{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-thumb_up\"\u003e\u003ci class=\"ma-thumb_up material-icons icon--medium\"\u003ethumb_up\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003ch3\u003eGratis informatie aanvragen\u003c/h3\u003e\u003cp\u003eVergelijken en met je collega's overleggen.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e57 Cyber Security trainingen, cursussen \u0026amp; opleidingen\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/it-ict-beveiliging/2000-4000\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"18 Certified Chief Information Security Officer (CCISO) trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cciso/2000-4000\"\u003eCertified Chief Information Security Officer (CCISO)\u003c/a\u003e, \u003ca title=\"19 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/penetration-testing/2000-4000\"\u003ePenetration testing\u003c/a\u003e, \u003ca title=\"30 Security Engineer trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/security-engineer/2000-4000\"\u003eSecurity Engineer\u003c/a\u003e, \u003ca title=\"7 OWASP trainingen\" rel=\"nofollow\" href=\"/automatisering-ict/owasp/2000-4000\"\u003eOWASP\u003c/a\u003e, \u003ca title=\"47 Cloud Security trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cloud-security/2000-4000\"\u003eCloud Security\u003c/a\u003e, \u003ca title=\"24 Threat intelligence trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/threat-intelligence/2000-4000\"\u003eThreat intelligence\u003c/a\u003e, \u003ca title=\"3 Trend Micro trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/trend-micro/2000-4000\"\u003eTrend Micro\u003c/a\u003e, \u003ca title=\"15 Baseline Informatiebeveiliging Overheid (BIO) trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/baseline-informatiebeveiliging-overheid-bio/2000-4000\"\u003eBaseline Informatiebeveiliging Overheid (BIO)\u003c/a\u003e en \u003ca title=\"Burp trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/burp/2000-4000\"\u003eBurp\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/it-ict-beveiliging/2000-4000\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"18 Certified Chief Information Security Officer (CCISO) trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cciso/2000-4000\"\u003eCertified Chief Information Security Officer (CCISO)\u003c/a\u003e en \u003ca title=\"19 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/penetration-testing/2000-4000\"\u003ePenetration testing\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 actieve filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sorteren\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003e€ 2.000 t/m € 4.000\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eWijzig filters\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eSortering veranderen\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSorteren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/automatisering-ict/cyber-security/2000-4000\" data-link-type=\"sort\" href=\"#\"\u003eRelevantie en ervaringen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/2000-4000/prijs-hoog-laag\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (hoog \u0026gt; laag)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/2000-4000/prijs-laag-hoog\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (laag \u0026gt; hoog)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/2000-4000/duur-lang-kort\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (lang \u0026gt; kort)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/cyber-security/2000-4000/duur-kort-lang\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (kort \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1060325\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1060325\" id=\"training-1060325\" value=\"1060325\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2019443/thumbnail-Cyber_Security_Expert.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Cybersecurity - Cyber Security Expert - Masterprogramma - Een uniek trainings- en certificeringsprogramma!\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma\"\u003eCybersecurity - Cyber Security Expert - Masterprogramma - Een uniek trainings- en certificeringsprogramma!\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Adding Value Consulting (AVC)\" title=\"Logo van Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2019443/thumbnail-Cyber_Security_Expert.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCyber Security Expert - Masteropleiding Een uniek opleidings- en certificeringsprogramma! De masteropleiding Cyber Security geeft u alle va…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 2.950\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Vrij van BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"Cybersecurity - Cyber Security Expert - Masterprogramma - Een uniek trainings- en certificeringsprogramma! heeft een gemiddelde beoordeling van 9,7\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma#ervaringen\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 9,7\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(3 ervaringen)\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eAdding Value Consulting (AVC) heeft een gemiddelde beoordeling van \u003cstrong\u003e9,5\u003c/strong\u003e (uit \u003cstrong\u003e139\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Adding Value Consulting (AVC)\" title=\"Logo van Adding Value Consulting (AVC)\" src=\"https://static-4.springest.com/uploads/institute/logo/28369/thumb_adding-value-consulting-avc-a006cc10db5042bf02c45b1643e6163b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/adding-value-consulting-avc/cybersecurity-cyber-security-expert-masterprogramma-een-uniek-trainings-en-certificeringsprogramma/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-858448\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-858448\" id=\"training-858448\" value=\"858448\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/certified-information-systems-security-manager-and-exam-prep-cism-cissm-mile2#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2265283/thumbnail-Mile2.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Certified Cybersecurity Systems Manager (CCSM) + examenvoorbereiding CISM\" href=\"/startel/certified-information-systems-security-manager-and-exam-prep-cism-cissm-mile2\"\u003eCertified Cybersecurity Systems Manager (CCSM) + examenvoorbereiding CISM\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMaandag 8 april 2024 in Startel (Drachten) en 15 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/certified-information-systems-security-manager-and-exam-prep-cism-cissm-mile2#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2265283/thumbnail-Mile2.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eAlgemene omschrijving In de training: “Certified Cybersecurity Systems Manager (CCSM)” van Mile2 krijg jij uitgebreide praktische informati…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.780\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"Certified Cybersecurity Systems Manager (CCSM) + examenvoorbereiding CISM heeft een gemiddelde beoordeling van 10,0\" href=\"/startel/certified-information-systems-security-manager-and-exam-prep-cism-cissm-mile2#ervaringen\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 10\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(1 ervaring)\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eStartel bv heeft een gemiddelde beoordeling van \u003cstrong\u003e9,2\u003c/strong\u003e (uit \u003cstrong\u003e138\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/certified-information-systems-security-manager-and-exam-prep-cism-cissm-mile2/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/certified-information-systems-security-manager-and-exam-prep-cism-cissm-mile2/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-368448\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-368448\" id=\"training-368448\" value=\"368448\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/imf/cyber-security-csx#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/32168/thumbnail-IT-security.