{"id":2775,"date":"2023-09-17T10:14:23","date_gmt":"2023-09-17T10:14:23","guid":{"rendered":"https:\/\/cyber-curriculum.com\/training\/"},"modified":"2025-02-20T17:56:59","modified_gmt":"2025-02-20T17:56:59","slug":"training","status":"publish","type":"page","link":"https:\/\/cyber-curriculum.com\/en\/training\/","title":{"rendered":"Training"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background fusion-parallax-none nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:301px;--awb-padding-bottom:200px;--awb-padding-top-small:170px;--awb-padding-bottom-small:0px;--awb-background-color:var(--awb-color8);--awb-background-image:linear-gradient(180deg, rgba(0,0,0,0.21) 46%,#153731 100%),url(https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Bildschirm\u00adfoto-2023-08-19-um-08.41-2.png);;--awb-background-size:cover;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_4_5 4_5 fusion-flex-column\" style=\"--awb-padding-bottom-small:30px;--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-center fusion-title-text fusion-title-size-one\" style=\"--awb-text-color:#ffffff;--awb-margin-bottom:20px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;--awb-font-size:56px;\"><h1 class=\"fusion-title-heading title-heading-center fusion-responsive-typography-calculated\" style=\"margin:0;font-size:1em;--fontSize:56;line-height:1.14;\">Our training courses &#8211; Make your business safer with security training<\/h1><\/div><div class=\"fusion-text fusion-text-1 fusion-no-small-visibility\" style=\"--awb-content-alignment:center;\"><p style=\"color: #ffffff;\">Build more digital security for your company through training and awareness-raising.<\/p>\n<\/div><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-0 fusion_builder_column_inner_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-center fusion-content-layout-row\"><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-1 fusion-button-default-span fusion-button-default-type\" style=\"--awb-margin-right:10px;--awb-margin-left:10px;\" target=\"_self\" href=\"#trainingsinfos\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">More about training<\/span><\/a><\/div><div style=\"text-align:center;\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-2 fusion-button-default-span fusion-button-default-type\" style=\"--awb-margin-right:10px;--awb-margin-left:10px;\" target=\"_self\" href=\"https:\/\/cyber-curriculum.mymemberspot.de\/auth\/login?redirectTo=%2Fhome%2Fstart\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Directly to the training platform<\/span><\/a><\/div><\/div><\/div><\/div><div class=\"fusion-separator fusion-full-width-sep\" style=\"align-self: center;margin-left: auto;margin-right: auto;margin-bottom:20px;width:100%;\"><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-top-small:24px;--awb-padding-right-small:20px;--awb-padding-bottom-small:0px;--awb-padding-left-small:20px;--awb-background-image:linear-gradient(180deg, #153731 0%,rgba(255,255,255,0) 100%);--awb-flex-wrap:wrap;\" id=\"trainingsinfos\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Our training concepts for your company.<br \/>Individual, targeted, sustainable.<\/h3><\/div><div class=\"fusion-tabs fusion-tabs-1 clean nav-is-justified horizontal-tabs icon-position-left mobile-mode-accordion\" style=\"--awb-title-border-radius-top-left:15px;--awb-title-border-radius-top-right:15px;--awb-title-border-radius-bottom-right:15px;--awb-title-border-radius-bottom-left:15px;--awb-title-font-size:22px;--awb-alignment:start;--awb-inactive-color:rgba(0,0,0,0);--awb-title-text-color:#ffffff;--awb-background-color:var(--awb-color5);--awb-border-color:rgba(0,0,0,0);--awb-active-border-color:var(--awb-color5);--awb-title-font-family:&quot;Roboto&quot;;--awb-title-font-style:normal;--awb-title-font-weight:400;\"><div class=\"nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\" aria-orientation=\"horizontal\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-62b999e7fad336269fb\" aria-selected=\"true\" tabindex=\"0\" id=\"fusion-tab-62b999e7fad336269fb\" href=\"#tab-62b999e7fad336269fb\"><h5 class=\"fusion-tab-heading\">IT baseline protection<\/h5><\/a><\/li><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-427b0daa259d5ca2f1a\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-427b0daa259d5ca2f1a\" href=\"#tab-427b0daa259d5ca2f1a\"><h5 class=\"fusion-tab-heading\">ISMS implementer<\/h5><\/a><\/li><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b528f56601336b47ba0\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-b528f56601336b47ba0\" href=\"#tab-b528f56601336b47ba0\"><h5 class=\"fusion-tab-heading\">Data Protection training<\/h5><\/a><\/li><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-8697bdeb958560180dd\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-8697bdeb958560180dd\" href=\"#tab-8697bdeb958560180dd\"><h5 class=\"fusion-tab-heading\">Internal control system (ICS)<\/h5><\/a><\/li><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-21112c8d4518997250b\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-21112c8d4518997250b\" href=\"#tab-21112c8d4518997250b\"><h5 class=\"fusion-tab-heading\">Cloud Security<\/h5><\/a><\/li><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-6a641cbf7ff03ec5604\" aria-selected=\"false\" tabindex=\"-1\" id=\"fusion-tab-6a641cbf7ff03ec5604\" href=\"#tab-6a641cbf7ff03ec5604\"><h5 class=\"fusion-tab-heading\">IT emergency management<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-content\"><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\" aria-orientation=\"horizontal\"><li class=\"active\" role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-62b999e7fad336269fb\" aria-selected=\"true\" tabindex=\"0\" id=\"mobile-fusion-tab-62b999e7fad336269fb\" href=\"#tab-62b999e7fad336269fb\"><h5 class=\"fusion-tab-heading\">IT baseline protection<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix in active\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-62b999e7fad336269fb\" id=\"tab-62b999e7fad336269fb\">\n<div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-1 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element in-legacy-container\" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">BSI IT-Grundschutz practitioner + certification exam<\/h4><\/div><div class=\"fusion-text fusion-text-2 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>IT-Grundschutz is also becoming increasingly relevant in the private sector in the course of digitalization.<\/p>\n<p>The IT-Grundschutz practitioner training course provides a comprehensive and in-depth overview of the topic of IT-Grundschutz methodology.<\/p>\n<p>The focus of the seminar is on the successful and targeted creation of security concepts in accordance with BSI IT-Grundschutz. This includes security and reliability in the processing of information and data, as well as the prerequisite for maintaining the competitiveness and functionality of the company.<\/p>\n<\/div><ul style=\"--awb-margin-bottom:30px;--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Ideal for the introduction of information security measures<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Basic documents of an ISMS<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Guidelines, directives &amp; concepts<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Procedural instructions<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Templates &amp; recording aids<\/p>\n<\/div><\/li><\/ul><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(67,69,73,0);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2775-1\"><div class=\"fusion-panel panel-default panel-36922d4fc3087e940 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_36922d4fc3087e940\"><a aria-expanded=\"false\" aria-controls=\"36922d4fc3087e940\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-1\" data-target=\"#36922d4fc3087e940\" href=\"#36922d4fc3087e940\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is included in the training?  <\/span><\/a><\/h4><\/div><div id=\"36922d4fc3087e940\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_36922d4fc3087e940\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The training content is divided into a total of 14 subject areas:<\/p>\n<p>&#8211; IT security basics and legal foundations<\/p>\n<p>&#8211; Overview of information security<\/p>\n<p>&#8211; Introduction to IT-Grundschutz<\/p>\n<p>&#8211; Overview of the IT-Grundschutz approach<\/p>\n<p>&#8211; Implementation of IT-Grundschutz<\/p>\n<p>&#8211; IT-Grundschutz protection check<\/p>\n<p>&#8211; IT-Grundschutz profiles<\/p>\n<p>&#8211; Overview of the IT-Grundschutz compendium<\/p>\n<p>&#8211; Risk analysis<\/p>\n<p>&#8211; Implementation planning<\/p>\n<p>&#8211; Maintenance and continuous optimization<\/p>\n<p>&#8211; Certification and receipt of the IT-Grundschutz certificate based on ISO 27001<\/p>\n<p>&#8211; Audit structure<\/p>\n<p>\u2013 Security incident management<\/p>\n<p>&#8211; Emergency management in accordance with BSI Standard 200-4<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-3 fusion-text-no-margin\" style=\"--awb-margin-top:30px;--awb-margin-bottom:30px;\"><p><b><span style=\"color: var(--awb-color1);\">Target group:<\/span><span style=\"color: var(--awb-color1);\"><br \/><\/span><\/b><span style=\"color: var(--awb-color1);\">The seminar is aimed at all people in a company or administration who have been appointed as representatives in the area of \u200b\u200binformation security and who are seeking certification in this subject area.<\/span><\/p>\n<p><b style=\"color: var(--awb-color1);\">Frequently used titles for these people are:<\/b><\/p>\n<ul style=\"color: white;\">\n<li><span style=\"color: var(--awb-color1);\">Information Security Officer (ISB)<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">Information Security Manager (ISM)<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">IT Security Officer (IT-SiBe)<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">Chief Security Officer (CSO)<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">Information Security Officer (ISO)<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">Chief Information Security Officer (CISO)<\/span><\/li>\n<\/ul>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-3 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.copecart.com\/products\/a29d9c53\/checkout\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Book our course online<\/span><\/a><\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top:-38px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-right sm-text-align-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">1.849\u20ac excluding VAT<\/h5><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-2 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0.096%;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">BSI IT-Grundschutz consultant<br \/><span style=\"color: var(--awb-text-color); font-family: var(--h4_typography-font-family); font-size: 1em; font-style: var(--h4_typography-font-style,normal); font-weight: var(--h4_typography-font-weight); letter-spacing: var(--h4_typography-letter-spacing); text-transform: var(--h4_typography-text-transform); background-color: var(--awb-bg-color-hover);\">(Without exam)<\/span><\/h4><\/div><div class=\"fusion-text fusion-text-4 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><p>The IT-Grundschutz practitioner is a prerequisite for completing the IT-Grundschutz consultant.<\/p>\n<p>With the modernization of basic IT law came not only the change for public administrations and authorities, but also increasing interest in the private sector.<\/p>\n<p>The task of the IT-Grundschutz consultant is to support authorities and companies with their technical expertise in the development of security concepts and the introduction of a management system for information security.<\/p>\n<\/div><ul style=\"--awb-margin-bottom:30px;--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Ideal for the introduction of information security measures<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Basic documents of an ISMS<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Guidelines, directives &amp; concepts<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Procedural instructions<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Templates &amp; recording aids<\/p>\n<\/div><\/li><\/ul><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(67,69,73,0);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2775-2\"><div class=\"fusion-panel panel-default panel-38f28079f8689da98 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_38f28079f8689da98\"><a aria-expanded=\"false\" aria-controls=\"38f28079f8689da98\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-2\" data-target=\"#38f28079f8689da98\" href=\"#38f28079f8689da98\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is included in the training?  <\/span><\/a><\/h4><\/div><div id=\"38f28079f8689da98\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_38f28079f8689da98\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The training covers the following topics:<\/p>\n<p>&#8211; Information security norms and standards<\/p>\n<p>&#8211; IT-Grundschutz approach<\/p>\n<p>&#8211; Compendium<\/p>\n<p>&#8211; Risk analysis<\/p>\n<p>&#8211; Maintenance and continuous optimization<\/p>\n<p>&#8211; IT-Grundschutz profiles<\/p>\n<p>&#8211; Audit preparation<\/p>\n<p>&#8211; Emergency management according to BSI standard 200-4<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-5\" style=\"--awb-margin-top:30px;\"><p style=\"color: var(--awb-color1);\"><b><span style=\"color: var(--awb-color1);\">Targer audience:<\/span><span style=\"color: var(--awb-color1);\"><br \/><\/span><\/b>The training is aimed at all people in a company or administration who have been appointed as representatives in the area of \u200b\u200binformation security and who are seeking verification in this area.<\/p>\n<p><strong><span style=\"color: #ffffff;\">Frequently used titles for these people are:<\/span><\/strong><\/p>\n<ul style=\"color: white;\">\n<li><span style=\"color: #ffffff;\">Information Security Officer (ISB)<\/span><\/li>\n<li><span style=\"color: #ffffff;\">Information Security Manager (ISM)<\/span><\/li>\n<li><span style=\"color: #ffffff;\">IT Security Officer (IT-SiBe)<\/span><\/li>\n<\/ul>\n<p style=\"color: var(--awb-color1);\">In addition, the training is suitable for BSI-accredited audit team leaders and BSI IS auditors, auditors or consultants who are entrusted with the review and control of information security processes or in accordance with \u00a7 8a BSIG or who work towards this.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-4 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/www.copecart.com\/products\/046adcb1\/checkout\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Book our course online<\/span><\/a><\/div><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top:-38px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-right sm-text-align-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">1.649\u20ac excluding VAT<\/h5><\/div><\/div><\/div><\/div>\n<\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\" aria-orientation=\"horizontal\"><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-427b0daa259d5ca2f1a\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-427b0daa259d5ca2f1a\" href=\"#tab-427b0daa259d5ca2f1a\"><h5 class=\"fusion-tab-heading\">ISMS implementer<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-427b0daa259d5ca2f1a\" id=\"tab-427b0daa259d5ca2f1a\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-3 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">ISMS implementer<\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p style=\"color: var(--awb-color1);\">Cyber attacks and threats to information security are a serious problem that is characterized by a steady increase.<\/p>\n<p style=\"color: var(--awb-color1);\">By implementing and managing information security measures, you can defend yourself against potential attacks and protect your company appropriately.<\/p>\n<p style=\"color: var(--awb-color1);\">This course teaches participants how to implement an information security management system (ISMS) based on ISO\/IEC 27001. In addition, the training includes comprehensive training for the essential practices of an information security management system (ISMS), as well as its continuous management and optimization.