voucher [ECCT]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 3 juni 2024 en 4 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This EC-Council training will prepare you for the Certified Cybersecurity Technician certification (C|CT). It is an entry-level cy…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.795\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077946\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077946\" id=\"training-1077946\" value=\"1077946\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity Threat Intelligence [8H151G]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-threat-intelligence-8h151g\"\u003eCybersecurity Threat Intelligence [8H151G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course covers threat intelligence sources. You will learn about data protection risks and explore mobile endpoint protection.…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 950\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-threat-intelligence-8h151g/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-threat-intelligence-8h151g/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1003771\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1003771\" id=\"training-1003771\" value=\"1003771\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100) [M-SC100]\" href=\"/global-knowledge-network-netherlands-b-v/microsoft-cybersecurity-architect-m-sc100\"\u003eMicrosoft Cybersecurity Architect (SC-100) [M-SC100]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info guaranteed-start\"\u003e2 gegarandeerde startdata\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 29 april 2024 en 9 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: dinsdag 21 mei 2024 in Nieuwegein (Iepenhoeve 5) en 4 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Tru…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/microsoft-cybersecurity-architect-m-sc100/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/microsoft-cybersecurity-architect-m-sc100/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1039754\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1039754\" id=\"training-1039754\" value=\"1039754\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Certified Cybersecurity Technician [EC-CCT]\" href=\"/global-knowledge-network-netherlands-b-v/certified-cybersecurity-technician-cct-ec-cct\"\u003eCertified Cybersecurity Technician [EC-CCT]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW EC-Council has developed the Certified Cybersecurity Technician certification: - To validate hands-technician-level IT and cyberse…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 995\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-cybersecurity-technician-cct-ec-cct/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-cybersecurity-technician-cct-ec-cct/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077941\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077941\" id=\"training-1077941\" value=\"1077941\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Introduction to Cybersecurity Tools \u0026amp; Cyber Attacks [8H101G]\" href=\"/global-knowledge-network-netherlands-b-v/introduction-to-cybersecurity-tools-cyber-attacks-8h101g\"\u003eIntroduction to Cybersecurity Tools \u0026amp; Cyber Attacks [8H101G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course provides an introduction to cybersecurity tools and attacks. You will learn the history of cybersecurity, the types an…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 520\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/introduction-to-cybersecurity-tools-cyber-attacks-8h101g/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/introduction-to-cybersecurity-tools-cyber-attacks-8h101g/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077943\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077943\" id=\"training-1077943\" value=\"1077943\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity Compliance Framework \u0026amp; System Administration [8H121G]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-compliance-framework-system-administration-8h121g\"\u003eCybersecurity Compliance Framework \u0026amp; System Administration [8H121G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course provides the basic commands for user and server administration as it relates to security. You will need this skill to …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 470\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-compliance-framework-system-administration-8h121g/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-compliance-framework-system-administration-8h121g/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1077942\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1077942\" id=\"training-1077942\" value=\"1077942\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity Roles, Processes \u0026amp; Operating System Security [8H111G]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g\"\u003eCybersecurity Roles, Processes \u0026amp; Operating System Security [8H111G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This course provides information about cybersecurity people, processes, and technology. You will learn the key cybersecurity roles…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 350\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-roles-processes-operating-system-security-8h111g/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1039251\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1039251\" id=\"training-1039251\" value=\"1039251\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: EC-Council ICS/SCADA Cybersecurity + Exam voucher [EICS-SCADA]\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada\"\u003eEC-Council ICS/SCADA Cybersecurity + Exam voucher [EICS-SCADA]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: woensdag 22 mei 2024 en 3 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network ar…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.495\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e153\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e1\u003cspan class=\"pagination__max-pages\"\u003e van 2\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Pagina 2\" href=\"/automatisering-ict/cyber-security/lssa/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Volgende\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/automatisering-ict/cyber-security/lssa/2\"\u003eVolgende \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Understanding Cisco Cybersecurity Operations Fundamentals [CBROPS]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW TheUnderstanding Cybersecurity Operations Fundamentals (CBROPS) course teaches an understanding of the network infrastructure devices, operations, and vulnerabilities of the\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Nieuwegein (Iepenhoeve 5)\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.048527\",\"longitude\":\"5.091026\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/understanding-cisco-cybersecurity-operations-fundamentals-cbrops\",\"price\":\"2995.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-21\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect (SC-100) - Dag\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\",\"description\":\"Deze cursus is ontwikkeld voor de administrator, security engineer, security operations analyst en solution architect. Wil jij zelfstandig een zero trust-strategie en-architectuur on\\u0026amp;hellip;\",\"startDate\":\"2024-05-21\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Amsterdam\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.370216\",\"longitude\":\"4.895168\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/computrain/microsoft-cybersecurity-architect-sc-100-dag\",\"price\":\"2495.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-27\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.nationaleberoepengids.nl/computrain#EducationalOrganization\",\"url\":\"https://opleiding.nationaleberoepengids.nl/computrain\",\"name\":\"Computrain\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/13414/thumb_computrain-67ae1b43ce1e284b203f4429a7804049.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"EC-Council Certified Cybersecurity Technician (CCT) + Exam voucher [ECCT]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW This EC-Council training will prepare you for the Certified Cybersecurity Technician certification (C|CT). It is an entry-level cybersecurity program created by EC-Council, \\u0026amp;hellip;\",\"startDate\":\"2024-06-03\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/ec-council-certified-cybersecurity-technician-c-ct-exam-voucher-ecct\",\"price\":\"3795.