{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-business\"\u003e\u003ci class=\"ma-business material-icons icon--medium\"\u003ebusiness\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003cdiv class=\"as-h3\"\u003eOok voor leren in je organisatie\u003c/div\u003e\u003cp\u003eSocial learning met collega's.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003cdiv class=\"message notice message--notice\"\u003eEr zijn geen zoekresultaten voor jouw voorkeuren. We tonen nu alle producten.\u003c/div\u003e\u003ch1 class=\"subject__title\"\u003e25 Threat intelligence trainingen, cursussen \u0026amp; opleidingen\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" href=\"/automatisering-ict/it-ict-beveiliging\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"178 Cyber Security trainingen, cursussen \u0026amp; opleidingen\" href=\"/automatisering-ict/cyber-security\"\u003eCyber Security\u003c/a\u003e en \u003ca title=\"22 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" href=\"/automatisering-ict/penetration-testing\"\u003ePenetration testing\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" href=\"/automatisering-ict/it-ict-beveiliging\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"178 Cyber Security trainingen, cursussen \u0026amp; opleidingen\" href=\"/automatisering-ict/cyber-security\"\u003eCyber Security\u003c/a\u003e en \u003ca title=\"22 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" href=\"/automatisering-ict/penetration-testing\"\u003ePenetration testing\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e Filters\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sorteren\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eSortering veranderen\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSorteren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/automatisering-ict/threat-intelligence\" data-link-type=\"sort\" href=\"#\"\u003eRelevantie en ervaringen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/prijs-hoog-laag\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (hoog \u0026gt; laag)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/prijs-laag-hoog\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (laag \u0026gt; hoog)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/duur-lang-kort\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (lang \u0026gt; kort)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/duur-kort-lang\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (kort \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-671937\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-671937\" id=\"training-671937\" value=\"671937\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Certified Threat Intelligence Analyst (CTIA) - incl. examen\" href=\"/icttrainingen-nl/certified-threat-intelligence-analyst-ctia-incl-examen\"\u003eCertified Threat Intelligence Analyst (CTIA) - incl. examen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van icttrainingen.nl\" title=\"Logo van icttrainingen.nl\" src=\"https://static-1.springest.com/uploads/institute/logo/1942/thumb_icttrainingen-nl-c8ff885c746b674a2edfdd421e3e90c2.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eIn deze officiële door EC-Council uitgegeven online CTIA training leer je alles om een Certified Threat Intelligence Analyst (CTIA) te word…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.039\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eicttrainingen.nl heeft een gemiddelde beoordeling van \u003cstrong\u003e8\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van icttrainingen.nl\" title=\"Logo van icttrainingen.nl\" src=\"https://static-1.springest.com/uploads/institute/logo/1942/thumb_icttrainingen-nl-c8ff885c746b674a2edfdd421e3e90c2.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/icttrainingen-nl/certified-threat-intelligence-analyst-ctia-incl-examen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/icttrainingen-nl/certified-threat-intelligence-analyst-ctia-incl-examen/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1024337\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1024337\" id=\"training-1024337\" value=\"1024337\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Threat Intelligence \u0026amp; Attribution Best Practices\" href=\"/icttrainingen-nl/threat-intelligence-attribution-best-practices\"\u003eThreat Intelligence \u0026amp; Attribution Best Practices\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van icttrainingen.nl\" title=\"Logo van icttrainingen.nl\" src=\"https://static-1.springest.com/uploads/institute/logo/1942/thumb_icttrainingen-nl-c8ff885c746b674a2edfdd421e3e90c2.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eHet identificeren en interpreteren van dreigingsinformatie is cruciaal voor het voorkomen en afzwakken van cyberaanvallen. Het identificere…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 89\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eExcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eicttrainingen.nl heeft een gemiddelde beoordeling van \u003cstrong\u003e8\u003c/strong\u003e (uit \u003cstrong\u003e8\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van icttrainingen.nl\" title=\"Logo van icttrainingen.nl\" src=\"https://static-1.springest.com/uploads/institute/logo/1942/thumb_icttrainingen-nl-c8ff885c746b674a2edfdd421e3e90c2.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/icttrainingen-nl/threat-intelligence-attribution-best-practices/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/icttrainingen-nl/threat-intelligence-attribution-best-practices/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-672791\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-672791\" id=\"training-672791\" value=\"672791\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: EC-Council Certified Threat Intelligence Analyst (CTIA) incl. examen\" href=\"/dutchtrain/certified-threat-intelligence-analyst-ctia-incl-examen\"\u003eEC-Council Certified Threat Intelligence Analyst (CTIA) incl. examen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van DutchTrain\" title=\"Logo van DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-c9e11845eb15cc58052d8474cde2a999.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eEC-Council Certified Threat Intelligence Analyst (CTIA) incl. examen Certified Threat Intelligence Analyst (C|TIA) is a training and creden…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.045\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003e\u0026quot;Excl. Examen \u0026amp;amp; BTW\u0026quot;\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eMBO\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e59\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van DutchTrain\" title=\"Logo van DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-c9e11845eb15cc58052d8474cde2a999.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/certified-threat-intelligence-analyst-ctia-incl-examen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/certified-threat-intelligence-analyst-ctia-incl-examen/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-893067\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-893067\" id=\"training-893067\" value=\"893067\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Certified Threat Intelligence Analyst\" href=\"/tailor-it/certified-threat-intelligence-analyst\"\u003eCertified Threat Intelligence Analyst\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMaandag 27 april 2026 in Amsterdam\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eDeze training is samengesteld in samenwerking met internationale cybersecurity- en threat intelligence experts om organisaties te helpen bi…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.795\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 10 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 10\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eTailor iT heeft een gemiddelde beoordeling van \u003cstrong\u003e7,2\u003c/strong\u003e (uit \u003cstrong\u003e21\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Tailor iT\" title=\"Logo van Tailor iT\" src=\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/certified-threat-intelligence-analyst/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/tailor-it/certified-threat-intelligence-analyst/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-868485\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-868485\" id=\"training-868485\" value=\"868485\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/oem-office-elearning-menu-nl/security-threat-intelligence-track-1#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/2016954/thumbnail-Security_Threat_Intelligence_E-Learning_Training.