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-4 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-3 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Training content:<\/h4><\/div><div class=\"fusion-text fusion-text-7 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><ul>\n<li>\n<p style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color); display: inline !important;\">Introduction to ISO\/IEC 27001<\/p>\n<\/li>\n<li>Basics of initiating an ISMS<\/li>\n<li>Planning the implementation of an ISMS<\/li>\n<li>Carrying out the implementation of an ISMS<\/li>\n<li>ISMS monitoring<\/li>\n<li>Preparation for a certification audit<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-8\" style=\"--awb-margin-top:30px;\"><p style=\"color: var(--awb-color1);\"><b><span style=\"color: var(--awb-color1);\">Target audience:<\/span><span style=\"color: var(--awb-color1);\"><br \/><\/span><\/b>The training is aimed at project managers, consultants and expert advisors who are involved in the implementation of ISMS. This also includes persons who are responsible for ensuring compliance and information security requirements within a company.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-5 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Request a course<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\" aria-orientation=\"horizontal\"><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-b528f56601336b47ba0\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-b528f56601336b47ba0\" href=\"#tab-b528f56601336b47ba0\"><h5 class=\"fusion-tab-heading\">Data Protection training<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-b528f56601336b47ba0\" id=\"tab-b528f56601336b47ba0\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-5 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:29px;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-4 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Data Protection Officer<\/h4><\/div><div class=\"fusion-text fusion-text-9 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:30px;\"><p>The EU General Data Protection Regulation came into force on May 25, 2016 and has been mandatory since May 25, 2018. This regulatory change has triggered a comprehensive reorganization of data protection. Companies with more than twenty employees that carry out automated processing of personal data are required to appoint a company data protection officer.<\/p>\n<p>However, regardless of the number of employees, a company data protection officer must be appointed as soon as a data protection impact assessment has to be carried out if personal data is processed automatically in a company for the purpose of transmission or market or opinion research.<\/p>\n<p>The content of this training course is basic knowledge about the topic of data protection and the legal changes that have resulted from the entry into force of the GDPR.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(67,69,73,0);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2775-3\"><div class=\"fusion-panel panel-default panel-62718b43a7271c31e fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_62718b43a7271c31e\"><a aria-expanded=\"false\" aria-controls=\"62718b43a7271c31e\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-3\" data-target=\"#62718b43a7271c31e\" href=\"#62718b43a7271c31e\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is included in the training?<\/span><\/a><\/h4><\/div><div id=\"62718b43a7271c31e\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_62718b43a7271c31e\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>The course content includes the following topics in particular:<\/p>\n<ul>\n<li>Legally compliant handling of personal data<\/li>\n<li>Consideration of the organizational environment<\/li>\n<li>Technical and organizational data protection measures<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-10 fusion-text-no-margin\" style=\"--awb-margin-top:30px;--awb-margin-bottom:30px;\"><p><span style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color-hover);\"><b><span style=\"color: var(--awb-color1);\">Target audience:<\/span><span style=\"color: var(--awb-color1);\"><br \/><\/span><\/b><span style=\"color: var(--awb-color1);\">This training is aimed at groups of people who would like to qualify as company data protection officers or who are interested in the topic of data protection.<\/span><\/span><b><br \/><\/b><\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-6 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Request a course<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-6 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-5 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Data Protection auditor<\/h4><\/div><div class=\"fusion-text fusion-text-11 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:30px;\"><p>An expressive and effective data protection concept is subject to regular monitoring and optimization. In order to be able to guarantee this, it is essential to master the data protection audit as a dedicated instrument in order to be able to meet your customer and authority requirements securely and to ensure continuous improvement.<\/p>\n<p>The data protection auditor is able to identify weaknesses within a data protection concept through systematic testing procedures and to initiate improvements that provide an overall assessment of the concept.<\/p>\n<p>The data protection auditor training not only deepens your knowledge as a data protection expert, but also enables you to review data protection concepts and master critical audit situations with confidence.<\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(67,69,73,0);--awb-divider-hover-color:var(--awb-color3);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color1);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:16px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2775-4\"><div class=\"fusion-panel panel-default panel-41a5b1fdb02a6b2c5 fusion-toggle-has-divider\" style=\"--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color1);\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_41a5b1fdb02a6b2c5\"><a aria-expanded=\"false\" aria-controls=\"41a5b1fdb02a6b2c5\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-4\" data-target=\"#41a5b1fdb02a6b2c5\" href=\"#41a5b1fdb02a6b2c5\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What is included in the training?  <\/span><\/a><\/h4><\/div><div id=\"41a5b1fdb02a6b2c5\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_41a5b1fdb02a6b2c5\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p>In terms of content, the following topics in particular are addressed in the data protection auditor training course:<\/p>\n<ul>\n<li>Requirements for a data protection audit<\/li>\n<li>Planning data protection audits<\/li>\n<li>Selection of relevant specialist areas and processes<\/li>\n<li>Conversation management as well as communication and questioning techniques<\/li>\n<li>Implementation of a data protection audit<\/li>\n<li>Follow-up and evaluation of data protection audits<\/li>\n<\/ul>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-12\" style=\"--awb-margin-top:30px;\"><p style=\"color: var(--awb-color1);\"><b><span style=\"color: var(--awb-color1);\">Targer audience:<\/span><span style=\"color: var(--awb-color1);\"><br \/><\/span><\/b>This training is aimed at a data protection officer, as well as an employee and person responsible for data protection, data security and compliance. This training is also of interest to managers and project managers.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-7 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Request a course<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\" aria-orientation=\"horizontal\"><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-8697bdeb958560180dd\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-8697bdeb958560180dd\" href=\"#tab-8697bdeb958560180dd\"><h5 class=\"fusion-tab-heading\">Internal control system (ICS)<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-8697bdeb958560180dd\" id=\"tab-8697bdeb958560180dd\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-7 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:29px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">Internal control system (ICS)<\/h2><\/div><div class=\"fusion-text fusion-text-13\"><p style=\"color: var(--awb-color1);\">Due to legal requirements (e.g. GoBD or KonTraG) and a constantly changing risk structure, the introduction of internal control systems in companies is indispensable.