{"id":5385,"date":"2024-01-30T14:20:43","date_gmt":"2024-01-30T12:20:43","guid":{"rendered":"https:\/\/wawiwa-tech.com\/?page_id=5385"},"modified":"2026-03-11T15:40:04","modified_gmt":"2026-03-11T13:40:04","slug":"cyber-threat-intelligence","status":"publish","type":"page","link":"https:\/\/wawiwa-tech.com\/de\/upskilling\/cybersecurity\/cyber-threat-intelligence\/","title":{"rendered":"Cyber-Bedrohungsdaten"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5385\" class=\"elementor elementor-5385\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f4a0206 elementor-section-height-min-height elementor-section-content-middle custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3f4a0206\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-412f2665\" data-id=\"412f2665\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee71bcf elementor-widget elementor-widget-heading\" data-id=\"ee71bcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cyber-Bedrohungsdaten<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25af809d elementor-widget elementor-widget-heading\" data-id=\"25af809d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Weiterbildungskurs, 40 akademische Stunden<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2115c2 elementor-widget elementor-widget-heading\" data-id=\"5c2115c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Vertiefung: Cyber-Bedrohungsdaten und Techniken zur Bedrohungsjagd\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8f6122 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c8f6122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Niveau: Fortgeschrittene<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4265929f custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4265929f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fd066a7\" data-id=\"3fd066a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2db18b9b elementor-widget elementor-widget-text-editor\" data-id=\"2db18b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Dieser einzigartige und faszinierende Kurs wurde speziell f\u00fcr Technologie- und Cybersicherheitsexperten entwickelt, die ihr Wissen \u00fcber Cyber Threat Intelligence und Techniken zur Bedrohungsjagd erweitern m\u00f6chten.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-53fec5fa\" data-id=\"53fec5fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50cac22b elementor-widget elementor-widget-text-editor\" data-id=\"50cac22b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Ziel dieses Kurses ist es, die Teilnehmer mit der Welt der Cyber Threat Intelligence und der Threat Hunting-Ermittlungen vertraut zu machen, wobei der Schwerpunkt auf folgenden Punkten liegt <\/span><strong>OSINT-Werkzeuge, Verfahren zur Bedrohungsjagd, Planung und Werkzeuge.<\/strong><\/p><p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6167863 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6167863\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f66c6ff\" data-id=\"f66c6ff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3348bf6 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"3348bf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_scale_effect&quot;:&quot;yes&quot;,&quot;motion_fx_scale_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;motion_fx_scale_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_scale_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:20,&quot;end&quot;:80}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tMit der Teilnahme an diesem Kurs tauchen Sie in den dynamischen Bereich der Cyber Threat Intelligence ein und erwerben wichtige F\u00e4higkeiten zur Identifizierung, Analyse und Entsch\u00e4rfung digitaler Bedrohungen.\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-11dd455 e-flex e-con-boxed e-con e-parent\" data-id=\"11dd455\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b381644 e-con-full e-flex e-con e-child\" data-id=\"b381644\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-409ef1c e-flex e-con-boxed e-con e-child\" data-id=\"409ef1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbfa227 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cbfa227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/de\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ich m\u00f6chte diesen Kurs anbieten<br>an meiner Einrichtung<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0fb50f e-con-full e-flex e-con e-child\" data-id=\"f0fb50f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-b76dc31 e-flex e-con-boxed e-con e-child\" data-id=\"b76dc31\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2eada0d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2eada0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/de\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ich m\u00f6chte diesen Kurs besuchen<br>oder melden Sie mein Team an<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78cdcfbe custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78cdcfbe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3e7f7d99\" data-id=\"3e7f7d99\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96d1ca3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"96d1ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-user-check\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-463414b0 elementor-widget elementor-widget-heading\" data-id=\"463414b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">F\u00fcr wen ist dieser Kurs gedacht?