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Thuisstudie: Cyber Security Fundamentals - schriftelijke cursus\" href=\"/imf/cyber-security-csx\"\u003eCyber Security Fundamentals - schriftelijke cursus\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van IMF Academy (International Management Forum)\" title=\"Logo van IMF Academy (International Management Forum)\" src=\"https://static-2.springest.com/uploads/institute/logo/547/thumb_imf-171647d8682649d5c2f98b8c927d449b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/imf/cyber-security-csx#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/32168/thumbnail-IT-security.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCyber Security Fundamentals (CSX) – waar staat deze nieuwe certificering van ISACA voor? Dat cyber security van groot belang is voor elke o…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eThuisstudie\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 2.480\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eExcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eBachelor\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"Cyber Security Fundamentals - schriftelijke cursus heeft een gemiddelde beoordeling van 8,0\" href=\"/imf/cyber-security-csx#ervaringen\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 8\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(1 ervaring)\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,3 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eIMF Academy (International Management Forum) heeft een gemiddelde beoordeling van \u003cstrong\u003e8,3\u003c/strong\u003e (uit \u003cstrong\u003e47\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van IMF Academy (International Management Forum)\" title=\"Logo van IMF Academy (International Management Forum)\" src=\"https://static-2.springest.com/uploads/institute/logo/547/thumb_imf-171647d8682649d5c2f98b8c927d449b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf/cyber-security-csx/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf/cyber-security-csx/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-916427\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-916427\" id=\"training-916427\" value=\"916427\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: CISO: cyber security strateeg bij uitstek\" href=\"/imf/ciso-cyber-security-strateeg-bij-uitstek\"\u003eCISO: cyber security strateeg bij uitstek\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van IMF Academy (International Management Forum)\" title=\"Logo van IMF Academy (International Management Forum)\" src=\"https://static-2.springest.com/uploads/institute/logo/547/thumb_imf-171647d8682649d5c2f98b8c927d449b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMaandag 13 mei 2024 in Centraal in het land\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003e2 op de 3 CISO\u0026#39;s is niet voorbereid op cyberaanvallen Cyberincidenten en data diefstal behoren wereldwijd tot de grootste bedrijfsrisico\u0026#39;s.…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.980\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eExcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 12 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 12\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003cspan class=\"product-level\"\u003eBachelor\u003c/span\u003e\u003cspan class=\"product-rating\"\u003e\u003ca class=\"rating-score\" title=\"CISO: cyber security strateeg bij uitstek heeft een gemiddelde beoordeling van 10,0\" href=\"/imf/ciso-cyber-security-strateeg-bij-uitstek#ervaringen\"\u003e\u003ci class=\"ma-star material-icons review-score__icon\"\u003estar\u003c/i\u003e\u003cspan class=\"rating-average\"\u003e 10\u003c/span\u003e \u003cspan class=\"review-count\"\u003e(1 ervaring)\u003c/span\u003e\u003c/a\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,3 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eIMF Academy (International Management Forum) heeft een gemiddelde beoordeling van \u003cstrong\u003e8,3\u003c/strong\u003e (uit \u003cstrong\u003e47\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van IMF Academy (International Management Forum)\" title=\"Logo van IMF Academy (International Management Forum)\" src=\"https://static-2.springest.com/uploads/institute/logo/547/thumb_imf-171647d8682649d5c2f98b8c927d449b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf/ciso-cyber-security-strateeg-bij-uitstek/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/imf/ciso-cyber-security-strateeg-bij-uitstek/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-718490\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-718490\" id=\"training-718490\" value=\"718490\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Specialisatieopleiding Cybercrime\" href=\"/bijzonderstrafrecht-academie/specialisatieopleiding-cybercrime\"\u003eSpecialisatieopleiding Cybercrime\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van BijzonderStrafrecht Academie\" title=\"Logo van BijzonderStrafrecht Academie\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eHet programma van deze opleiding is ontwikkeld in nauwe samenwerking met experts op dit vagebied en wordt gekenmerkt door een mix van theor…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.850\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 25 personen kunnen deelnemen aan deze opleiding.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 25\u003c/span\u003e\u003cspan class=\"duration\"\u003e36 uren\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBijzonderStrafrecht Academie heeft een gemiddelde beoordeling van \u003cstrong\u003e9\u003c/strong\u003e (uit \u003cstrong\u003e4\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van BijzonderStrafrecht Academie\" title=\"Logo van BijzonderStrafrecht Academie\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/bijzonderstrafrecht-academie/specialisatieopleiding-cybercrime/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/bijzonderstrafrecht-academie/specialisatieopleiding-cybercrime/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-865635\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-865635\" id=\"training-865635\" value=\"865635\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Specialisatieopleiding Cybercrime\" href=\"/bijzonderstrafrecht-academie/specialisatieopleiding-cybercrime-2\"\u003eSpecialisatieopleiding Cybercrime\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van BijzonderStrafrecht Academie\" title=\"Logo van BijzonderStrafrecht Academie\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eCybercrime is op dit moment de snelst groeiende vorm van criminaliteit. Phishing, ransomware, cyberaanvallen van hackers en datalekken zijn…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.650\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 25 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 25\u003c/span\u003e\u003cspan class=\"duration\"\u003e45 uren\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBijzonderStrafrecht Academie heeft een gemiddelde beoordeling van \u003cstrong\u003e9\u003c/strong\u003e (uit \u003cstrong\u003e4\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van BijzonderStrafrecht Academie\" title=\"Logo van BijzonderStrafrecht Academie\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/bijzonderstrafrecht-academie/specialisatieopleiding-cybercrime-2/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/bijzonderstrafrecht-academie/specialisatieopleiding-cybercrime-2/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-978848\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-978848\" id=\"training-978848\" value=\"978848\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/gladwell-academy/basisopleiding-cyber-security#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/1990765/thumbnail-_MG_8872.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Foundations of Cyber Security\" href=\"/gladwell-academy/basisopleiding-cyber-security\"\u003eFoundations of Cyber Security\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Gladwell Academy\" title=\"Logo van Gladwell Academy\" src=\"https://static-4.springest.com/uploads/institute/logo/13788/thumb_gladwell-academy-4e4a6c9203559881680d2cf3ff77bf15.