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Security Threat Intelligence - Threat intelligence\" href=\"/oem-office-elearning-menu-nl/security-threat-intelligence-track-1\"\u003eSecurity Threat Intelligence - Threat intelligence\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van OEM ICT Trainingen\" title=\"Logo van OEM ICT Trainingen\" src=\"https://static-2.springest.com/uploads/institute/logo/2506/thumb_oem-office-elearning-menu-5792bada199c78e7cc2d75d0334ed1dc.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/oem-office-elearning-menu-nl/security-threat-intelligence-track-1#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/2016954/thumbnail-Security_Threat_Intelligence_E-Learning_Training.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eSecurity Threat Intelligence Welcome to the Security Threat Intelligence Learning Kit, where you will discover how to protect an organisati…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 389\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. 21% btw\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eMBO\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,0 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eOEM ICT Trainingen heeft een gemiddelde beoordeling van \u003cstrong\u003e9,0\u003c/strong\u003e (uit \u003cstrong\u003e297\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van OEM ICT Trainingen\" title=\"Logo van OEM ICT Trainingen\" src=\"https://static-2.springest.com/uploads/institute/logo/2506/thumb_oem-office-elearning-menu-5792bada199c78e7cc2d75d0334ed1dc.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/oem-office-elearning-menu-nl/security-threat-intelligence-track-1/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/oem-office-elearning-menu-nl/security-threat-intelligence-track-1/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1058361\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1058361\" id=\"training-1058361\" value=\"1058361\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/oem-office-elearning-menu-nl/certified-threat-intelligence-analyst-ctia#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/2012778/thumbnail-Certified_Threat_Intelligence_Analyst__CTIA__Training.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Certified Threat Intelligence Analyst (CTIA) - EC Council\" href=\"/oem-office-elearning-menu-nl/certified-threat-intelligence-analyst-ctia\"\u003eCertified Threat Intelligence Analyst (CTIA) - EC Council\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van OEM ICT Trainingen\" title=\"Logo van OEM ICT Trainingen\" src=\"https://static-2.springest.com/uploads/institute/logo/2506/thumb_oem-office-elearning-menu-5792bada199c78e7cc2d75d0334ed1dc.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/oem-office-elearning-menu-nl/certified-threat-intelligence-analyst-ctia#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-4.springest.com/uploads/product_image/image/2012778/thumbnail-Certified_Threat_Intelligence_Analyst__CTIA__Training.jpg\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eCertified Threat Intelligence Analyst (C|TIA) Certified Threat Intelligence Analyst (CTIA) is een professionele certificering voor degenen …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 999\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. 21% btw\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,0 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eOEM ICT Trainingen heeft een gemiddelde beoordeling van \u003cstrong\u003e9,0\u003c/strong\u003e (uit \u003cstrong\u003e297\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van OEM ICT Trainingen\" title=\"Logo van OEM ICT Trainingen\" src=\"https://static-2.springest.com/uploads/institute/logo/2506/thumb_oem-office-elearning-menu-5792bada199c78e7cc2d75d0334ed1dc.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/oem-office-elearning-menu-nl/certified-threat-intelligence-analyst-ctia/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/oem-office-elearning-menu-nl/certified-threat-intelligence-analyst-ctia/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1278378\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1278378\" id=\"training-1278378\" value=\"1278378\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: EC-Council Certified Threat Intelligence Analyst (CTIA)\" href=\"/fast-lane/ec-council-certified-threat-intelligence-analyst-ctia-2\"\u003eEC-Council Certified Threat Intelligence Analyst (CTIA)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Fast Lane\" title=\"Logo van Fast Lane\" src=\"https://static-3.springest.com/uploads/institute/logo/1548/thumb_fast-lane-f1eb596f6ad8a172c7c195f5c32e23f0.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eUtrecht\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eC|TIA is designed for individuals who are involved in the collection, analysis, and dissemination of threat intelligence information. It co…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.950\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Vrij van BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eexcl. BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"duration\"\u003e24 uren\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e8 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eFast Lane heeft een gemiddelde beoordeling van \u003cstrong\u003e8\u003c/strong\u003e (uit \u003cstrong\u003e2\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Fast Lane\" title=\"Logo van Fast Lane\" src=\"https://static-3.springest.com/uploads/institute/logo/1548/thumb_fast-lane-f1eb596f6ad8a172c7c195f5c32e23f0.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fast-lane/ec-council-certified-threat-intelligence-analyst-ctia-2/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/fast-lane/ec-council-certified-threat-intelligence-analyst-ctia-2/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-733298\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-733298\" id=\"training-733298\" value=\"733298\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Certified Threat Intelligence Analyst | CTIA (via e-learning)\" href=\"/cls/certified-threat-intelligence-analyst-ctia-via-e-learning\"\u003eCertified Threat Intelligence Analyst | CTIA (via e-learning)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van CLS Computertrainingen\" title=\"Logo van CLS Computertrainingen\" src=\"https://static-2.springest.com/uploads/institute/logo/377/thumb_cls-b45fc0f3ecb611e130d7901e0f88181b.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eCertified Threat Intelligence Analyst (CTIA) is combination of cybersecurity and threat intelligence to help identify and mitigate business…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.045\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003eExclusief BTW\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eCLS Computertrainingen heeft een gemiddelde beoordeling van \u003cstrong\u003e9,2\u003c/strong\u003e (uit \u003cstrong\u003e357\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"bovnl-award__icon\"\u003e\u003cspan class=\"tooltip-parent  bovnl-award__tooltip align-right\"\u003e\u003cimg src=\"https://static-3.springest.com/assets/redesign/awards/bovnl-winner-icon-2017-3b52c9ee15e1c76b8ea07a1eec47471a133d94beec33b5253f64c636b0e3491d.png\" /\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cp\u003eWinnaar Beste opleider van Nederland 2017: #2 in \u003ca href=\"/automatisering-ict\"\u003eAutomatisering \u0026amp; ICT/IT\u003c/a\u003e.