{"html":{".container--page":"\u003cdiv class=\"container container--page container--subject with-content-background\"\u003e\u003csection class=\"content content--medium aligned-right\"\u003e\u003cdiv class=\"filter-overlay\"\u003e\u003cdiv class=\"filter-overlay__loader\"\u003e\u003cdiv class=\"filter-overlay__icon\"\u003e\u003cdiv class=\"icon__circle icon-star\"\u003e\u003ci class=\"ma-star material-icons icon--medium\"\u003estar\u003c/i\u003e\u003c/div\u003e\u003c/div\u003e\u003csvg class=\"circular\" viewBox=\"25 25 50 50\"\u003e\u003ccircle class=\"path\" cx=\"50\" cy=\"50\" fill=\"none\" r=\"20\" stroke-miterlimit=\"10\" stroke-width=\"2\"\u003e\u003c/circle\u003e\u003c/svg\u003e\u003c/div\u003e\u003cdiv class=\"filter-overlay__usp\"\u003e\u003cdiv class=\"as-h3\"\u003eErvaringen van deelnemers\u003c/div\u003e\u003cp\u003eRuim 131.000 onafhankelijke ervaringen.\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"ajax-wrapper\"\u003e\u003ch1 class=\"subject__title\"\u003e14 Threat intelligence trainingen, cursussen \u0026amp; opleidingen\u003c/h1\u003e\u003cp class=\"subject__alternatives show-from-tablet\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/it-ict-beveiliging/bisl\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"188 Cyber Security trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cyber-security/bisl\"\u003eCyber Security\u003c/a\u003e en \u003ca title=\"21 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/penetration-testing/bisl\"\u003ePenetration testing\u003c/a\u003e.\u003c/p\u003e\u003cp class=\"subject__alternatives show-on-mobile\"\u003eBekijk ook: \u003ca title=\"500 IT Security Opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/it-ict-beveiliging/bisl\"\u003eIT Beveiliging / Security\u003c/a\u003e, \u003ca title=\"188 Cyber Security trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/cyber-security/bisl\"\u003eCyber Security\u003c/a\u003e en \u003ca title=\"21 Penetration testing trainingen, cursussen \u0026amp; opleidingen\" rel=\"nofollow\" href=\"/automatisering-ict/penetration-testing/bisl\"\u003ePenetration testing\u003c/a\u003e.\u003c/p\u003e\u003csection class=\"panel\"\u003e\u003cdiv class=\"result-options--mobile mobile-filter\"\u003e\u003cdiv class=\"mobile-filter__actions\"\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-tune material-icons icon--normal\"\u003etune\u003c/i\u003e 1 actieve filter\u003c/a\u003e\u003ca class=\"toggle-mobile-sorting mobile-filter__button\" href=\"#\"\u003e\u003ci class=\"ma-reorder material-icons icon--normal\"\u003ereorder\u003c/i\u003e Sorteren\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"mobile-filter__active-filters\"\u003e\u003cspan class=\"label--filter\"\u003eBISL\u003c/span\u003e\u003ca class=\"toggle-mobile-filters mobile-filter__edit\" href=\"#\"\u003eWijzig filters\u003ci class=\"ma-keyboard_arrow_right material-icons \"\u003ekeyboard_arrow_right\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"subject-messsages\"\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--top\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003cdiv class=\"sorting aligned-right\"\u003e\u003cdiv class=\"sorting__header\"\u003eSortering veranderen\u003ca class=\"sorting__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"sorting__content\"\u003e\u003cspan class=\"sorting__label\"\u003eSorteren\u003c/span\u003e\u003cul class=\"sorting__list\"\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link is-active\" data-url=\"/automatisering-ict/threat-intelligence/bisl\" data-link-type=\"sort\" href=\"#\"\u003eRelevantie en ervaringen\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/bisl/prijs-hoog-laag\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (hoog \u0026gt; laag)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/bisl/prijs-laag-hoog\" data-link-type=\"sort\" href=\"#\"\u003ePrijs (laag \u0026gt; hoog)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/bisl/duur-lang-kort\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (lang \u0026gt; kort)\u003c/a\u003e\u003c/li\u003e\u003cli class=\"sorting__item\"\u003e\u003ca class=\"sorting__link \" data-url=\"/automatisering-ict/threat-intelligence/bisl/duur-kort-lang\" data-link-type=\"sort\" href=\"#\"\u003eTijdsduur (kort \u0026gt; lang)\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-list\"\u003e\u003cdiv class=\"result-item product-item\" id=\"training-917402\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-917402\" id=\"training-917402\" value=\"917402\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Certified Threat Intelligence Analyst [EC-CTIA]\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-ec-ctia\"\u003eCertified Threat Intelligence Analyst [EC-CTIA]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Certified Threat Intelligence Analyst (CTIA) is designed and developed in collaboration with cybersecurity and threat intelligence…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.585\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-ec-ctia/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-ec-ctia/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1257258\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1257258\" id=\"training-1257258\" value=\"1257258\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: English Delivery Only: Check Point Threat Prevention Specialist (CTPS) R81.20 [ARR_CKT_CTPS_R81_20]\" href=\"/global-knowledge-network-netherlands-b-v/english-delivery-only-check-point-threat-prevention-specialist-ctps-r81-20-arr_ckt_ctps_r81_20\"\u003eEnglish Delivery Only: Check Point Threat Prevention Specialist (CTPS) R81.20 [ARR_CKT_CTPS_R81_20]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eBrugge en Gent\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This two-day Specialist-level course is designed for security professionals who want to gain the concepts and skills necessary to …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.060\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/english-delivery-only-check-point-threat-prevention-specialist-ctps-r81-20-arr_ckt_ctps_r81_20/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/english-delivery-only-check-point-threat-prevention-specialist-ctps-r81-20-arr_ckt_ctps_r81_20/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1161200\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1161200\" id=\"training-1161200\" value=\"1161200\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF-CPLL]\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf-cpll\"\u003eFundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF-CPLL]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW OBJECTIVES CONTENT\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 795\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf-cpll/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf-cpll/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1098111\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1098111\" id=\"training-1098111\" value=\"1098111\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF]\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf\"\u003eFundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 18 mei 2026 en 7 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 20 juli 2026 in Zoetermeer (Kinderen v Versteegplein 18) en 1 andere datum\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configu…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.295\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1111280\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1111280\" id=\"training-1111280\" value=\"1111280\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: QRadar SIEM: Gathering Threat Management Data (v7.5) - SPVC [BQ310G]\" href=\"/global-knowledge-network-netherlands-b-v/qradar-siem-gathering-threat-management-data-v7-5-spvc-bq310g\"\u003eQRadar SIEM: Gathering Threat Management Data (v7.5) - SPVC [BQ310G]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Are you ready to explain how QRadar processes data in your organization\u0026#39;s environment? Interpret QRadar log sources (events) and n…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 650\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/qradar-siem-gathering-threat-management-data-v7-5-spvc-bq310g/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/qradar-siem-gathering-threat-management-data-v7-5-spvc-bq310g/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-672791\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-672791\" id=\"training-672791\" value=\"672791\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: EC-Council Certified Threat Intelligence Analyst (CTIA) incl. examen\" href=\"/dutchtrain/certified-threat-intelligence-analyst-ctia-incl-examen\"\u003eEC-Council Certified Threat Intelligence Analyst (CTIA) incl. examen\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van DutchTrain\" title=\"Logo van DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-c9e11845eb15cc58052d8474cde2a999.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eEC-Council Certified Threat Intelligence Analyst (CTIA) incl. examen Certified Threat Intelligence Analyst (C|TIA) is a training and creden…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.045\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003cli\u003e\u003cstrong\u003eExtra informatie:\u003c/strong\u003e \u003cem\u003e\u0026quot;Excl. Examen \u0026amp;amp; BTW\u0026quot;\u003c/em\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"product-level\"\u003eMBO\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,6 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eDutchTrain heeft een gemiddelde beoordeling van \u003cstrong\u003e7,6\u003c/strong\u003e (uit \u003cstrong\u003e59\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van DutchTrain\" title=\"Logo van DutchTrain\" src=\"https://static-1.springest.com/uploads/institute/logo/13223/thumb_dutchtrain-c9e11845eb15cc58052d8474cde2a999.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/certified-threat-intelligence-analyst-ctia-incl-examen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/dutchtrain/certified-threat-intelligence-analyst-ctia-incl-examen/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1139612\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1139612\" id=\"training-1139612\" value=\"1139612\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPA]\" href=\"/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa\"\u003eAdvanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPA]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 8 juni 2026 en 4 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 21 september 2026 in Nieuwegein (Iepenhoeve 5)\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention course shows you how to deploy and configure a …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.295\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1160645\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1160645\" id=\"training-1160645\" value=\"1160645\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD-CPLL]\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd-cpll\"\u003eConducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD-CPLL]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat huntin…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 825\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd-cpll/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd-cpll/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-943375\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-943375\" id=\"training-943375\" value=\"943375\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2265278/thumbnail-Mile2.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Certified Threat Intelligence Analyst (CTIA)\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security\"\u003eCertified Threat Intelligence Analyst (CTIA)\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eMaandag 18 mei 2026 in Virtual en 5 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2265278/thumbnail-Mile2.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eOver de Threat Intelligence Analyst (CTIA) Threat intelligence verwijst naar het proces van het verzamelen, analyseren en interpreteren van…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.150\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 20 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 20\u003c/span\u003e\u003cspan class=\"duration\"\u003e4 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eStartel bv heeft een gemiddelde beoordeling van \u003cstrong\u003e9,2\u003c/strong\u003e (uit \u003cstrong\u003e193\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-943378\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-943378\" id=\"training-943378\" value=\"943378\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security-self-study#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2265211/thumbnail-Mile2.