<\/p>\n<p style=\"color: var(--awb-color1);\">The aim of this training course is to create a secure basis for your business processes using an ICS. Against this background, it is possible to define, set up and subsequently implement your own internal control system.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-8 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-6 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Training content:<\/h4><\/div><div class=\"fusion-text fusion-text-14 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:0px;\"><ul>\n<li>Introduction, basics and requirements<\/li>\n<li>Structure and implementation<\/li>\n<li>Detailed review of business processes<\/li>\n<li>Use of internal optimization parameters<\/li>\n<li>External test units<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-15\" style=\"--awb-margin-top:30px;\"><p style=\"color: var(--awb-color1);\"><b><span style=\"color: var(--awb-color1);\">Target audience:<\/span><span style=\"color: var(--awb-color1);\"><br \/><\/span><\/b>This training is suitable for employees from the areas of governance, compliance or internal audit.<\/p>\n<p style=\"color: var(--awb-color1);\">The course is also aimed at specialists and managers who would like to expand their knowledge of this topic.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-8 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Request a course<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\" aria-orientation=\"horizontal\"><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-21112c8d4518997250b\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-21112c8d4518997250b\" href=\"#tab-21112c8d4518997250b\"><h5 class=\"fusion-tab-heading\">Cloud Security<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-21112c8d4518997250b\" id=\"tab-21112c8d4518997250b\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-9 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:30px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-13 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">Cloud Security<\/h2><\/div><div class=\"fusion-text fusion-text-16\"><p style=\"color: var(--awb-color1);\">Cloud computing is now present across all sectors and industries. The implementation and use of cloud services offers a number of advantages, but also risks and threats in the area of information security.<\/p>\n<p style=\"color: var(--awb-color1);\">In order to guarantee full protection, the cloud requires modern methods and security measures. The training provides the basics of cloud security, as well as an overview of current and relevant threats with corresponding solutions.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-10 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-7 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-14 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Training content:<\/h4><\/div><div class=\"fusion-text fusion-text-17 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:-20px;\"><ul>\n<li>\n<p style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color); display: inline !important;\">Organizational aspect of cloud security<\/p>\n<\/li>\n<li>Cloud Data Center<\/li>\n<li>Shared responsibility<\/li>\n<li>Compliance programs<\/li>\n<li>Threats and risks when using the cloud<\/li>\n<li>Workspace Security<\/li>\n<\/ul>\n<\/div><div class=\"fusion-text fusion-text-18\" style=\"--awb-margin-top:30px;\"><p style=\"color: var(--awb-color1);\"><b><span style=\"color: var(--awb-color1);\">Target audience:<\/span><span style=\"color: var(--awb-color1);\"><br \/><\/span><\/b>This training is aimed at IT managers and implementers in companies and authorities who have or are considering developing cloud security. This course is also relevant for people who want to expand their knowledge of cloud use.<\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-9 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Request a course<\/span><\/a><\/div><\/div><\/div><\/div><\/div><div class=\"nav fusion-mobile-tab-nav\"><ul class=\"nav-tabs nav-justified\" role=\"tablist\" aria-orientation=\"horizontal\"><li  role=\"presentation\"><a class=\"tab-link\" data-toggle=\"tab\" role=\"tab\" aria-controls=\"tab-6a641cbf7ff03ec5604\" aria-selected=\"false\" tabindex=\"-1\" id=\"mobile-fusion-tab-6a641cbf7ff03ec5604\" href=\"#tab-6a641cbf7ff03ec5604\"><h5 class=\"fusion-tab-heading\">IT emergency management<\/h5><\/a><\/li><\/ul><\/div><div class=\"tab-pane fade fusion-clearfix\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"fusion-tab-6a641cbf7ff03ec5604\" id=\"tab-6a641cbf7ff03ec5604\">\n<div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-center fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-11 fusion_builder_column_inner_1_2 1_2 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:50%;--awb-margin-top-large:0px;--awb-spacing-right-large:3.84%;--awb-margin-bottom-large:20px;--awb-spacing-left-large:3.84%;--awb-width-medium:50%;--awb-order-medium:0;--awb-spacing-right-medium:3.84%;--awb-spacing-left-medium:3.84%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-margin-bottom-small:30px;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-15 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">IT emergency management<\/h2><\/div><div class=\"fusion-text fusion-text-19\"><p style=\"color: var(--awb-color1);\">IT emergency management deals with the management of emergency situations relating to information technology. This includes the planning and implementation of measures to prevent IT emergencies and the establishment of processes and procedures to deal with emergencies if they do occur.<\/p>\n<p style=\"color: var(--awb-color1);\">An important aspect of IT emergency management is the establishment of redundancies and fallback mechanisms to minimize the impact of emergencies on the company and its operations.<\/p>\n<p style=\"color: var(--awb-color1);\">Another important part of IT emergency management is the regular monitoring and review of emergency procedures. This includes carrying out tests and exercises to ensure that emergency procedures are up to date and working effectively.<\/p>\n<p style=\"color: var(--awb-color1);\">Overall, IT emergency management is an important part of any company that relies on information technology. It helps to minimize the impact of IT emergencies on the company and its operations and ensures that the company can continue to work effectively even in difficult situations.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-12 fusion-flex-column fusion-flex-align-self-stretch borderhover2 equali\" style=\"--awb-z-index:2;--awb-padding-top:40px;--awb-padding-right:40px;--awb-padding-bottom:40px;--awb-padding-left:40px;--awb-overflow:hidden;--awb-bg-color:#2d2d2d;--awb-bg-color-hover:#2d2d2d;--awb-bg-size:cover;--awb-border-radius:17px 17px 17px 17px;--awb-width-large:47%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:47%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-scroll-devices=\"small-visibility,medium-visibility,large-visibility\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-max-width:200px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-8 hover-type-none\"><img decoding=\"async\" width=\"412\" height=\"66\" title=\"cyber-curriculum-logo-schriftzug_406x66\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png\" alt class=\"img-responsive wp-image-2475\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-200x32.png 200w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66-400x64.png 400w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/cyber-curriculum-logo-schriftzug_406x66.png 412w\" sizes=\"(max-width: 640px) 100vw, 412px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-16 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Training content according to ISO 