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97deeda elementor-widget elementor-widget-text-editor\" data-id=\"97deeda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Einsatzkr\u00e4fte, Analysten und Teamleiter\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Systemadministratoren\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fachleute f\u00fcr Cybersicherheit und Sicherheitsarchitekten (TIER 1- und TIER 2-Analysten)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">SOC-Manager<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">STEM-Master-Studenten <\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b529e elementor-widget elementor-widget-heading\" data-id=\"82b529e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Voraussetzungen<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32e3c9b2 elementor-widget elementor-widget-text-editor\" data-id=\"32e3c9b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Grundlegende Erfahrung im Bereich Cybersicherheit\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Verst\u00e4ndnis von Netzen und Protokollen\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Grundkenntnisse \u00fcber \u00dcberwachungs- und Sicherheitseinrichtungen\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IT-Hintergrund<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58d8fb79 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"58d8fb79\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5e02c07\" data-id=\"5e02c07\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a0dc02b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2a0dc02b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-target-arrow\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77be9cb4 elementor-widget elementor-widget-heading\" data-id=\"77be9cb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lernziele<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d9f828f elementor-widget elementor-widget-text-editor\" data-id=\"1d9f828f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Erkennen, Identifizieren und Eind\u00e4mmen g\u00e4ngiger Cybersicherheitsvorf\u00e4lle<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifizieren Sie verd\u00e4chtige Malware-Aktivit\u00e4ten und b\u00f6sartigen Code auf Ihren Endger\u00e4ten\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Analyse von Malware mit verschiedenen Techniken (statisch und dynamisch)\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Sammeln von Informationen aus verschiedenen Quellen und Tools\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Suche nach Bedrohungen und Auffinden abnormalen Verhaltens<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c9e0117 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c9e0117\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4168f5c8\" data-id=\"4168f5c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58fa2b16 elementor-widget elementor-widget-heading\" data-id=\"58fa2b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Was Sie bekommen...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-722dba0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"722dba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Kurspr\u00e4sentation als PDF-Datei<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Spickzettel und n\u00fctzliche Dokumentation<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">28 Stunden praktische Lernerfahrung durch praktische Aktivit\u00e4ten im lokalen Umfeld <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Ein Wawiwa-Zertifikat nach erfolgreichem Abschluss des Kurses. <\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3257990 elementor-widget elementor-widget-text-editor\" data-id=\"3257990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Dar\u00fcber hinaus k\u00f6nnen Sie den Kurs f\u00fcr Ihr Team gegen einen Aufpreis um die Vorbereitung auf relevante Zertifizierungspr\u00fcfungen der Cybersicherheitsbranche erweitern. Zu den Cybersecurity-Zertifizierungen, auf die Sie sich mit diesem Kurs vorbereiten k\u00f6nnen, geh\u00f6ren: GIAC Open Source Intelligence (GOSI), GIAC Certified Enterprise Defender (GCED), und GIAC Cyber Threat Intelligence (GCTI).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f29cbdd elementor-widget elementor-widget-image\" data-id=\"f29cbdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"178\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/certifications-in-cyber.png\" class=\"attachment-medium_large size-medium_large wp-image-5387\" alt=\"Zertifizierungen im Cyberspace\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/certifications-in-cyber.png 512w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/certifications-in-cyber-300x104.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1cd2a6f elementor-widget elementor-widget-text-editor\" data-id=\"1cd2a6f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Einschl\u00e4gige Cybersecurity-Zertifizierungen<\/span><\/i><\/p><p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Hinweis: Eine Branchenzertifizierung wird im Rahmen des Kurses weder angeboten noch garantiert.<\/span><\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-131f25b9 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"131f25b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3321e838\" data-id=\"3321e838\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66f56654 elementor-widget elementor-widget-heading\" data-id=\"66f56654\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Professioneller Betreuer und Ausbilder<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dedad4a elementor-widget elementor-widget-heading\" data-id=\"dedad4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Die Aufsicht \u00fcber alle Wawiwa-Cyberkurse hat Nadav Nachmias, Leiter der Cybersecurity-Programme bei Wawiwa.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77938287 elementor-widget elementor-widget-heading\" data-id=\"77938287\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Die Kursleiter sind Fachleute f\u00fcr Cybersicherheit, die sowohl \u00fcber praktische Erfahrung als auch \u00fcber Schulungsf\u00e4higkeiten verf\u00fcgen. Das technische Niveau des Kurses kann je nach Zielgruppe angepasst werden.