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/gladwell-academy/basisopleiding-cyber-security#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/1990765/thumbnail-_MG_8872.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eWat zijn de bestaande bedreigingen in onze steeds digitaler wordende omgeving en hoe krijg je deze onder controle. Cyber Security is één …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.195\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eExclusief btw\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGladwell Academy heeft een gemiddelde beoordeling van \u003cstrong\u003e8,5\u003c/strong\u003e (uit \u003cstrong\u003e845\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Gladwell Academy\" title=\"Logo van Gladwell Academy\" src=\"https://static-4.springest.com/uploads/institute/logo/13788/thumb_gladwell-academy-4e4a6c9203559881680d2cf3ff77bf15.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gladwell-academy/basisopleiding-cyber-security/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/gladwell-academy/basisopleiding-cyber-security/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-922654\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-922654\" id=\"training-922654\" value=\"922654\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Evenement: Specialisatieopleiding Cybercrime 2022\" href=\"/bijzonderstrafrecht-academie/specialisatieopleiding-cybercrime-2022\"\u003eSpecialisatieopleiding Cybercrime 2022\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van BijzonderStrafrecht Academie\" title=\"Logo van BijzonderStrafrecht Academie\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eCybercrime is op dit moment de snelst groeiende vorm van criminaliteit. Phishing, ransomware, cyberaanvallen van hackers en datalekken zijn…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eEvenement\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 2.950\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e36 uren\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eBijzonderStrafrecht Academie heeft een gemiddelde beoordeling van \u003cstrong\u003e9\u003c/strong\u003e (uit \u003cstrong\u003e4\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van BijzonderStrafrecht Academie\" title=\"Logo van BijzonderStrafrecht Academie\" src=\"https://static-3.springest.com/assets/no-logo/no-logo-available-medium-ed8c07da9a1b845ed6eb3f4133d7645b50c1bbe81c550c0602c7ef907d2ba0bd.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1072733\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1072733\" id=\"training-1072733\" value=\"1072733\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100)\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-2\"\u003eMicrosoft Cybersecurity Architect (SC-100)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e8,4\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-2/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-2/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1072746\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1072746\" id=\"training-1072746\" value=\"1072746\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100)\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-10706\"\u003eMicrosoft Cybersecurity Architect (SC-100)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMaandag 29 april 2024 in Amsterdam en 8 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e8,4\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-10706/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-10706/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1072737\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1072737\" id=\"training-1072737\" value=\"1072737\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100)\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-6\"\u003eMicrosoft Cybersecurity Architect (SC-100)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e8,4\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-6/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-6/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1072732\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1072732\" id=\"training-1072732\" value=\"1072732\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100)\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100\"\u003eMicrosoft Cybersecurity Architect (SC-100)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e8,4\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1072741\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1072741\" id=\"training-1072741\" value=\"1072741\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100)\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-46542\"\u003eMicrosoft Cybersecurity Architect (SC-100)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e8,4\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-46542/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-46542/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1072743\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1072743\" id=\"training-1072743\" value=\"1072743\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100)\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-45135\"\u003eMicrosoft Cybersecurity Architect (SC-100)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e8,4\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-45135/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-45135/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1072738\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1072738\" id=\"training-1072738\" value=\"1072738\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Microsoft Cybersecurity Architect (SC-100)\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-7\"\u003eMicrosoft Cybersecurity Architect (SC-100)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.145\u003cspan class=\"tooltip-parent tooltip-icon align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Deze prijs is volledig. Er zijn geen verborgen bijkomende kosten.\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze training.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8,4 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e8,4\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-7/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/microsoft-cybersecurity-architect-sc-100-7/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e1\u003cspan class=\"pagination__max-pages\"\u003e van 4\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Pagina 2\" href=\"/automatisering-ict/cyber-security/2000-4000/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Pagina 3\" href=\"/automatisering-ict/cyber-security/2000-4000/3\"\u003e3\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Pagina 4\" href=\"/automatisering-ict/cyber-security/2000-4000/4\"\u003e4\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Volgende\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/automatisering-ict/cyber-security/2000-4000/2\"\u003eVolgende \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Certified Cybersecurity Systems Manager (CCSM) + examenvoorbereiding CISM\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\",\"description\":\"Algemene omschrijving In de training: “Certified Cybersecurity Systems Manager (CCSM)” van Mile2 krijg jij uitgebreide praktische informatie van de kernprincipes van informatiebeveil\\u0026amp;hellip;\",\"startDate\":\"2024-04-08\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Startel (Drachten)\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"53.128417\",\"longitude\":\"6.442107\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/startel/certified-information-systems-security-manager-and-exam-prep-cism-cissm-mile2\",\"price\":\"2780.