22301 and BSI 200-4:<\/h4><\/div><div class=\"fusion-text fusion-text-20 fusion-text-no-margin\" style=\"--awb-text-transform:none;--awb-text-color:var(--awb-color1);--awb-margin-bottom:20px;--awb-margin-left:-23px;\"><ul>\n<li>\n<p style=\"color: var(--awb-text-color); font-family: var(--awb-text-font-family); font-size: var(--awb-font-size); font-style: var(--awb-text-font-style); font-weight: var(--awb-text-font-weight); letter-spacing: var(--awb-letter-spacing); text-align: var(--awb-content-alignment); text-transform: var(--awb-text-transform); background-color: var(--awb-bg-color); display: inline !important;\">Introduction to the basics of IT emergency management and the ISO 22301 and BSI 200-4 standards<\/p>\n<\/li>\n<li>Explanation of the requirements and best practices defined in the standards<\/li>\n<li>Overview of the various steps involved in IT emergency management, from risk analysis and emergency planning to monitoring and reviewing emergency procedures<\/li>\n<li>Tips and recommendations for implementing emergency procedures in the company, including setting up backup systems and creating emergency communication plans<\/li>\n<li>Best practices for conducting tests and exercises to check the effectiveness of emergency procedures and adjust them if necessary<\/li>\n<li>Discussion of current challenges and trends in the field of IT emergency management, such as the increasing use of cloud technologies and the importance of cyber resilience.<\/li>\n<\/ul>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-10 fusion-button-default-span fusion-button-default-type\" target=\"_blank\" rel=\"noopener noreferrer\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Request a course<\/span><\/a><\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion-flex-column fusion-no-small-visibility\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:28%;--awb-margin-top-large:0px;--awb-spacing-right-large:6.8571428571429%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:6.8571428571429%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-1 fusion-no-medium-visibility\" data-id=\"1\" style=\"--awb-margin-right:-60px;--awb-margin-left:-60px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/15-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion-flex-column fusion-animated\" style=\"--awb-bg-size:cover;--awb-width-large:72%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.6666666666667%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.6666666666667%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\" data-animationType=\"fadeInRight\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-17 fusion-sep-none fusion-title-text fusion-title-size-three gradient-text\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:35;line-height:var(--awb-typography1-line-height);\">Why is IT security so important for companies?<\/h3><\/div><div class=\"fusion-text fusion-text-21 md-text-align-center sm-text-align-center\"><p><span style=\"color: #ffffff;\">Because cyber attacks are becoming more frequent and more sophisticated. Digitalization means that the number of applications, data and systems is constantly increasing. IT security is therefore more important than ever in all areas. From software development to securing the infrastructure and end devices &#8211; security must be considered at all levels right from the start.<\/span><\/p>\n<\/div><div class=\"accordian fusion-accordian\" style=\"--awb-padding-bottom:10px;--awb-border-size:1px;--awb-icon-size:16px;--awb-content-font-size:var(--awb-typography4-font-size);--awb-icon-alignment:left;--awb-hover-color:var(--awb-color2);--awb-border-color:var(--awb-color3);--awb-background-color:var(--awb-color1);--awb-divider-color:rgba(0,0,0,0);--awb-divider-hover-color:rgba(0,0,0,0);--awb-icon-color:var(--awb-color1);--awb-title-color:var(--awb-color1);--awb-content-color:var(--awb-color8);--awb-icon-box-color:var(--awb-color8);--awb-toggle-hover-accent-color:var(--awb-color4);--awb-toggle-active-accent-color:var(--awb-color4);--awb-title-font-family:var(--awb-typography1-font-family);--awb-title-font-weight:var(--awb-typography1-font-weight);--awb-title-font-style:var(--awb-typography1-font-style);--awb-title-font-size:22px;--awb-title-letter-spacing:var(--awb-typography1-letter-spacing);--awb-title-line-height:var(--awb-typography1-line-height);--awb-content-font-family:var(--awb-typography4-font-family);--awb-content-font-weight:var(--awb-typography4-font-weight);--awb-content-font-style:var(--awb-typography4-font-style);\"><div class=\"panel-group fusion-toggle-icon-unboxed\" id=\"accordion-2775-5\"><div class=\"fusion-panel panel-default panel-35d4acef5334801e6 fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_35d4acef5334801e6\"><a aria-expanded=\"false\" aria-controls=\"35d4acef5334801e6\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-5\" data-target=\"#35d4acef5334801e6\" href=\"#35d4acef5334801e6\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">What you can expect from us<\/span><\/a><\/h4><\/div><div id=\"35d4acef5334801e6\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_35d4acef5334801e6\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p style=\"color: #ffffff;\">A comprehensive IT security strategy is essential to ensure information security and data protection in the course of digitalization. CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span> can help you overcome this challenge and equip your company to defend against various types of cyber threats.<\/p>\n<p style=\"color: #ffffff;\">Our services are designed for companies of all sizes and include active measures as well as a wide range of IT security and data protection training courses.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-51efb2c54f8d49def fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_51efb2c54f8d49def\"><a aria-expanded=\"false\" aria-controls=\"51efb2c54f8d49def\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-5\" data-target=\"#51efb2c54f8d49def\" href=\"#51efb2c54f8d49def\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">IT security\/cyber security for companies - what needs to be considered?<\/span><\/a><\/h4><\/div><div id=\"51efb2c54f8d49def\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_51efb2c54f8d49def\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p><span style=\"color: #ffffff;\">IT security for companies is not just about using secure passwords and correctly managing access rights to internal files. You also need to be prepared for phishing attacks and other targeted attacks by cyber criminals. However, the human risk factor is often forgotten or not taken seriously enough, even though it is an important part of a comprehensive safety concept.<\/span><br \/><span style=\"color: #ffffff;\">If there is a lack of communication about digital security risks in a company, employees inadvertently open the door to hacker attacks. By raising awareness of potential risks within your company, you can help to ensure that the internal network is secure.<\/span><br \/><span style=\"color: #ffffff;\">Our cyber security training courses can help you understand the current vulnerabilities in your company&#8217;s infrastructure and what tools you can use to defend against hacker attacks.<\/span><\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-b53dc1a05470147db fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_b53dc1a05470147db\"><a aria-expanded=\"false\" aria-controls=\"b53dc1a05470147db\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-5\" data-target=\"#b53dc1a05470147db\" href=\"#b53dc1a05470147db\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">This is how we make you fit in all areas of cyber security<\/span><\/a><\/h4><\/div><div id=\"b53dc1a05470147db\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_b53dc1a05470147db\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p style=\"color: #ffffff;\">Cyberattacks can have a devastating impact and affect any company &#8211; large or small. Not only can they compromise sensitive company data, they can also paralyze a company&#8217;s entire IT infrastructure, rendering it unable to operate economically.