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: Certified Threat Intelligence Analyst (CTIA) E-Learning and Exam\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security-self-study\"\u003eCertified Threat Intelligence Analyst (CTIA) E-Learning and Exam\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security-self-study#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-3.springest.com/uploads/product_image/image/2265211/thumbnail-Mile2.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eAlgemene omschrijving This CTIA self-study package from Mile2 contains: Course video, e-book, e-prep Guide, E-lab Guide, Exam Simulator, 1 …\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.249\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eStartel bv heeft een gemiddelde beoordeling van \u003cstrong\u003e9,2\u003c/strong\u003e (uit \u003cstrong\u003e193\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security-self-study/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/certified-threat-intelligence-analyst-ctia-mile2-security-self-study/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1190554\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1190554\" id=\"training-1190554\" value=\"1190554\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__thumb\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/ec-council-certified-threat-intelligence-analyst-ctia-self-study-package-and-exam#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2469357/thumbnail-EC-Council.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"E-learning: EC-Council Certified Threat Intelligence Analyst (CTIA) Self-Study Package and Exam\" href=\"/startel/ec-council-certified-threat-intelligence-analyst-ctia-self-study-package-and-exam\"\u003eEC-Council Certified Threat Intelligence Analyst (CTIA) Self-Study Package and Exam\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003cspan\u003e\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cdiv class=\"product-item__thumb--mobile\"\u003e\u003ca class=\" track\" data-tracking-events=\"[]\" href=\"/startel/ec-council-certified-threat-intelligence-analyst-ctia-self-study-package-and-exam#fotos\"\u003e\u003cimg class=\"product-image__item\" src=\"https://static-1.springest.com/uploads/product_image/image/2469357/thumbnail-EC-Council.png\" /\u003e\u003c/a\u003e\u003c/div\u003e\u003cp\u003eAlgemene omschrijving The EC-Council Certified Threat Intelligence Analyst (CTIA) Self-Study Package contains the official course materials…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"method\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"price\"\u003e€ 1.150\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e9,2 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eStartel bv heeft een gemiddelde beoordeling van \u003cstrong\u003e9,2\u003c/strong\u003e (uit \u003cstrong\u003e193\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Startel bv\" title=\"Logo van Startel bv\" src=\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/ec-council-certified-threat-intelligence-analyst-ctia-self-study-package-and-exam/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/startel/ec-council-certified-threat-intelligence-analyst-ctia-self-study-package-and-exam/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1183669\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1183669\" id=\"training-1183669\" value=\"1183669\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Cybersecurity Specialization: Threat Modeling [GK840103]\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-specialization-threat-modeling-gk840103\"\u003eCybersecurity Specialization: Threat Modeling [GK840103]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: donderdag 23 juli 2026 en 2 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 19 oktober 2026 in Nieuwegein (Iepenhoeve 5)\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Understand and apply threat modeling techniques to enhance cybersecurity. Cybersecurity Specialization: Threat Modeling dives into…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 1.595\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e2 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-specialization-threat-modeling-gk840103/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/cybersecurity-specialization-threat-modeling-gk840103/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-1143000\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-1143000\" id=\"training-1143000\" value=\"1143000\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd\"\u003eConducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 22 juni 2026 in Nieuwegein (Iepenhoeve 5) en 1 andere datum\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: maandag 22 juni 2026 en 5 andere datums\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat huntin…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 3.295\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e5 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-item product-item\" id=\"training-702491\"\u003e\u003cdiv class=\"checkbox-wrapper\"\u003e\u003cinput type=\"checkbox\" name=\"training-702491\" id=\"training-702491\" value=\"702491\" class=\"is-hidden compare-list__checkbox compare-checkbox\" /\u003e\u003ci class=\"ma-check_box_outline_blank material-icons checkbox-icon\" data-checked=\"check_box\" data-unchecked=\"check_box_outline_blank\"\u003echeck_box_outline_blank\u003c/i\u003e\u003c/div\u003e\u003cdiv class=\"product-item__content\"\u003e\u003ch2 class=\"as-h3 product-item__title\"\u003e\u003ca title=\"Klassikaal: EC-Council Certified Threat Intelligence Analyst (CTIA) + Exam voucher [CTIA]\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-exam-ctia\"\u003eEC-Council Certified Threat Intelligence Analyst (CTIA) + Exam voucher [CTIA]\u003c/a\u003e\u003c/h2\u003e\u003cdiv class=\"product-item__details\"\u003e\u003cdiv class=\"product-item__provider\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003cdiv class=\"product-item__meta-info starting-dateplaces-container\"\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--positive