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-03-01\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.managementsite.nl/startel#EducationalOrganization\",\"url\":\"https://opleiding.managementsite.nl/startel\",\"name\":\"Startel bv\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"CISO: cyber security strateeg bij uitstek\",\"image\":\"https://static-2.springest.com/uploads/institute/logo/547/thumb_imf-171647d8682649d5c2f98b8c927d449b.png\",\"description\":\"2 op de 3 CISO\\u0026#39;s is niet voorbereid op cyberaanvallen Cyberincidenten en data diefstal behoren wereldwijd tot de grootste bedrijfsrisico\\u0026#39;s. Meer dan de helft van de CISO\\u0026#39;s denkt dat \\u0026amp;hellip;\",\"startDate\":\"2024-05-13\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Centraal in het land\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/imf/ciso-cyber-security-strateeg-bij-uitstek\",\"price\":\"3980.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2023-08-17\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.managementsite.nl/imf#EducationalOrganization\",\"url\":\"https://opleiding.managementsite.nl/imf\",\"name\":\"IMF Academy (International Management Forum)\",\"logo\":\"https://static-2.springest.com/uploads/institute/logo/547/thumb_imf-171647d8682649d5c2f98b8c927d449b.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Microsoft Cybersecurity Architect (SC-100)\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\",\"description\":\"Deze training bereidt je voor op de achtergrond om cyberbeveiligingsstrategieën op de volgende gebieden te ontwerpen en te evalueren: Zero Trust, Governance Risk Compliance (GRC), se\\u0026amp;hellip;\",\"startDate\":\"2024-04-29\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Amsterdam\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.370216\",\"longitude\":\"4.895168\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/tailor-it/microsoft-cybersecurity-architect-sc-100-10706\",\"price\":\"2145.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2024-01-26\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.managementsite.nl/tailor-it#EducationalOrganization\",\"url\":\"https://opleiding.managementsite.nl/tailor-it\",\"name\":\"Tailor iT\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section\"\u003e\u003cul class=\"list\"\u003e\u003cli\u003e\u003ca href=\"/automatisering-ict/cyber-security\"\u003eAlle Cyber Security producten\u003c/a\u003e\u003c/li\u003e\u003cli\u003e\u003ca href=\"/automatisering-ict/cyber-security/keuzehulp-cyber-security\"\u003eKeuzehulp Cyber Security\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/section\u003e\u003cdiv class=\"message--session-filters\"\u003eDe zoekresultaten zijn momenteel gefilterd met jouw voorkeuren.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eFilters toevoegen\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/automatisering-ict/cyber-security\"\u003eAlle filters verwijderen\u003c/a\u003e\u003cdiv class=\"filter filter--popular is-first\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePopulair\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Startgarantie - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/start-garantie/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartgarantie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003ePrijs\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 0 t/m € 500 - 55\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/0-500/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 0 t/m € 500\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e55\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 500 t/m € 1.000 - 25\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/500-1000/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 500 t/m € 1.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e25\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 1.000 t/m € 2.000 - 23\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/1000-2000/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 t/m € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e23\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"€ 2.000 t/m € 4.000 - 57\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 t/m € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e57\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 4.000 en hoger - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/4000-meer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 4.000 en hoger\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link is-expanded\" data-target=\"filter--price\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMinder\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eRegio\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Alphen aan den Rijn - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/alphen-aan-den-rijn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAlphen aan den Rijn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Amersfoort - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/amersfoort\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAmersfoort\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Amsterdam - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/amsterdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAmsterdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Antwerpen - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/antwerpen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAntwerpen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Apeldoorn - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/apeldoorn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eApeldoorn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Breda - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/breda\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBreda\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Drachten - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/drachten\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDrachten\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Eindhoven - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/eindhoven\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEindhoven\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Gouda - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/gouda\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGouda\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Groningen - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/groningen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGroningen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Hilversum - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/hilversum\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHilversum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Rotterdam - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/rotterdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRotterdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Tilburg - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/tilburg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTilburg\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Utrecht - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/utrecht\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUtrecht\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Veenendaal - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/veenendaal\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVeenendaal\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Zwolle - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/zwolle\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZwolle\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--regions\" data-expand-title=\"Meer\" data-collapse-title=\"Minder regio\u0026#39;s\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eNiveau\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"HBO - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/hbo/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eHBO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"MBO - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/mbo/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMBO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eType