<\/p>\n<p style=\"color: #ffffff;\">At CYBER CURRICULUM<span class=\"registered\">\u00ae<\/span>, we aim to assist businesses in establishing a reliable defense against cyber attacks. Our services include not only active support and guidance in the implementation of an information security management system (ISMS) and the implementation of customized data protection solutions, but also special training on cyber security awareness. We want to raise your awareness of IT security so that you can improve and protect your company&#8217;s network on your own.<\/p>\n<p style=\"color: #ffffff;\">Our portfolio includes training courses on all relevant cyber security topics at various levels.<\/p>\n<p style=\"color: #ffffff;\">We train and enable you to become competent IT experts and IT security officers:<\/p>\n<p style=\"color: #ffffff;\">&#8211; Identify security gaps in the company network<\/p>\n<p style=\"color: #ffffff;\">&#8211; Assess security threats from cyber criminals<\/p>\n<p style=\"color: #ffffff;\">&#8211; recognize potential threats<\/p>\n<p style=\"color: #ffffff;\">&#8211; take effective protective measures<\/p>\n<\/div><\/div><\/div><div class=\"fusion-panel panel-default panel-74af7276ede913f1b fusion-toggle-has-divider\"><div class=\"panel-heading\"><h4 class=\"panel-title toggle\" id=\"toggle_74af7276ede913f1b\"><a aria-expanded=\"false\" aria-controls=\"74af7276ede913f1b\" role=\"button\" data-toggle=\"collapse\" data-parent=\"#accordion-2775-5\" data-target=\"#74af7276ede913f1b\" href=\"#74af7276ede913f1b\"><span class=\"fusion-toggle-icon-wrapper\" aria-hidden=\"true\"><i class=\"fa-fusion-box active-icon awb-icon-minus\" aria-hidden=\"true\"><\/i><i class=\"fa-fusion-box inactive-icon awb-icon-plus\" aria-hidden=\"true\"><\/i><\/span><span class=\"fusion-toggle-heading\">We train you to become competent IT experts and IT security officers<\/span><\/a><\/h4><\/div><div id=\"74af7276ede913f1b\" class=\"panel-collapse collapse \" aria-labelledby=\"toggle_74af7276ede913f1b\"><div class=\"panel-body toggle-content fusion-clearfix\">\n<p style=\"color: #ffffff;\">Our comprehensive training courses transform you into competent IT experts and IT security officers. We provide the knowledge and skills you need to succeed in the fast-paced world of information technology and effectively protect your business from threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:80px;--awb-padding-bottom:80px;--awb-padding-top-medium:43px;--awb-padding-top-small:30px;--awb-padding-bottom-small:19px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion-flex-column fusion-animated borderhover2 equali\" style=\"--awb-padding-top:60px;--awb-padding-right:60px;--awb-padding-bottom:60px;--awb-padding-left:60px;--awb-padding-top-medium:40px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:40px;--awb-padding-left-medium:40px;--awb-padding-top-small:25px;--awb-padding-right-small:25px;--awb-padding-bottom-small:25px;--awb-padding-left-small:25px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:95%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:95%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-13 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:70%;--awb-margin-top-large:0px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.7428571428571%;--awb-width-medium:70%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:2.7428571428571%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-18 fusion-sep-none fusion-title-text fusion-title-size-four\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h4 class=\"fusion-title-heading title-heading-left sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\">Our professional cyber security<br \/>Training at a glance<\/h4><\/div><ul style=\"--awb-iconcolor:var(--awb-color4);--awb-line-height:27.2px;--awb-icon-width:27.2px;--awb-icon-height:27.2px;--awb-icon-margin:11.2px;--awb-content-margin:38.4px;\" class=\"fusion-checklist fusion-checklist-3 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>BSI IT-Grundschutz for practitioners &amp; BSI IT-Grundschutz for consultants<\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>Data protection officer &amp; <span style=\"color: var(--awb-textcolor); background-color: var(--awb-even-row-bgcolor); font-size: var(--awb-size); font-family: var(--body_typography-font-family); font-style: var(--body_typography-font-style,normal); font-weight: var(--body_typography-font-weight); letter-spacing: var(--body_typography-letter-spacing);\">data protection auditor<\/span><\/p>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-no\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p>ISMS implementer<\/p>\n<\/div><\/li><\/ul><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-14 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:30%;--awb-margin-top-large:0px;--awb-spacing-right-large:6.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:0%;--awb-width-medium:30%;--awb-order-medium:0;--awb-spacing-right-medium:6.4%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-2\" data-id=\"2\" style=\"--awb-margin-right:-30px;--awb-margin-left:-30px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/16.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-5 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:40px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:31%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0.096%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-15 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:15%;--awb-margin-top-large:0px;--awb-spacing-right-large:12.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:12.8%;--awb-width-medium:15%;--awb-order-medium:0;--awb-spacing-right-medium:12.8%;--awb-spacing-left-medium:12.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-9 hover-type-none\"><img decoding=\"async\" width=\"142\" height=\"142\" title=\"Group 293\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-293.png\" alt class=\"img-responsive wp-image-2567\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-293-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-293.png 142w\" sizes=\"(max-width: 142px) 100vw, 142px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-16 fusion_builder_column_inner_4_5 4_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-19 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">The procedure<\/h5><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-22\" style=\"--awb-margin-top:20px;\"><p style=\"color: var(--awb-color1);\">The training takes place at fixed times, which will be communicated to you in good time before the start of the training.<\/p>\n<p style=\"color: var(--awb-color1);\">Our trainers will show you by means of:<\/p>\n<ul style=\"color: white;\">\n<li><span style=\"color: var(--awb-color1);\">Demonstrations<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">Practical exercises<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">Simulations of real threat scenarios<\/span><\/li>\n<\/ul>\n<p style=\"color: var(--awb-color1);\">how you can protect your company from cyber attacks.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-6 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:40px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:31%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-17 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:15%;--awb-margin-top-large:0px;--awb-spacing-right-large:12.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:12.8%;--awb-width-medium:15%;--awb-order-medium:0;--awb-spacing-right-medium:12.8%;--awb-spacing-left-medium:12.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-10 hover-type-none\"><img decoding=\"async\" width=\"142\" height=\"142\" title=\"Group 292\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-292.png\" alt class=\"img-responsive wp-image-2568\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-292-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-292.png 142w\" sizes=\"(max-width: 142px) 100vw, 142px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-18 fusion_builder_column_inner_4_5 4_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-20 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">Training location<\/h5><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-23\" style=\"--awb-margin-top:20px;\"><p style=\"color: var(--awb-color1);\">We understand how challenging it can be to find the right training location, especially for larger groups.