icon--align-top'\u003ecomputer\u003c/i\u003e\u003cspan\u003eOnline: woensdag 20 mei 2026 en 4 andere datums\u003c/span\u003e\u003c/div\u003e\u003cdiv class=\"meta-info--starting-dateplaces\"\u003e\u003ci class='material-icons icon--small icon--region icon--align-top'\u003eplace\u003c/i\u003e\u003cspan\u003eOp locatie: maandag 22 juni 2026 in Nieuwegein (Iepenhoeve 5) en 1 andere datum\u003c/span\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__description\"\u003e\u003cp\u003eOVERVIEW Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with…\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"product-item__footer\"\u003e\u003cdiv class=\"product-item__usp-data\"\u003e\u003cspan class=\"price\"\u003e€ 2.595\u003cspan class=\"tooltip-parent tooltip-icon  align-left\"\u003e\u003ci class=\"ma-check material-icons \"\u003echeck\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003e\u003cul class=\"price-tooltip\"\u003e\u003cli\u003e\u003cstrong\u003eBTW:\u003c/strong\u003e Excl. BTW\u003c/li\u003e\u003cli\u003e\u003cstrong\u003eVolledigheid prijs:\u003c/strong\u003e Prijs is exclusief btw, verder geen extra kosten. \u003c/li\u003e\u003c/ul\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cspan class=\"max-participants\"\u003e\u003cspan class=\"tooltip-parent tooltip-icon max_participants align-left\"\u003e\u003ci class=\"ma-group material-icons \"\u003egroup\u003c/i\u003e\u003cspan class=\"tooltip align-left\"\u003e\u003cspan class=\"tooltip__content\"\u003eMaximaal 16 personen kunnen deelnemen aan deze cursus.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e Max: 16\u003c/span\u003e\u003cspan class=\"duration\"\u003e3 dagen\u003c/span\u003e\u003c/div\u003e\u003cspan class=\"institute-rating rating-score\"\u003e\u003cspan class=\"tooltip-parent  provider-rating align-right\"\u003eOpleiderscore: \u003ci class=\"ma-star material-icons \"\u003estar\u003c/i\u003e \u003cstrong\u003e7,5 \u003c/strong\u003e\u003cspan class=\"tooltip align-right\"\u003e\u003cspan class=\"tooltip__content\"\u003eGlobal Knowledge Network Netherlands B.V. heeft een gemiddelde beoordeling van \u003cstrong\u003e7,5\u003c/strong\u003e (uit \u003cstrong\u003e189\u003c/strong\u003e ervaringen)\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cdiv class=\"product-item__provider--mobile\"\u003e\u003cimg class=\"thumb\" width=\"100\" height=\"50\" alt=\"Logo van Global Knowledge Network Netherlands B.V.\" title=\"Logo van Global Knowledge Network Netherlands B.V.\" src=\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\" /\u003e\u003c/div\u003e\u003c/span\u003e\u003cdiv class=\"product-item__brochure-button\"\u003e\u003cdiv class=\"ab_050--variation_a\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-exam-ctia/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"ab_050--variation_b\"\u003e\u003ca class=\"button-link button--cta button--fluid button--normal button--centered\" href=\"/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-exam-ctia/informatie-aanvragen/informatie-aanvragen\"\u003e\u003ci class=\"ma-mail_outline material-icons \"\u003email_outline\u003c/i\u003e Info aanvragen\u003c/a\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv class=\"result-options\"\u003e\u003cdiv class=\"compare-buttons--bottom\"\u003e\u003cinput class=\"button--compare\" type=\"button\" value=\"Vergelijken\" /\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003cdiv class=\"pagination\"\u003e\u003cul class=\"pagination__list\"\u003e\u003c/ul\u003e\u003c/div\u003e\u003cscript type=\"application/ld+json\"\u003e{\"@context\":\"https://schema.org\",\"@graph\": [{\"@type\":\"EducationEvent\",\"name\":\"Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPF]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW This Fundamentals of Cisco Firewall Threat Defense and Intrusion Prevention (SFWIPF) course shows you how to implement and configure Cisco Secure Firewall Threat Defense for\\u0026amp;hellip;\",\"startDate\":\"2026-05-18\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/fundamentals-of-cisco-firewall-threat-defense-and-intrusion-prevention-sfwipf\",\"price\":\"3295.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-09-04\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention [SFWIPA]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW The Advanced Techniques for Cisco Firewall Threat Defense and Intrusion Prevention course shows you how to deploy and configure a Cisco Secure Firewall Threat Defense system\\u0026amp;hellip;\",\"startDate\":\"2026-06-08\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/securing-data-center-networks-and-vpns-with-cisco-firewall-threat-defence-sfwipa\",\"price\":\"3295.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-09-04\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Certified Threat Intelligence Analyst (CTIA)\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\",\"description\":\"Over de Threat Intelligence Analyst (CTIA) Threat intelligence verwijst naar het proces van het verzamelen, analyseren en interpreteren van informatie over mogelijke cyberbedreiginge\\u0026amp;hellip;\",\"startDate\":\"2026-05-18\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Virtual\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"38.899623\",\"longitude\":\"-95.315411\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/startel/certified-threat-intelligence-analyst-ctia-mile2-security\",\"price\":\"3150.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2026-02-06\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://unie.go.springest.nl/startel#EducationalOrganization\",\"url\":\"https://unie.go.springest.nl/startel\",\"name\":\"Startel bv\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/16638/thumb_startel-96e28bb741042b581984640830510083.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Cybersecurity Specialization: Threat Modeling [GK840103]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW Understand and apply threat modeling techniques to enhance cybersecurity. Cybersecurity Specialization: Threat Modeling dives into the critical practice of threat modeling, \\u0026amp;hellip;\",\"startDate\":\"2026-07-23\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/cybersecurity-specialization-threat-modeling-gk840103\",\"price\":\"1595.