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-10-30\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect (SC-100) [M-SC100]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW This course prepares students with the background to design and evaluate cybersecurity strategies in the following areas: Zero Trust, Governance Risk Compliance (GRC), secur\\u0026amp;hellip;\",\"startDate\":\"2024-04-29\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/microsoft-cybersecurity-architect-m-sc100\",\"price\":\"2145.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-09-23\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"EC-Council ICS/SCADA Cybersecurity + Exam voucher [EICS-SCADA]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW The ICS/SCADA Cybersecurity course is a hands-on training module that teaches the foundations of security and defending network architectures from attacks. Students will lea\\u0026amp;hellip;\",\"startDate\":\"2024-05-22\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/ec-council-ics-scada-cybersecurity-exam-voucher-eics-scada\",\"price\":\"2495.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-11-30\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://opleiding.nationaleberoepengids.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section\"\u003e\u003cul class=\"list\"\u003e\u003cli\u003e\u003ca href=\"/automatisering-ict/cyber-security\"\u003eAlle Cyber Security producten\u003c/a\u003e\u003c/li\u003e\u003cli\u003e\u003ca href=\"/automatisering-ict/cyber-security/keuzehulp-cyber-security\"\u003eKeuzehulp Cyber Security\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/section\u003e\u003cdiv class=\"message--session-filters\"\u003eDe zoekresultaten zijn momenteel gefilterd met jouw voorkeuren.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eFilters toevoegen\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/automatisering-ict/cyber-security\"\u003eAlle filters verwijderen\u003c/a\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePopulair\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Startgarantie - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/start-garantie/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartgarantie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePrijs\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 0 t/m € 500 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/0-500/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 0 t/m € 500\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 500 t/m € 1.000 - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/500-1000/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 500 t/m € 1.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 1.000 t/m € 2.000 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/1000-2000/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 t/m € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 2.000 t/m € 4.000 - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 t/m € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eRegio\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Amsterdam - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/amsterdam/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAmsterdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Utrecht - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/utrecht/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUtrecht\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eType product\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Learning - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/e-learning/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal op locatie - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/klassikaal-op-locatie/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal op locatie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal online - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/klassikaal-online/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eStartdatum\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"heeft een startdatum - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/startdatum-bekend/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eheeft een startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"april 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/april-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eapril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"mei 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/mei-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emei 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juni 2024 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/juni-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuni 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juli 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/juli-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuli 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"augustus 2024 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/augustus-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eaugustus 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"september 2024 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/september-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eseptember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"oktober 2024 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/oktober-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eoktober 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"november 2024 - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/november-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enovember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"december 2024 - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/december-2024/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edecember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"januari 2025 - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/januari-2025/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejanuari 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"februari 2025 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/februari-2025/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003efebruari 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"maart 2025 en later - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/maart-2025/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emaart 2025 en later\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTijdsduur\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 dag - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/1-dag/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 dag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 tot 3 dagen - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2-3-dagen/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 tot 3 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 tot 10 dagen - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/4-10-dagen/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 tot 10 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 jaar en langer - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/365-dagen-en-langer/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 jaar en langer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTijdstip\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Overdag - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/overdag/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOverdag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMaximaal aantal deelnemers\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"meer dan 10 deelnemers - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/meer-dan-10-deelnemers/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emeer dan 10 deelnemers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTaal\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Nederlands - 18\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/nl/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNederlands\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e18\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Engels - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/en/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEngels\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eAanbieder\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Global Knowledge Network Netherlands B.V. - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/global-knowledge-network-netherlands-b-v/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Network Netherlands B.V.