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a817760 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a817760\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-461ea04d\" data-id=\"461ea04d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e1bd641 elementor-widget elementor-widget-image\" data-id=\"3e1bd641\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/de\/wawiwa-team\/nadav-nachmias\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"982\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg\" class=\"attachment-large size-large wp-image-5376\" alt=\"Nadav Nachmias Leiter der Cybersecurity-Programme\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg 834w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-244x300.jpeg 244w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-768x943.jpeg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias.jpeg 1043w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2158571a elementor-widget elementor-widget-heading\" data-id=\"2158571a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Nadav Nachmias<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720fc5c1 elementor-widget elementor-widget-text-editor\" data-id=\"720fc5c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Leiter der Cybersecurity-Programme<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-104e10f9 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"104e10f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9a810aa\" data-id=\"9a810aa\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12d75dc elementor-widget elementor-widget-text-editor\" data-id=\"12d75dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nadav ist ein Cybersecurity-Spezialist mit \u00fcber 15 Jahren Erfahrung, der sich auf Cybersecurity-Strategien, -Architekturen und die Bef\u00e4higung von Mitarbeitern konzentriert. Aufgrund seiner praktischen Erfahrung konnte er intuitiv verschiedene Schulungsprogramme und -materialien in verschiedenen Bereichen der Cybersicherheit entwickeln (einschlie\u00dflich Cybersicherheitsmanagement, Umgang mit und Reaktion auf Vorf\u00e4lle und Cyberforensik).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-335d926 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"335d926\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08c1ebb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08c1ebb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fb4226\" data-id=\"0fb4226\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54123b9 elementor-widget elementor-widget-heading\" data-id=\"54123b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Was haben die Absolventen zu sagen?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e78f81c elementor-testimonial--skin-default elementor-testimonial--layout-image_inline elementor-testimonial--align-center elementor-arrows-yes elementor-pagination-type-bullets elementor-widget elementor-widget-testimonial-carousel\" data-id=\"e78f81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;autoplay_speed&quot;:10000,&quot;show_arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;autoplay&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"testimonial-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Folien\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Ich hatte schon immer Interesse an der Cybersicherheit. Ich hatte eine Leidenschaft f\u00fcr dieses riesige Gebiet, das sich st\u00e4ndig weiterentwickelt. Ich suchte nach Online-Kursen und stellte fest, dass die meisten von ihnen sehr praxisfern sind, ein Video l\u00e4uft auf einer Website. Dann fand ich das Cybersecurity-Programm von Wawiwa. Ich meldete mich an und stellte fest, dass ich mich w\u00e4hrend des gesamten Programms auf den Unterricht freute. Es handelt sich um eine Live-Sitzung mit viel praktischer Arbeit, bei der ich mit realen Cyber-Tools arbeite und erlebe, was sie leisten k\u00f6nnen. Die Dozenten erz\u00e4hlen Geschichten aus dem wirklichen Leben und geben Beispiele aus der Praxis, um die Inhalte zu vermitteln. Das macht das Programm wirklich spannend!\"\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-testimonial__footer\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/John-Hamilton-Cyber-CTIA2.jpeg\" alt=\"John Hamilton\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">John Hamilton<\/span><span class=\"elementor-testimonial__title\">Cybersecurity-Analyst<\/span><\/cite>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f7ee1d2 e-flex e-con-boxed e-con e-parent\" data-id=\"f7ee1d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47686b9 elementor-widget elementor-widget-heading\" data-id=\"47686b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Kurs-Lehrplan<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-959e363 elementor-widget elementor-widget-heading\" data-id=\"959e363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Einf\u00fchrung in die KTI (3 Theoriestunden, 2 Praxisstunden)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95186a7 elementor-widget elementor-widget-text-editor\" data-id=\"95186a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lebenszyklus von Bedrohungsdaten<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Standards, Taktiken, Feeds und Tools<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39a8903 elementor-widget elementor-widget-heading\" data-id=\"39a8903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Einf\u00fchrung in OSINT (3 Theoriestunden, 2 Praxisstunden)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00fa54a elementor-widget elementor-widget-text-editor\" data-id=\"00fa54a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">OSINT-Einf\u00fchrung und -Quellen<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Worauf ist zu achten - Arten von Informationen und Bedrohungen<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Prozesse und Verfahren<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Werkzeuge<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-340757f elementor-widget elementor-widget-heading\" data-id=\"340757f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">KTI\/OSINT-Praxis (10 Praxisstunden)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8525407 elementor-widget elementor-widget-text-editor\" data-id=\"8525407\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li><span style=\"font-weight: 400;\">Shodan-, Maltego-, MISP- und YARA-Regeln<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5331238 elementor-widget elementor-widget-heading\" data-id=\"5331238\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Einf\u00fchrung in die Bedrohungsjagd (4 Theoriestunden, 8 Praxisstunden)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9c3b0 elementor-widget