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-10-03\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps [CBRTHD]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW The Conducting Threat Hunting and Defending using Cisco Technologies for CyberOps (CBRTHD) training is a 5-day Cisco threat hunting course that introduces and guides you to \\u0026amp;hellip;\",\"startDate\":\"2026-06-22\",\"eventAttendanceMode\":\"OfflineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"Nieuwegein (Iepenhoeve 5)\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"52.048527\",\"longitude\":\"5.091026\"}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/conducting-threat-hunting-and-defending-using-cisco-technologies-for-cyberops-cbrthd\",\"price\":\"3295.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-06-25\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}},{\"@type\":\"EducationEvent\",\"name\":\"EC-Council Certified Threat Intelligence Analyst (CTIA) + Exam voucher [CTIA]\",\"image\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\",\"description\":\"OVERVIEW Certified Threat Intelligence Analyst (C|TIA) is a training and credentialing program designed and developed in collaboration with cybersecurity and threat intelligence expe\\u0026amp;hellip;\",\"startDate\":\"2026-05-20\",\"eventAttendanceMode\":\"OnlineEventAttendanceMode\",\"eventStatus\":\"https://schema.org/EventScheduled\",\"location\":{\"@type\":\"Place\",\"address\":{\"@type\":\"PostalAddress\",\"addressLocality\":\"VIRTUAL TRAINING CENTER\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":null,\"longitude\":null}},\"offers\":{\"@type\":\"Offer\",\"availability\":\"https://schema.org/InStock\",\"url\":\"https://www.springest.nl/global-knowledge-network-netherlands-b-v/certified-threat-intelligence-analyst-exam-ctia\",\"price\":\"2595.0\",\"priceCurrency\":\"EUR\",\"validFrom\":\"2025-08-03\"},\"performer\":{\"@type\":\"EducationalOrganization\",\"@id\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v#EducationalOrganization\",\"url\":\"https://unie.go.springest.nl/global-knowledge-network-netherlands-b-v\",\"name\":\"Global Knowledge Network Netherlands B.V.\",\"logo\":\"https://static-3.springest.com/uploads/institute/logo/414/thumb_global-knowledge-network-netherlands-b-v-78ad2eca2dbb257080ce74984bb46448.png\"}}]}\u003c/script\u003e\u003csection class=\"panel\"\u003e\u003c/section\u003e\u003c/div\u003e\u003c/section\u003e\u003caside class=\"aside--medium aside--subject\"\u003e\u003cdiv class=\"message--session-filters\"\u003eDe zoekresultaten zijn momenteel gefilterd met jouw voorkeuren.\u003c/div\u003e\u003csection class=\"aside__section aside__filters filters\"\u003e\u003cdiv class=\"filters__header\"\u003eFilters toevoegen\u003ca class=\"filters__close\" href=\"#\"\u003e\u003ci class=\"ma-clear material-icons icon--small\"\u003eclear\u003c/i\u003e\u003c/a\u003e\u003c/div\u003e\u003ca class=\"filter__remove\" data-link-type=\"filter-clear\" href=\"/automatisering-ict/threat-intelligence\"\u003eAlle filters verwijderen\u003c/a\u003e\u003cdiv class=\"filter filter--price is-first\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003ePrijs\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 500 t/m € 1.000 - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/500-1000/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 500 t/m € 1.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 1.000 t/m € 2.000 - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/1000-2000/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 1.000 t/m € 2.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"€ 2.000 t/m € 4.000 - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/2000-4000/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e€ 2.000 t/m € 4.000\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--regions\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eRegio\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Brugge - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/brugge/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBrugge\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Drachten - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/drachten/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDrachten\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Eindhoven - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/eindhoven/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEindhoven\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Gent - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/gent/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGent\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Groningen - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/groningen/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGroningen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Utrecht - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/utrecht/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUtrecht\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"Zoetermeer - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/zoetermeer/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZoetermeer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--regions\" data-expand-title=\"Meer\" data-collapse-title=\"Minder regio\u0026#39;s\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--meta_levels\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eNiveau\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"MBO - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/mbo/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMBO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--location\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eType product\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"E-Learning - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/e-learning/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eE-Learning\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal op locatie - 7\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/klassikaal-op-locatie/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal op locatie\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e7\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Klassikaal online - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/klassikaal-online/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eKlassikaal