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Computrain - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/computrain/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eComputrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eExtra kenmerken\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Direct inschrijven - 165\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/bookable/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDirect inschrijven\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e165\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Microsoft Learning Partner - 77\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/microsoft-learning-partner/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMicrosoft Learning Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e77\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EC-Council - 54\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/ec-council/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e54\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EC-Council Certified - 53\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/ec-council-certified/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council Certified\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e53\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"CRKBO en BTW-vrijstelling - 46\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/crkbo-en-btw-vrijstelling/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO en BTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e46\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"NRTO - 45\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/nrto/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNRTO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e45\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Erkend keurmerk - 39\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/erkend-keurmerk/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErkend keurmerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e39\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"AgilePM - Agile Project Management (APMG) - 34\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/agilepm-agile-project-management-apmg/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAgilePM - Agile Project Management (APMG)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e34\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EXIN - 34\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/exin/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEXIN\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e34\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Oracle Education Partner - 30\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/oracle-education-partner/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOracle Education Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e30\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ITIL - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/itil/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eITIL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"PRINCE2 - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/prince2/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePRINCE2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Axelos - 28\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/axelos/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAxelos\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e28\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Lean IT - 28\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/lean-it/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean IT\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e28\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"PeopleCert - 28\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/peoplecert/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePeopleCert\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e28\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cedeo - 27\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/cedeo/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e27\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ASL - 25\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/asl/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eASL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e25\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"BISL - 25\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/bisl/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBISL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e25\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cisco Authorized Learning Partners - 25\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/cisco-authorized-learning-partners/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCisco Authorized Learning Partners\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e25\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Onbeperkt leren - 25\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/onbeperkt-leren/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOnbeperkt leren\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e25\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"BTW-vrijstelling - 21\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/btw-vrijstelling/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e21\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ISC2 - 21\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/isc2/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISC2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e21\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"VOI - 21\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/voi/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVOI\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e21\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"APMG-International - 20\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/apmg-international/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG-International\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e20\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"AWS Partner Network (APN) - 20\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/aws-partner-network-apn/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAWS Partner Network (APN)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e20\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ISO 9001:2015 - 20\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/iso-9001-2015/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO 9001:2015\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e20\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"LSSA - 20\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLSSA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e20\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Accredited Learning Provider - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/accredited-learning-provider/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAccredited Learning Provider\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"APMG Change Management - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/apmg-change-management/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG Change Management\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"COBIT 5 - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/cobit-5/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCOBIT 5\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IASSC - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/iassc/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIASSC\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IBM Professional Certification Program - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/ibm-professional-certification-program/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIBM Professional Certification Program \u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IPMA - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/ipma/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIPMA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ISO register - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/iso-register/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO register\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Managing Successful Programmes (MSP) - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/managing-successful-programmes-msp/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eManaging Successful Programmes (MSP)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"new - 17\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/new/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enew\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"CRKBO zonder BTW vrijstelling - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/crkbo-zonder-btw-vrijstelling/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO zonder BTW vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cedeo Maatwerk - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/cedeo-maatwerk/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Maatwerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cedeo Open - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/cedeo-open/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Open\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Google