\u003c/p\u003e \u003cp\u003eWinnaar Beste opleider van Nederland 2016: #3 in \u003ca href=\"/automatisering-ict\"\u003eAutomatisering \u0026amp; ICT/IT\u003c/a\u003e.\u003c/p\u003e Lees meer over \u003ca href=\"https://springest.com/nl/opleidervanhetjaar/de-beste-opleiders-van-2020/\"\u003eBeste Opleider van Nederland 2020\u003c/a\u003e.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van CLS Computertrainingen\" title=\"Logo van CLS Computertrainingen\" src=\"https://static-2.springest.com/uploads/institute/logo/377/thumb_cls-b45fc0f3ecb611e130d7901e0f88181b.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/cls/certified-threat-intelligence-analyst-ctia-via-e-learning/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/cls/certified-threat-intelligence-analyst-ctia-via-e-learning/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1143000\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1143000\" id=\"training-1143000\" value=\"1143000\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd\"\u003eConducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 13 april 2026 en 6 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 22 juni 2026 in Nieuwegein (Iepenhoeve 5) en 1 andere datum\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat huntin…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.295\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e188\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1111280\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1111280\" id=\"training-1111280\" value=\"1111280\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: QRadar SIEM: Gathering Threat Management Data (v7.5) - SPVC [BQ310G]\" href=\"/global-knowledge-network-netherlands-b-v/qradar-siem-gathering-threat-management-data-v7-5-spvc-bq310g\"\u003eQRadar SIEM: Gathering Threat Management Data (v7.5) - SPVC [BQ310G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Are you ready to explain how QRadar processes data in your organization\u0026#39;s environment? Interpret QRadar log sources (events) and n…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 650\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e188\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/qradar-siem-gathering-threat-management-data-v7-5-spvc-bq310g/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/qradar-siem-gathering-threat-management-data-v7-5-spvc-bq310g/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1160645\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1160645\" id=\"training-1160645\" value=\"1160645\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD-CPLL]\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd-cpll\"\u003eConducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD-CPLL]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat huntin…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 825\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e188\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd-cpll/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd-cpll/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1098111\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1098111\" id=\"training-1098111\" value=\"1098111\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF]\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf\"\u003eFundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 13 april 2026 in Nieuwegein (Iepenhoeve 5) en 2 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 13 april 2026 en 8 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configu…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.295\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e188\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-917402\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-917402\" id=\"training-917402\" value=\"917402\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Certified Threat Intelligence Analyst [EC-CTIA]\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-ec-ctia\"\u003eCertified Threat Intelligence Analyst [EC-CTIA]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Certified Threat Intelligence Analyst (CTIA) is designed and developed in collaboration with cybersecurity and threat intelligence…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.585\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e188\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-ec-ctia/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-ec-ctia/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1257258\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1257258\" id=\"training-1257258\" value=\"1257258\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: English Delivery Only: Check Point Threat Prevention Specialist (CTPS) R81.20 [ARR_CKT_CTPS_R81_20]\" href=\"/global-knowledge-network-netherlands-b-v/english-delivery-only-check-point-threat-prevention-specialist-ctps-r81-20-arr_ckt_ctps_r81_20\"\u003eEnglish Delivery Only: Check Point Threat Prevention Specialist (CTPS) R81.20 [ARR_CKT_CTPS_R81_20]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eBrugge en Gent\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This two-day Specialist-level course is designed for security professionals who want to gain the concepts and skills necessary to …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.060\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e188\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/english-delivery-only-check-point-threat-prevention-specialist-ctps-r81-20-arr_ckt_ctps_r81_20/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/english-delivery-only-check-point-threat-prevention-specialist-ctps-r81-20-arr_ckt_ctps_r81_20/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1139612\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1139612\" id=\"training-1139612\" value=\"1139612\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPA]\" href=\"/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa\"\u003eAdvanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPA]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 27 april 2026 en 6 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 4 mei 2026 in Groningen/Paterswolde (Groningerweg 19) en 1 andere datum\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention course shows you how to deploy and configure a …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.295\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e188\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003cli class=\"pagination__item\"\u003e\u003cspan class=\"pagination__current-page\"\u003e1\u003cspan class=\"pagination__max-pages\"\u003e van 2\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli class=\"pagination__item hide-on-small\"\u003e\u003ca class=\"pagination__link\" data-link-type=\"pagination\" title=\"Pagina 2\" href=\"/automatisering-ict/threat-intelligence/2\"\u003e2\u003c/a\u003e\u003c/li\u003e\u003cli class=\"pagination__item--next\"\u003e\u003ca title=\"Volgende\" data-link-type=\"pagination\" class=\"pagination__button button--link\" rel=\"next\" href=\"/automatisering-ict/threat-intelligence/2\"\u003eVolgende \u003ci class=\"ma-chevron_right material-icons icon--small\"\u003echevron_right\u003c/i\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Certified Threat Intelligence Analyst\",\"image\":\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\",\"description\":\"Deze training is samengesteld in samenwerking met internationale cybersecurity- en threat intelligence experts om organisaties te helpen bij het identificeren en beperken van cyberge\\u0026amp;hellip;\",\"startDate\":\"2026-04-27\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Amsterdam\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.370216\",\"longitude\":\"4.895168\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/tailor-it/certified-threat-intelligence-analyst\",\"price\":\"2795.