online\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--starting_dates\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eStartdatum\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"heeft een startdatum - 6\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/startdatum-bekend/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eheeft een startdatum\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e6\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"mei 2026 - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/mei-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emei 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"juni 2026 - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/juni-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuni 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"juli 2026 - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/juli-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ejuli 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"augustus 2026 - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/augustus-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eaugustus 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"september 2026 - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/september-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eseptember 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"oktober 2026 - 5\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/oktober-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eoktober 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e5\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"november 2026 - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/november-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enovember 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-hidden\"\u003e\u003ca title=\"december 2026 - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/december-2026/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003edecember 2026\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link\" data-target=\"filter--starting_dates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMeer\u003c/a\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--duration_days\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eTijdsduur\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Max. 1 dag - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/1-dag/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMax. 1 dag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"2 tot 3 dagen - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/2-3-dagen/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e2 tot 3 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"4 tot 10 dagen - 4\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/4-10-dagen/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e4 tot 10 dagen\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e4\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"1 jaar en langer - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/365-dagen-en-langer/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003e1 jaar en langer\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--moments\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eTijdstip\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Avond - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/avond/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAvond\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Overdag - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/overdag/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOverdag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Zaterdag - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/zaterdag/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZaterdag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Zondag - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/zondag/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eZondag\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--max_participants\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eMaximaal aantal deelnemers\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"meer dan 10 deelnemers - 9\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/meer-dan-10-deelnemers/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003emeer dan 10 deelnemers\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e9\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--language\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eTaal\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Nederlands - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/nl/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNederlands\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Engels - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/en/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEngels\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--institutes\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eAanbieder\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Global Knowledge Network Netherlands B.V. - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/global-knowledge-network-netherlands-b-v/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGlobal Knowledge Network Netherlands B.V.