Cloud Authorized Training Partner - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/google-cloud-authorized-training-partner/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Cloud Authorized Training Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Google Partner - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/google-partner/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IAPP certificering - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/iapp-certificering/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIAPP certificering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Lean Competency System - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/lean-competency-system/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean Competency System\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Learning Performance Institute - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/learning-performance-institute/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLearning Performance Institute\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Qfor - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/qfor/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eQfor\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"VMWare Partner - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/vmware-partner/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVMWare Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Academy - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/e-academy/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Tel mee met Taal subsidie - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/tel-mee-met-taal-subsidie/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTel mee met Taal subsidie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"UWV scholingsvoucher - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/uwv-scholingsvoucher/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUWV scholingsvoucher\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Accredited Learning Technologies Provider - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/accredited-learning-technologies-provider/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAccredited Learning Technologies Provider\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Associatie voor examinering - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/associatie-voor-examinering/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAssociatie voor examinering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Associatie voor Examinering - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/associatie-voor-examinering/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAssociatie voor Examinering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Stibex - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/stibex/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStibex\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Stichting OOM - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/stichting-oom/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStichting OOM\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Wij Techniek - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/wij-techniek/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWij Techniek\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Koninklijke NBA - PE punten - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/koninklijke-nba-pe-punten/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKoninklijke NBA - PE punten\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"NBA - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/nba/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNBA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ASQ Certificering - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/asq-certificering/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eASQ Certificering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Landelijke vereninging van Vertrouwenspersonen - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/landelijke-vereninging-van-vertrouwenspersonen/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLandelijke vereninging van Vertrouwenspersonen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Mediatorsfederatie Nederland - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/mediatorsfederatie-nederland/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMediatorsfederatie Nederland\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"NVAO Geaccrediteerde opleiding - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/nvao-geaccrediteerde-opleiding/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNVAO Geaccrediteerde opleiding\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Over CPION - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/over-cpion/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOver CPION\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"SPHBO (Stichting Post Hoger Beroeps Onderwijs Nederland) - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/sphbo-stichting-post-hoger-beroeps-onderwijs-nederland/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSPHBO (Stichting Post Hoger Beroeps Onderwijs Nederland)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"STAP-budget: Gratis leren! - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/stap-budget-gratis-leren/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSTAP-budget: Gratis leren!\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"StiR - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/stir/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStiR\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"VRC - De Vereniging van Registercontrollers - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/vrc-de-vereniging-van-registercontrollers/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVRC - De Vereniging van Registercontrollers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Winnaar Beste Opleider van Nederland 2015 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/winnaar-beste-opleider-van-nederland-2015/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWinnaar Beste Opleider van Nederland 2015\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Winnaar Beste Opleider van Nederland 2016 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/winnaar-beste-opleider-van-nederland-2016/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWinnaar Beste Opleider van Nederland 2016\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Winnaar Beste Opleider van Nederland 2018 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/winnaar-beste-opleider-van-nederland-2018/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWinnaar Beste Opleider van Nederland 2018\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Winnaar Beste Opleider van Nederland 2019 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/winnaar-beste-opleider-van-nederland-2019/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWinnaar Beste Opleider van Nederland 2019\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Winnaar Beste Opleider van Nederland 2020 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/winnaar-beste-opleider-van-nederland-2020/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eWinnaar Beste Opleider van Nederland 2020\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link is-expanded\" data-target=\"filter--syndicates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMinder\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eLearning Trends\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"Cyber Security\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e168\u003c/strong\u003e Cursussen\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e38\u003c/strong\u003e Aanbieders\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003cstrong class=\"count\"\u003e17\u003c/strong\u003e Ervaringen\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e8.8\u003c/strong\u003e Beoordeling \u003cspan class=\"meta-info\"\u003e(gem.)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 29 - € 4.380\u003c/strong\u003e Prijsklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"https://trends.springest.com/automatisering-ict/cyber-security\"\u003eBekijk alle Cyber Security trends\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-29T07:08:33.504Z","subject_id":6517,"subject_name":"Cyber Security","category_name":"Automatisering \u0026 ICT/IT","filter_size":1,"filter_types":["syndicates"],"filters":["lssa"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-29T07:08:33.504Z","subject_id":6517,"subject_name":"Cyber Security","category_name":"Automatisering \u0026 ICT/IT","filter_size":1,"filter_types":["syndicates"],"filters":["lssa"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}}],"filters":"/lssa"}