elementor-widget-text-editor\" data-id=\"5e9c3b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Definitionen der Bedrohungsjagd<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Festlegung von Zielen und Auftr\u00e4gen<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Verstehen des Prozessablaufs<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Etablierung eines Prozesses zur Bedrohungsjagd<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8054e elementor-widget elementor-widget-heading\" data-id=\"4a8054e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Endpunkt-orientierte Bedrohungsjagd (2 Theoriestunden, 6 Praxisstunden)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-843a1c2 elementor-widget elementor-widget-text-editor\" data-id=\"843a1c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00dcberblick \u00fcber die Bedrohungsjagd in Betriebssystemen<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tiefes Eintauchen in Malware-Verhaltensweisen<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8dc2662 e-flex e-con-boxed e-con e-parent\" data-id=\"8dc2662\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de9a086 elementor-widget elementor-widget-heading\" data-id=\"de9a086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Geben Sie Ihrem Team den n\u00f6tigen Vorsprung, um erfolgreich zu sein - mit unseren umfassenden Kursen, die auf Ihre speziellen Bed\u00fcrfnisse zugeschnitten sind. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e334b elementor-widget elementor-widget-heading\" data-id=\"94e334b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Interessieren Sie sich f\u00fcr weitere Details?\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d9715 elementor-widget elementor-widget-text-editor\" data-id=\"c1d9715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Wir beantworten gerne alle Ihre Fragen!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c14e59 e-flex e-con-boxed e-con e-parent\" data-id=\"0c14e59\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3260b11 e-con-full e-flex e-con e-child\" data-id=\"3260b11\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfd0e5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3bfd0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/de\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ich m\u00f6chte diesen Kurs anbieten<br>an meiner Einrichtung<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-081d346 e-con-full e-flex e-con e-child\" data-id=\"081d346\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab29a81 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ab29a81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/de\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Ich m\u00f6chte diesen Kurs besuchen<br>oder melden Sie mein Team an<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53dc31e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53dc31e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0a84a8\" data-id=\"e0a84a8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b46e040 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b46e040\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-79e3365\" data-id=\"79e3365\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-422aa51 elementor-widget elementor-widget-heading\" data-id=\"422aa51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Bieten Sie gemeinsam mit Wawiwa in weniger als 6 Monaten technische Schulungen an!<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9970554 elementor-widget elementor-widget-text-editor\" data-id=\"9970554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWawiwa schlie\u00dft die L\u00fccke bei den technischen F\u00e4higkeiten, indem es Menschen f\u00fcr gefragte technische Berufe umschult. Es gibt Millionen offener Stellen im technischen Bereich und nicht gen\u00fcgend Fachleute mit den entsprechenden Kenntnissen und F\u00e4higkeiten, um sie zu besetzen. Was die Industrie von ihren Mitarbeitern verlangt, wird nicht in langen akademischen Abschl\u00fcssen gelehrt. Wawiwa hilft Partnern auf der ganzen Welt bei der Umschulung und H\u00f6herqualifizierung von Mitarbeitern f\u00fcr technische Berufe durch lokale Schulungszentren oder -programme. Das Unternehmen nutzt eine bew\u00e4hrte Schulungsmethodik, modernste Inhalte, digitale Lern- und Bewertungsplattformen und enge Beziehungen zur Industrie, um Schulungsprogramme anzubieten, die zu einer h\u00f6heren Besch\u00e4ftigungsf\u00e4higkeit und Zufriedenheit der Absolventen f\u00fchren. Dies wiederum schafft eine starke Ausbildungsmarke und ein nachhaltiges Gesch\u00e4ft f\u00fcr die Partner von Wawiwa.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71a3895 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"71a3895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/de\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Kontakt<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Dieser einzigartige und faszinierende Kurs wurde speziell f\u00fcr Technologie- und Cybersicherheitsexperten entwickelt, die ihre Kenntnisse \u00fcber Cyber Threat Intelligence und Threat Hunting-Techniken erweitern m\u00f6chten. Ziel dieses Kurses ist es, die Teilnehmer mit der Welt der Cyber Threat Intelligence und der Threat Hunting-Untersuchungen vertraut zu machen, wobei der Schwerpunkt auf OSINT-Tools in der Finanzbranche, Ethical Hacking, Malware-Analysen und digitalen forensischen Verfahren liegt.