product\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal op locatie - 49\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/klassikaal-op-locatie/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal op locatie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e49\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal online - 14\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/klassikaal-online/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Learning - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/e-learning/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Evenement - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/evenement/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEvenement\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"In-company / Maatwerk - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/in-company-maatwerk/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIn-company / Maatwerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Thuisstudie - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/thuisstudie/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eThuisstudie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--location\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eStartdatum\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"heeft een startdatum - 25\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/startdatum-bekend\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eheeft een startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e25\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"april 2024 - 15\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/april-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eapril 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"mei 2024 - 17\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/mei-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emei 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juni 2024 - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/juni-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuni 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juli 2024 - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/juli-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuli 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"augustus 2024 - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/augustus-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eaugustus 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"september 2024 - 12\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/september-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eseptember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"oktober 2024 - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/oktober-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eoktober 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"november 2024 - 13\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/november-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enovember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"december 2024 - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/december-2024\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edecember 2024\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"januari 2025 - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/januari-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejanuari 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"februari 2025 - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/februari-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003efebruari 2025\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"maart 2025 en later - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/maart-2025\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emaart 2025 en later\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTijdsduur\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 dag - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/1-dag/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 dag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 tot 3 dagen - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2-3-dagen/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 tot 3 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 tot 10 dagen - 43\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/4-10-dagen/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 tot 10 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e43\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"10 dagen tot 1 jaar - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/10-365-dagen/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e10 dagen tot 1 jaar\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTijdstip\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Overdag - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/overdag/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOverdag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Avond - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/avond/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAvond\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Zondag - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/zondag/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZondag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Zaterdag - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/zaterdag/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZaterdag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eMaximaal aantal deelnemers\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 tot 10 deelnemers - 29\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/6-tot-10-deelnemers/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 tot 10 deelnemers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e29\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"meer dan 10 deelnemers - 23\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/meer-dan-10-deelnemers/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emeer dan 10 deelnemers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e23\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eTaal\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Nederlands - 49\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/nl/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNederlands\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e49\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Engels - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/en/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEngels\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eAanbieder\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Tailor iT - 19\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/tailor-it/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTailor iT\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Global Knowledge Network Netherlands B.V. - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/global-knowledge-network-netherlands-b-v/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Network Netherlands B.V.