\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Startel bv - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/startel/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStartel bv\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"DutchTrain - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/dutchtrain/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDutchTrain\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003cdiv class=\"filter filter--syndicates\"\u003e\u003cdiv class=\"as-h3 filter__title\"\u003eExtra kenmerken\u003c/div\u003e\u003cul class=\"filter__list\"\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Direct inschrijven - 23\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/bookable/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eDirect inschrijven\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e23\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EC-Council - 18\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ec-council/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e18\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Microsoft Learning Partner - 18\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/microsoft-learning-partner/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eMicrosoft Learning Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e18\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EC-Council Certified - 17\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ec-council-certified/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEC-Council Certified\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e17\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"AgilePM - Agile Project Management (APMG) - 16\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/agilepm-agile-project-management-apmg/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAgilePM - Agile Project Management (APMG)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e16\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ITIL - 15\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/itil/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eITIL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"NRTO - 15\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/nrto/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eNRTO\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Oracle Education Partner - 15\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/oracle-education-partner/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOracle Education Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e15\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ASL - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/asl/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eASL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item is-active\"\u003e\u003ca title=\"BISL - 14\" data-link-type=\"filter-remove\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon is-checked\"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBISL\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cisco Authorized Learning Partners - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cisco-authorized-learning-partners/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCisco Authorized Learning Partners\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"EXIN - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/exin/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eEXIN\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"PRINCE2 - 14\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/prince2/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePRINCE2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e14\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Axelos - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/axelos/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAxelos\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Lean IT - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/lean-it/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean IT\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"PeopleCert - 13\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/peoplecert/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003ePeopleCert\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e13\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"CRKBO en BTW-vrijstelling - 12\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/crkbo-en-btw-vrijstelling/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO en BTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e12\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"APMG-International - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/apmg-international/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG-International\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"AWS Partner Network (APN) - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/aws-partner-network-apn/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAWS Partner Network (APN)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cedeo - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cedeo/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Google Partner - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/google-partner/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IAPP certificering - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iapp-certificering/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIAPP certificering\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ISC2 - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/isc2/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISC2\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Managing Successful Programmes (MSP) - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/managing-successful-programmes-msp/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eManaging Successful Programmes (MSP)\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"VMWare Partner - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/vmware-partner/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVMWare Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"VOI - 11\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/voi/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eVOI\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e11\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Accredited Learning Provider - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/accredited-learning-provider/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAccredited Learning Provider\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"APMG Change Management - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/apmg-change-management/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eAPMG Change Management\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"BTW-vrijstelling - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/btw-vrijstelling/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eBTW-vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cedeo Maatwerk - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cedeo-maatwerk/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Maatwerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Cedeo