<\/p>","protected":false},"author":13,"featured_media":5386,"parent":5475,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5385","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Threat Intelligence<\/title>\n<meta name=\"description\" content=\"This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques. The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools in the finance industry, ethical hacking, malware analysis, and digital forensics processes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wawiwa-tech.com\/de\/upskilling\/cybersecurity\/cyber-threat-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Intelligence\" \/>\n<meta property=\"og:description\" content=\"This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques. The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools in the finance industry, ethical hacking, malware analysis, and digital forensics processes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wawiwa-tech.com\/de\/upskilling\/cybersecurity\/cyber-threat-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Wawiwa Tech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wawiwatech\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T13:40:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1456\" \/>\n\t<meta property=\"og:image:height\" content=\"816\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@WawiwaTech\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/\",\"name\":\"Cyber Threat Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cyber-threat-and-intelligence.png\",\"datePublished\":\"2024-01-30T12:20:43+00:00\",\"dateModified\":\"2026-03-11T13:40:04+00:00\",\"description\":\"This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques. The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools in the finance industry, ethical hacking, malware analysis, and digital forensics processes.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cyber-threat-and-intelligence.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/cyber-threat-and-intelligence.png\",\"width\":1456,\"height\":816,\"caption\":\"cyber threat intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cyber-threat-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wawiwa\u2019s Upskilling Courses\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Upskilling Courses\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"name\":\"Wawiwa Tech\",\"description\":\"Reskilling the World to Tech\",\"publisher\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wawiwa-tech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\",\"name\":\"Wawiwa Tech\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"width\":1000,\"height\":425,\"caption\":\"Wawiwa Tech\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/wawiwatech\\\/\",\"https:\\\/\\\/x.com\\\/WawiwaTech\",\"https:\\\/\\\/instagram.com\\\/wawiwatech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wawiwa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCN_ejCsLDqznGifvkX86gzA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Threat Intelligence","description":"This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques. The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools in the finance industry, ethical hacking, malware analysis, and digital forensics processes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wawiwa-tech.com\/de\/upskilling\/cybersecurity\/cyber-threat-intelligence\/","og_locale":"de_DE","og_type":"article","og_title":"Cyber Threat Intelligence","og_description":"This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques. The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools in the finance industry, ethical hacking, malware analysis, and digital forensics processes.","og_url":"https:\/\/wawiwa-tech.com\/de\/upskilling\/cybersecurity\/cyber-threat-intelligence\/","og_site_name":"Wawiwa Tech","article_publisher":"https:\/\/www.facebook.com\/wawiwatech\/","article_modified_time":"2026-03-11T13:40:04+00:00","og_image":[{"width":1456,"height":816,"url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@WawiwaTech","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"5 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/","url":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/","name":"Cyber Threat Intelligence","isPartOf":{"@id":"https:\/\/wawiwa-tech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence.png","datePublished":"2024-01-30T12:20:43+00:00","dateModified":"2026-03-11T13:40:04+00:00","description":"This unique and fascinating course was specifically designed for those technology and cybersecurity professionals who want to take the next step in expanding their knowledge of Cyber Threat Intelligence and Threat Hunting Techniques. The purpose of this course is to familiarize students with the world of Cyber Threat Intelligence and Threat Hunting investigations, with an emphasis on OSINT tools in the finance industry, ethical hacking, malware analysis, and digital forensics processes.","breadcrumb":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/#primaryimage","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence.png","width":1456,"height":816,"caption":"cyber threat intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cyber-threat-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wawiwa-tech.com\/"},{"@type":"ListItem","position":2,"name":"Wawiwa\u2019s Upskilling Courses","item":"https:\/\/wawiwa-tech.com\/upskilling\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Upskilling Courses","item":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/wawiwa-tech.com\/#website","url":"https:\/\/wawiwa-tech.com\/","name":"Wawiwa Tech","description":"Reskilling the World to Tech","publisher":{"@id":"https:\/\/wawiwa-tech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wawiwa-tech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/wawiwa-tech.com\/#organization","name":"Wawiwa Tech","url":"https:\/\/wawiwa-tech.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","width":1000,"height":425,"caption":"Wawiwa Tech"},"image":{"@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wawiwatech\/","https:\/\/x.com\/WawiwaTech","https:\/\/instagram.com\/wawiwatech","https:\/\/www.linkedin.com\/company\/wawiwa\/","https:\/\/www.youtube.com\/channel\/UCN_ejCsLDqznGifvkX86gzA"]}]}},"_links":{"self":[{"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/pages\/5385","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/comments?post=5385"}],"version-history":[{"count":0,"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/pages\/5385\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/pages\/5475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/media\/5386"}],"wp:attachment":[{"href":"https:\/\/wawiwa-tech.com\/de\/wp-json\/wp\/v2\/media?parent=5385"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}