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"@The Academy - 4\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/the-academy/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e@The Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IMF Academy (International Management Forum) - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/imf/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIMF Academy (International Management Forum)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"BijzonderStrafrecht Academie - 3\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/bijzonderstrafrecht-academie/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBijzonderStrafrecht Academie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Vijfhart IT-Opleidingen - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/5hart/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVijfhart IT-Opleidingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"CLS Computertrainingen - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/cls/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCLS Computertrainingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Master it Training - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/master-it/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMaster it Training\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Eduvision Opleiding \u0026amp; Training - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/eduvision/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEduvision Opleiding \u0026amp; Training\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Computrain - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/computrain/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eComputrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Startel bv - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/startel/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartel bv\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Outvie - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/Outvie/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOutvie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Inholland Academy - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/inholland-academy/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eInholland Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"SignOn ICT Trainingen+ B.V. - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/signon/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eSignOn ICT Trainingen+ B.V.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"OEM Office Elearning Menu NL - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/oem-office-elearning-menu-nl/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOEM Office Elearning Menu NL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"DutchTrain - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/dutchtrain/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Gladwell Academy - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/gladwell-academy/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGladwell Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISO in the Sun - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/iso-in-the-sun/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO in the Sun\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Nation4mi - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/nation4mi/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNation4mi\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Adding Value Consulting (AVC) - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/adding-value-consulting-avc/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAdding Value Consulting (AVC)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Didev - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/didev/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDidev\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003ch4 class=\"as-h3 filter__title\"\u003eExtra kenmerken\u003c/h4\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Direct inschrijven - 57\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDirect inschrijven\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e57\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Microsoft Learning Partner - 20\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/microsoft-learning-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMicrosoft Learning Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e20\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"CRKBO en BTW-vrijstelling - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/crkbo-en-btw-vrijstelling\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO en BTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"NRTO - 16\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/nrto\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNRTO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"AgilePM - Agile Project Management (APMG) - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/agilepm-agile-project-management-apmg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAgilePM - Agile Project Management (APMG)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cedeo - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/cedeo\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"EXIN - 11\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/exin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEXIN\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"EC-Council - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/ec-council\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"EC-Council Certified - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/ec-council-certified\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council Certified\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ITIL - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/itil\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eITIL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Oracle Education Partner - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/oracle-education-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOracle Education Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"PRINCE2 - 10\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/prince2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePRINCE2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ASL - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/asl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eASL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Axelos - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/axelos\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAxelos\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"BISL - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBISL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cisco Authorized Learning Partners - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/cisco-authorized-learning-partners\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCisco Authorized Learning Partners\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Lean IT - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/lean-it\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean IT\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"PeopleCert - 9\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/peoplecert\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePeopleCert\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"AWS Partner Network (APN) - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/aws-partner-network-apn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAWS Partner Network (APN)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"LSSA - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLSSA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"VOI - 8\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/voi\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVOI\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Accredited Learning Provider - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/accredited-learning-provider\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAccredited Learning Provider\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"APMG Change Management - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/apmg-change-management\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG Change Management\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"APMG-International - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/apmg-international\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG-International\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"BTW-vrijstelling - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/btw-vrijstelling\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"COBIT 5 - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/cobit-5\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCOBIT 5\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IASSC - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/iassc\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIASSC\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IBM Professional Certification Program - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/ibm-professional-certification-program\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIBM Professional Certification Program \u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IPMA - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/ipma\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIPMA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISC2 - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/isc2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISC2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISO 9001:2015 - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/iso-9001-2015\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO 9001:2015\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Managing Successful Programmes (MSP) - 7\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/managing-successful-programmes-msp\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eManaging Successful Programmes (MSP)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cedeo Maatwerk - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/cedeo-maatwerk\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Maatwerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cedeo Open - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/cedeo-open\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Open\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"CRKBO zonder BTW vrijstelling - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/crkbo-zonder-btw-vrijstelling\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO zonder BTW vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Google Cloud Authorized Training Partner - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/google-cloud-authorized-training-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Cloud Authorized Training Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Google Partner - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/google-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IAPP certificering - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/iapp-certificering\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIAPP certificering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISO register - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/iso-register\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO register\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Lean Competency System - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/lean-competency-system\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean Competency System\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Learning Performance Institute - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/learning-performance-institute\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLearning Performance Institute\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Qfor - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/qfor\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eQfor\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"VMWare Partner - 6\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/vmware-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVMWare Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Erkend keurmerk - 5\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/erkend-keurmerk\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErkend keurmerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Koninklijke NBA - PE punten - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/koninklijke-nba-pe-punten\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKoninklijke NBA - PE punten\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"NBA - 2\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/nba\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNBA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Accredited Learning Technologies Provider - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/accredited-learning-technologies-provider\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAccredited Learning Technologies Provider\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Associatie voor examinering - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/associatie-voor-examinering\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAssociatie voor examinering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Associatie voor Examinering - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/associatie-voor-examinering\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAssociatie voor Examinering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"E-Academy - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/e-academy\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Onbeperkt leren - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/onbeperkt-leren\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOnbeperkt leren\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Over CPION - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/over-cpion\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOver CPION\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stibex - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/stibex\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStibex\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"StiR - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/stir\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStiR\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"UWV scholingsvoucher - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/uwv-scholingsvoucher\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUWV scholingsvoucher\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"VRC - De Vereniging van Registercontrollers - 1\" data-link-type=\"filter-add\" rel=\"nofollow\" class=\"filter__link\" href=\"/automatisering-ict/cyber-security/2000-4000/vrc-de-vereniging-van-registercontrollers\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVRC - De Vereniging van Registercontrollers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--syndicates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003ch3 class=\"panel__heading-title--aside\"\u003eLearning Trends\u003c/h3\u003e\u003cabbr class=\"item fn\" title=\"Cyber Security\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e165\u003c/strong\u003e Cursussen\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e37\u003c/strong\u003e Aanbieders\u003c/li\u003e\u003cli class=\"trends-list__item with-reviews\"\u003e\u003cstrong class=\"count\"\u003e17\u003c/strong\u003e Ervaringen\u003c/li\u003e\u003cli class=\"trends-list__item with-rating\"\u003e\u003cstrong\u003e8.8\u003c/strong\u003e Beoordeling \u003cspan class=\"meta-info\"\u003e(gem.)\u003c/span\u003e\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 29 - € 4.380\u003c/strong\u003e Prijsklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"panel__footer\"\u003e\u003ca class=\"panel__footer-link\" href=\"https://trends.springest.com/automatisering-ict/cyber-security\"\u003eBekijk alle Cyber Security trends\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2024-03-28T18:39:34.390Z","subject_id":6517,"subject_name":"Cyber Security","category_name":"Automatisering \u0026 ICT/IT","filter_size":1,"filter_types":["price"],"filters":["2000-4000"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2024-03-28T18:39:34.390Z","subject_id":6517,"subject_name":"Cyber Security","category_name":"Automatisering \u0026 ICT/IT","filter_size":1,"filter_types":["price"],"filters":["2000-4000"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"button_variation"}}],"filters":"/2000-4000"}