<\/p>\n<p style=\"color: var(--awb-color1);\">That&#8217;s why we focus entirely on you and offer the following options to suit your individual requirements:<\/p>\n<ul style=\"color: white;\">\n<li><span style=\"color: var(--awb-color1);\">Meeting Point at Your Location<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">Meeting Point at Our Location <\/span><\/li>\n<li>Virtual Meeting<\/li>\n<\/ul>\n<p><span style=\"color: #ffffff;\"> <\/span><\/p>\n<\/div><div ><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-11 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.mymemberspot.de\/auth\/login?redirectTo=%2Fhome%2Fstart\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">To the training platform login<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-7 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:40px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:31%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-19 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:15%;--awb-margin-top-large:0px;--awb-spacing-right-large:12.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:12.8%;--awb-width-medium:15%;--awb-order-medium:0;--awb-spacing-right-medium:12.8%;--awb-spacing-left-medium:12.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-11 hover-type-none\"><img decoding=\"async\" width=\"142\" height=\"142\" title=\"Group 291\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-291.png\" alt class=\"img-responsive wp-image-2569\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-291-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-291.png 142w\" sizes=\"(max-width: 142px) 100vw, 142px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-20 fusion_builder_column_inner_4_5 4_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-21 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">Participation requirements<\/h5><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-24\" style=\"--awb-margin-top:20px;\"><p style=\"color: var(--awb-color1);\">Our courses are open to anyone interested.<\/p>\n<p style=\"color: var(--awb-color1);\">However, it is important that you have the technical requirements to be able to participate fully in our interactive, digital training.<\/p>\n<p style=\"color: var(--awb-color1);\">All you need is:<\/p>\n<ul style=\"color: white;\">\n<li><span style=\"color: var(--awb-color1);\">A PC or laptop (incl. webcam and microphone)<\/span><\/li>\n<li><span style=\"color: var(--awb-color1);\">A stable Internet connection<\/span><\/li>\n<\/ul>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-8 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:40px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:31%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:45%;--awb-order-medium:0;--awb-spacing-right-medium:0px;--awb-spacing-left-medium:0px;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-21 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:15%;--awb-margin-top-large:0px;--awb-spacing-right-large:12.8%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:12.8%;--awb-width-medium:15%;--awb-order-medium:0;--awb-spacing-right-medium:12.8%;--awb-spacing-left-medium:12.8%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-12 hover-type-none\"><img decoding=\"async\" width=\"142\" height=\"142\" title=\"Group 290\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-290.png\" alt class=\"img-responsive wp-image-2570\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-290-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-290.png 142w\" sizes=\"(max-width: 142px) 100vw, 142px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-22 fusion_builder_column_inner_4_5 4_5 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:80%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.4%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.4%;--awb-width-medium:80%;--awb-order-medium:0;--awb-spacing-right-medium:2.4%;--awb-spacing-left-medium:2.4%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-22 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">Period &amp; duration<\/h5><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-25\" style=\"--awb-margin-top:20px;\"><p style=\"color: var(--awb-color1);\">Our cyber security training courses are scheduled to start in 2024.<\/p>\n<p style=\"color: var(--awb-color1);\">Further information on training times and course duration will be announced shortly.<\/p>\n<\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-9 fusion-flex-column borderhover2 equali\" style=\"--awb-padding-top:30px;--awb-padding-right:30px;--awb-padding-bottom:40px;--awb-padding-left:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:64%;--awb-margin-top-large:0px;--awb-spacing-right-large:0px;--awb-margin-bottom-large:20px;--awb-spacing-left-large:0px;--awb-width-medium:94%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0.096%;--awb-spacing-left-small:0%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-stretch fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-23 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:8%;--awb-margin-top-large:0px;--awb-spacing-right-large:24%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:24%;--awb-width-medium:8%;--awb-order-medium:0;--awb-spacing-right-medium:24%;--awb-spacing-left-medium:24%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-image-element \" style=\"--awb-max-width:40px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-13 hover-type-none\"><img decoding=\"async\" width=\"142\" height=\"142\" title=\"Group 289\" src=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-289.png\" alt class=\"img-responsive wp-image-2566\" srcset=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-289-66x66.png 66w, https:\/\/cyber-curriculum.com\/wp-content\/uploads\/Group-289.png 142w\" sizes=\"(max-width: 142px) 100vw, 142px\" \/><\/span><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-24 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:90%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.1333333333333%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.1333333333333%;--awb-width-medium:90%;--awb-order-medium:0;--awb-spacing-right-medium:2.1333333333333%;--awb-spacing-left-medium:2.1333333333333%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-23 fusion-sep-none fusion-title-text fusion-title-size-five\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-bottom:0px;--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h5 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:20;--minFontSize:20;line-height:var(--awb-typography1-line-height);\">General information<\/h5><\/div><\/div><\/div><\/div><div class=\"fusion-text fusion-text-26\" style=\"--awb-margin-top:20px;\"><p style=\"color: var(--awb-color1);\">Regular and active participation is a prerequisite and is necessary to pass the training with certificate. IT security training at Cyber Curriculum<span class=\"registered\">\u00ae<\/span>: We create awareness among your employees. A strong security culture is essential in today&#8217;s age of cybercrime. As cyber criminals become more professional and threats become more complex, it is important that you educate and train your employees in cyber security and risk management. Cyber Curriculum<span class=\"registered\">\u00ae<\/span> helps you with this. We raise the security awareness of your employees in the digital space and thus reduce the human security risk.