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-12-22\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.managementsite.nl/tailor-it#EducationalOrganization\",\"url\":\"https://opleiding.managementsite.nl/tailor-it\",\"name\":\"Tailor iT\",\"logo\":\"https://static-4.springest.com/uploads/institute/logo/691/thumb_tailor-it.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting course that introduces and guides you to \\u0026amp;hellip;\",\"startDate\":\"2026-04-13\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd\",\"price\":\"3295.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-06-25\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.managementsite.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://opleiding.managementsite.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for\\u0026amp;hellip;\",\"startDate\":\"2026-04-13\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Nieuwegein (Iepenhoeve 5)\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.048527\",\"longitude\":\"5.091026\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf\",\"price\":\"3295.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-09-04\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.managementsite.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://opleiding.managementsite.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPA]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention course shows you how to deploy and configure a Cisco Secure Firewall Threat Defense system\\u0026amp;hellip;\",\"startDate\":\"2026-04-27\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa\",\"price\":\"3295.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-09-04\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://opleiding.managementsite.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://opleiding.managementsite.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eFilters toevoegen\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--price is-first\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003ePrijs\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 0 t/m € 500 - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/0-500\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 0 t/m € 500\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 500 t/m € 1.000 - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/500-1000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 500 t/m € 1.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 1.000 t/m € 2.000 - 9\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/1000-2000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 t/m € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 2.000 t/m € 4.000 - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/2000-4000\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 t/m € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eRegio\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Amsterdam - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/amsterdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAmsterdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Apeldoorn - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/apeldoorn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eApeldoorn\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Brugge - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/brugge\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBrugge\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Drachten - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/drachten\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDrachten\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Eindhoven - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/eindhoven\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEindhoven\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Gent - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/gent\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGent\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Groningen - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/groningen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGroningen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Maastricht - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/maastricht\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMaastricht\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Rotterdam - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/rotterdam\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eRotterdam\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Utrecht - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/utrecht\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUtrecht\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Veenendaal - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/veenendaal\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVeenendaal\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Zoetermeer - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/zoetermeer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZoetermeer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--regions\" data-expand-title=\"Meer\" data-collapse-title=\"Minder regio\u0026#39;s\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eNiveau\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"MBO - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/mbo\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMBO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eType product\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal op locatie - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/klassikaal-op-locatie\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal op locatie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Learning - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/e-learning\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal online - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/klassikaal-online\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eStartdatum\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"heeft een startdatum - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/startdatum-bekend\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eheeft een startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"april 2026 - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/april-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eapril 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"mei 2026 - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/mei-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emei 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juni 2026 - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/juni-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuni 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juli 2026 - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/juli-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuli 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"augustus 2026 - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/augustus-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eaugustus 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"september 2026 - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/september-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eseptember 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"oktober 2026 - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/oktober-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eoktober 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"november 2026 - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/november-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enovember 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"december 2026 - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/december-2026\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edecember 