Open - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cedeo-open/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCedeo Open\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"COBIT 5 - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/cobit-5/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCOBIT 5\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"CRKBO zonder BTW vrijstelling - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/crkbo-zonder-btw-vrijstelling/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eCRKBO zonder BTW vrijstelling\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Google Cloud Authorized Training Partner - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/google-cloud-authorized-training-partner/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eGoogle Cloud Authorized Training Partner\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IASSC - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iassc/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIASSC\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IBM Professional Certification Program  - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ibm-professional-certification-program/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIBM Professional Certification Program \u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"IPMA - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/ipma/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eIPMA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ISO 9001:2015 - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iso-9001-2015/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO 9001:2015\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"ISO register - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/iso-register/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eISO register\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Lean Competency System - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/lean-competency-system/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLean Competency System\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Learning Performance Institute - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/learning-performance-institute/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLearning Performance Institute\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"LSSA - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/lssa/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eLSSA\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Qfor - 10\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/qfor/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eQfor\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e10\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Erkend keurmerk - 3\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/erkend-keurmerk/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eErkend keurmerk\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e3\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Onbeperkt leren - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/onbeperkt-leren/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eOnbeperkt leren\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Test - 2\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/test/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eTest\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e2\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"new - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/new/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003enew\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"Stichting OOM - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/stichting-oom/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eStichting OOM\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003cli class=\"filter__item\"\u003e\u003ca title=\"UWV scholingsvoucher - 1\" data-link-type=\"filter-add\" class=\"filter__link\" href=\"/automatisering-ict/threat-intelligence/uwv-scholingsvoucher/bisl\"\u003e\u003ci class=\"ma-check_box material-icons checkbox-icon \"\u003echeck_box\u003c/i\u003e\u003cspan class=\"filter__name\"\u003eUWV scholingsvoucher\u003c/span\u003e\u003cspan class=\"filter__count\"\u003e1\u003c/span\u003e\u003c/a\u003e\u003c/li\u003e\u003c/ul\u003e\u003ca class=\"filter__toggle expander-link is-expanded\" data-target=\"filter--syndicates\" data-expand-title=\"Meer\" data-collapse-title=\"Minder\" href=\"#\"\u003eMinder\u003c/a\u003e\u003c/div\u003e\u003c/section\u003e\u003csection class=\"aside__section learning-trends\"\u003e\u003cdiv class=\"panel with-border learning-trends\"\u003e\u003cdiv class=\"panel__heading\"\u003e\u003cdiv class=\"as-h3 panel__heading-title--aside\"\u003eLearning Trends\u003c/div\u003e\u003cabbr class=\"item fn\" title=\"Threat intelligence\"\u003e\u003c/abbr\u003e\u003c/div\u003e\u003cdiv class=\"panel__content\"\u003e\u003cul class=\"trends-list\"\u003e\u003cli class=\"trends-list__item with-products\"\u003e\u003cstrong\u003e23\u003c/strong\u003e Cursussen\u003c/li\u003e\u003cli class=\"trends-list__item with-providers\"\u003e\u003cstrong\u003e10\u003c/strong\u003e Aanbieders\u003c/li\u003e\u003cli class=\"trends-list__item with-price\"\u003e\u003cstrong class=\"pricerange\"\u003e€ 389 - € 3.950\u003c/strong\u003e Prijsklasse\u003c/li\u003e\u003c/ul\u003e\u003c/div\u003e\u003c/div\u003e\u003c/section\u003e\u003c/aside\u003e\u003c/div\u003e"},"tracking":[{"event":"[viewed] Subject page","data":{"distinct_id":null,"time":"2026-05-05T17:22:38.445Z","subject_id":9852,"subject_name":"Threat intelligence","category_name":"Automatisering \u0026 ICT/IT","filter_size":1,"filter_types":["syndicates"],"filters":["bisl"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original"}},{"event":"[filtered] Subject page","data":{"distinct_id":null,"time":"2026-05-05T17:22:38.445Z","subject_id":9852,"subject_name":"Threat intelligence","category_name":"Automatisering \u0026 ICT/IT","filter_size":1,"filter_types":["syndicates"],"filters":["bisl"],"page":1,"manually_filtered":false,"money_back_guarantee_count":0,"autosuggest":null,"funnel_search_subject_box":true,"ab_050_mobile_subject_cta":"original"}}],"filters":"/bisl"}