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-6 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-padding-top:0px;--awb-padding-bottom:80px;--awb-padding-top-small:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"max-width:1352px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-10 fusion-flex-column fusion-animated borderhover2\" style=\"--awb-padding-top:100px;--awb-padding-right:80px;--awb-padding-bottom:100px;--awb-padding-left:80px;--awb-padding-right-medium:40px;--awb-padding-bottom-medium:80px;--awb-padding-left-medium:40px;--awb-padding-top-small:40px;--awb-padding-right-small:30px;--awb-padding-bottom-small:40px;--awb-padding-left-small:30px;--awb-overflow:hidden;--awb-bg-color:#212121;--awb-bg-color-hover:#212121;--awb-bg-size:cover;--awb-border-color:var(--awb-color4);--awb-border-top:0px;--awb-border-right:0px;--awb-border-bottom:0px;--awb-border-left:0px;--awb-border-style:solid;--awb-border-radius:15px 15px 15px 15px;--awb-width-large:100%;--awb-margin-top-large:40px;--awb-spacing-right-large:0%;--awb-margin-bottom-large:40px;--awb-spacing-left-large:0%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:0%;--awb-spacing-left-medium:0%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:0%;--awb-margin-bottom-small:0px;--awb-spacing-left-small:0%;\" data-animationType=\"fadeInUp\" data-animationDuration=\"2.0\" data-animationOffset=\"top-into-view\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-builder-row fusion-builder-row-inner fusion-row fusion-flex-align-items-flex-start fusion-flex-justify-content-center fusion-flex-content-wrap\" style=\"--awb-flex-grow:0;--awb-flex-grow-medium:0;--awb-flex-grow-small:0;--awb-flex-shrink:0;--awb-flex-shrink-medium:0;--awb-flex-shrink-small:0;width:104% !important;max-width:104% !important;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-25 fusion_builder_column_inner_2_3 2_3 fusion-flex-column fusion-flex-align-self-center\" style=\"--awb-bg-size:cover;--awb-width-large:66.666666666667%;--awb-margin-top-large:0px;--awb-spacing-right-large:2.88%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:2.88%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-27 md-text-align-center sm-text-align-center fusion-text-no-margin\" style=\"--awb-margin-bottom:0px;\"><p style=\"color: var(--awb-color1); font-size: 18px;\" data-fusion-font=\"true\">Have we caught your Attention?<\/p>\n<\/div><div class=\"fusion-title title fusion-title-24 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-text-color:var(--awb-color4);--awb-margin-top-small:10px;--awb-margin-right-small:0px;--awb-margin-bottom-small:10px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left md-text-align-center sm-text-align-center fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:40;line-height:var(--awb-typography1-line-height);\">ARE YOU READY TO<br \/>\nSECURE YOUR ORGANIZATION?<\/h2><\/div><div class=\"fusion-text fusion-text-28 md-text-align-center sm-text-align-center\"><p style=\"color: var(--awb-color1);\">Do you need a non-binding quote or further information?<br \/>\nThen feel free to reach out to us or book a non-binding consultation appointment.<\/p>\n<\/div><div class=\"md-text-align-center sm-text-align-center\"><a class=\"fusion-button button-flat fusion-button-default-size button-default fusion-button-default button-12 fusion-button-default-span fusion-button-default-type\" target=\"_self\" href=\"https:\/\/cyber-curriculum.com\/en\/contact-us\/\"><span class=\"fusion-button-text awb-button__text awb-button__text--default\">Book your call<\/span><\/a><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column_inner fusion-builder-nested-column-26 fusion_builder_column_inner_1_3 1_3 fusion-flex-column\" style=\"--awb-padding-right-medium:100px;--awb-padding-left-medium:100px;--awb-bg-size:cover;--awb-width-large:33.333333333333%;--awb-margin-top-large:0px;--awb-spacing-right-large:5.76%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:5.76%;--awb-width-medium:100%;--awb-order-medium:0;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-order-small:0;--awb-margin-top-small:50px;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-lottie fusion-lottie-3 fusion-no-small-visibility\" data-id=\"3\" style=\"--awb-margin-top:-90px;--awb-margin-right:-70px;--awb-margin-bottom:-150px;--awb-margin-left:-70px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"viewport\" data-start_point=\"0\" data-end_point=\"100\" data-animationoffset=\"top-into-view\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><div class=\"fusion-lottie fusion-lottie-4 fusion-no-medium-visibility fusion-no-large-visibility\" data-id=\"4\" style=\"--awb-margin-top:-70px;--awb-margin-right:-100px;--awb-margin-bottom:-50px;--awb-margin-left:-100px;\"><div class=\"fusion-lottie-animation\" data-path=\"https:\/\/cyber-curriculum.com\/wp-content\/uploads\/2-1.json\" data-loop=\"1\" data-reverse=\"0\" data-speed=\"1\" data-trigger=\"none\" data-start_point=\"0\" data-end_point=\"100\"><lottie-player loop=\"1\" speed=\"1\"><\/lottie-player><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div>\n<\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":13,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"100-width.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-2775","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Training - CyberCurriculum<\/title>\n<meta name=\"description\" content=\"Build more digital security for your company through training and awareness-raising.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyber-curriculum.com\/en\/training\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Training - CyberCurriculum\" \/>\n<meta property=\"og:description\" content=\"Build more digital security for your company through training and awareness-raising.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyber-curriculum.com\/en\/training\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberCurriculum\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-20T17:56:59+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"95 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/training\\\/\",\"url\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/training\\\/\",\"name\":\"Training - CyberCurriculum\",\"isPartOf\":{\"@id\":\"\\\/#website\"},\"datePublished\":\"2023-09-17T10:14:23+00:00\",\"dateModified\":\"2025-02-20T17:56:59+00:00\",\"description\":\"Build more digital security for your company through training and awareness-raising.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/training\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/cyber-curriculum.com\\\/en\\\/home\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"\\\/#website\",\"url\":\"\\\/\",\"name\":\"CyberCurriculum\",\"description\":\"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Training - CyberCurriculum","description":"Build more digital security for your company through training and awareness-raising.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyber-curriculum.com\/en\/training\/","og_locale":"en_US","og_type":"article","og_title":"Training - CyberCurriculum","og_description":"Build more digital security for your company through training and awareness-raising.","og_url":"https:\/\/cyber-curriculum.com\/en\/training\/","og_site_name":"CyberCurriculum","article_modified_time":"2025-02-20T17:56:59+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"95 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyber-curriculum.com\/en\/training\/","url":"https:\/\/cyber-curriculum.com\/en\/training\/","name":"Training - CyberCurriculum","isPartOf":{"@id":"\/#website"},"datePublished":"2023-09-17T10:14:23+00:00","dateModified":"2025-02-20T17:56:59+00:00","description":"Build more digital security for your company through training and awareness-raising.","breadcrumb":{"@id":"https:\/\/cyber-curriculum.com\/en\/training\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyber-curriculum.com\/en\/training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyber-curriculum.com\/en\/training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/cyber-curriculum.com\/en\/home\/"},{"@type":"ListItem","position":2,"name":"Training"}]},{"@type":"WebSite","@id":"\/#website","url":"\/","name":"CyberCurriculum","description":"Cyber Security \u00bb IT-Consulting &amp; -Sicherheit","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2775","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/comments?post=2775"}],"version-history":[{"count":15,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2775\/revisions"}],"predecessor-version":[{"id":4242,"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/pages\/2775\/revisions\/4242"}],"wp:attachment":[{"href":"https:\/\/cyber-curriculum.com\/en\/wp-json\/wp\/v2\/media?parent=2775"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}