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eTijdsduur\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 dag - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/1-dag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 dag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 tot 3 dagen - 8\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/2-3-dagen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 tot 3 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e8\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 tot 10 dagen - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/4-10-dagen\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 tot 10 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 jaar en langer - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/365-dagen-en-langer\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 jaar en langer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eTijdstip\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Zondag - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/zondag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZondag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Overdag - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/overdag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOverdag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Avond - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/avond\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAvond\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Zaterdag - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/zaterdag\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZaterdag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eMaximaal aantal deelnemers\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"6 tot 10 deelnemers - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/6-tot-10-deelnemers\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e6 tot 10 deelnemers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"meer dan 10 deelnemers - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/meer-dan-10-deelnemers\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emeer dan 10 deelnemers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eTaal\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Nederlands - 18\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/nl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNederlands\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e18\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Engels - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/en\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEngels\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eAanbieder\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Global Knowledge Network Netherlands B.V. - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/global-knowledge-network-netherlands-b-v\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Network Netherlands B.V.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Startel bv - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/startel\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartel bv\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"icttrainingen.nl - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/icttrainingen-nl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eicttrainingen.nl\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"OEM ICT Trainingen - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/oem-office-elearning-menu-nl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOEM ICT Trainingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Eduvision Opleiding \u0026amp; Training - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/eduvision-opleiding-training\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEduvision Opleiding \u0026amp; Training\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Vijfhart IT-Opleidingen - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/5hart\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVijfhart IT-Opleidingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"CLS Computertrainingen - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cls\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCLS Computertrainingen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Tailor iT - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/tailor-it\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTailor iT\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"@The Academy - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/the-academy\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e@The Academy\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Fast Lane - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/fast-lane\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eFast Lane\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"DutchTrain - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/dutchtrain\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--institutes\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eExtra kenmerken\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Direct inschrijven - 25\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/bookable\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDirect inschrijven\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e25\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EC-Council - 20\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ec-council\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e20\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EC-Council Certified - 19\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ec-council-certified\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council Certified\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Microsoft Learning Partner - 19\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/microsoft-learning-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMicrosoft Learning Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e19\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"AgilePM - Agile Project Management (APMG) - 17\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/agilepm-agile-project-management-apmg\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAgilePM - Agile Project Management (APMG)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ITIL - 17\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/itil\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eITIL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"NRTO - 17\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/nrto\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNRTO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cisco Authorized Learning Partners - 15\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cisco-authorized-learning-partners\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCisco Authorized Learning Partners\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Oracle Education Partner - 15\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/oracle-education-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOracle Education Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"PRINCE2 - 15\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/prince2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePRINCE2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ASL - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/asl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eASL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"BISL - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBISL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"EXIN - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/exin\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEXIN\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Lean IT - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/lean-it\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean IT\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Axelos - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/axelos\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAxelos\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"CRKBO en BTW-vrijstelling - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/crkbo-en-btw-vrijstelling\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO en BTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"PeopleCert - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/peoplecert\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePeopleCert\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"AWS Partner Network (APN) - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/aws-partner-network-apn\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAWS Partner Network (APN)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cedeo - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cedeo\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Google Partner - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/google-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISC2 - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/isc2\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISC2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Managing Successful Programmes (MSP) - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/managing-successful-programmes-msp\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eManaging Successful Programmes (MSP)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"VMWare Partner - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/vmware-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVMWare Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"APMG-International - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/apmg-international\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG-International\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"BTW-vrijstelling - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/btw-vrijstelling\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cedeo Maatwerk - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cedeo-maatwerk\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Maatwerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Cedeo Open - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cedeo-open\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Open\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"CRKBO zonder BTW vrijstelling - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/crkbo-zonder-btw-vrijstelling\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO zonder BTW vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Google Cloud Authorized Training Partner - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/google-cloud-authorized-training-partner\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Cloud Authorized Training Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IAPP certificering - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iapp-certificering\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIAPP certificering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"VOI - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/voi\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVOI\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Accredited Learning Provider - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/accredited-learning-provider\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAccredited Learning Provider\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"APMG Change Management - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/apmg-change-management\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG Change Management\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"COBIT 5 - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cobit-5\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCOBIT 5\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IASSC - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iassc\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIASSC\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IBM Professional Certification Program  - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ibm-professional-certification-program\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIBM Professional Certification Program \u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"IPMA - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ipma\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIPMA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISO 9001:2015 - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iso-9001-2015\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO 9001:2015\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"ISO register - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iso-register\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO register\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Lean Competency System - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/lean-competency-system\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean Competency System\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Learning Performance Institute - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/learning-performance-institute\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLearning Performance Institute\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"LSSA - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/lssa\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLSSA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Qfor - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/qfor\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eQfor\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Erkend keurmerk - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/erkend-keurmerk\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErkend keurmerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Onbeperkt leren - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/onbeperkt-leren\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOnbeperkt leren\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Test - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/test\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTest\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"UWV scholingsvoucher - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/uwv-scholingsvoucher\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUWV scholingsvoucher\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"new - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/new\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enew\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Stichting OOM - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/stichting-oom\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStichting OOM\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--syndicates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003cdiv class=\"as-h3 panel__heading-title--aside\"\u003eLearning Trends\u003c/div\u003e\u003cabbr class=\"item fn\" title=\"Threat intelligence\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e25\u003c/strong\u003e Cursussen\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e11\u003c/strong\u003e Aanbieders\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 89 - € 3.950\u003c/strong\u003e Prijsklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2026-04-08T00:33:00.812Z","subject_id":9852,"subject_name":"Threat intelligence","category_name":"Automatisering \u0026 ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2026-04-08T00:33:00.812Z","subject_id":9852,"subject_name":"Threat intelligence","category_name":"Automatisering \u0026 ICT/IT","filter_size":0,"filter_types":[],"filters":[],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original"}}],"filters":""}