Improve your experience. We are very sorry but this website does not support Internet Explorer. We recommend using a different browser that is supported such as Google Chrome or Mozilla Firefox.

Cyber Security: Welche Richtung möchte ich gehen?

KOSTENFREIES WEBINAR! Stellen Sie Ihre Fragen an unseren Experten in Information Security Herrn Björn Voitel (CISM, CRISC, CISSP-ISSAP, OSCP, CPENT)


exklusiv für unsere Kunden haben wir Herrn Björn Voitel, einen der Cybersecurity Experten, für ein Webinar zum Thema Cybersecurity Zertifizierungen gewinnen können.

Mit unserem kostenfreien Webinar erhalten Sie eine Übersicht im Bereich der Cybersecurity Zertifizierungen. Wo stehen Sie, wie können Sie Ihre Security Zertifizierungen erweitern? Dieses Webinar ist an alle gerichtet, die im Cybersecurity Bereich tätig sind oder tätig werden wollen.


Ob Sie nun Quereinsteiger, Profi sind oder ein SOC Team aufbauen möchten, die Roadmap durch die verschiedenen Cybersecurity Trainings und Zertifizierungen wird Ihnen die vielfältige Welt der Cybersecurity näherbringen, so dass Sie Ihre nächste Zertifizierung planen können – für sich oder Ihr Team! 

In unserem live Webinar können Sie alle Fragen stellen, die Sie in dem Bereich beschäftigen.

Dieses Webinar ist kostenfrei und hat eine limitierte Anzahl von Plätzen zur Verfügung!

Reservieren Sie Ihren Platz

Agenda and topics covered

Folgende Themen sind Inhalt des Webinars:

  •  Vorstellung Björn Voitel
  •  Einführung Cyber Security Zertifizierungen
  •  Cyber Security Skills gap
  •  Roadmap durch die verschiedenen Cyber Security Trainings und Zertifizierungen
  •  Fragen, Antworten


Wer kann daran teilnehmen?

Dieses Webinar ist an alle gerichtet, die im Cyber Security Bereich tätig sind oder tätig werden wollen.

Von Neueinsteiger bis zu bereits führenden Zertifizierungen. Sie bekommen einen Wegweiser für Ihre Cybersecurity Karriere.

 Reservieren Sie sich Ihren Platz bei unserem kostenfreien Webinar.

Similar courses

Security in the Cloud, Where are we today, is my data secure in the cloud?

Cloud identity and access management, Data encryption in the cloud, Key management in the cloud, Data residency

More Information
Cloud First, Tools and tips to turn your on-premise focused IT department into a cloud first IT department.

Why is cloud first here to stay, Focusing on the user, Making use of open source and open standards, Sharing, Reuse and Collaboration, Tools to use in a cloud first world

More Information
DevOps, where to start? Tools and stratagems for those new to the DevOps world

The goals of DevOps, Building a DevOps culture, Continuous integration, delivery, and deployment (CI/CD), DevOps Tools

More Information
A lifetime of learning, Techniques and tools to assist you in making learning an on-going part of your life

Setting goals, Building a learning community, Keeping up-to-date with advances in technology, Becoming comfortable with saying “I don’t know” , Learning resources (tools and website to assist with learning)

More Information
Exam Readiness: AWS Certified Solutions Architect – Associate

Get the exam support you need to achieve your AWS Certified Solutions Architect Associate certification.

More Information
Which Cloud Provider? Overview of home working and cloud services that support home working

Types of homeworking Benefits of homeworking Consideration of homeworking for employers Connectivity for home workers Collaboration tools for home workers Security of data when working from home

More Information
Protect your Microsoft cloud identities

We are living unprecedented times. Every day we are learning new ways of working and interacting with each other’s and of course this also applies to the workforce. Hackers are also finding new ways of “working” and are taking advantage of the lack of well configured and prepared Systems. Spoofing, phishing are very know terms for IT Professionals and we get surprise by how so simple some attacks against identities are. Still users fall for then. There is a lot of awareness to be made on the user side, nevertheless we, IT Professionals should prevent this. In this Firebrand One I will share the best practices I have been advising customers around to world to protect their identities. We will speak and demo features like MFA, Self-password reset, Conditional access, PIM, FIDO, …. Join us and see how you can provide a safe cloud identity infrastructure to your users.

More Information
How statistics are used in modern businesses

How statistics are used in modern businesses - How statistics and correlation of data can assist a modern business

More Information
Introduction to Machine Learning (ML)

Get a FREE introduction to Machine Learning (ML).

More Information
Foundation Data Science Understanding

Foundation Data Science Understanding - What is DS, how is it being used in business today, what terms to look out for, how to commission some DS work

More Information
Final Exam Q&A Prep for your CCNA

All CCNA related topics - The idea is to prepare students 2 weeks out from their exam, by providing an online Q&A session.

More Information
Why invest in Enterprise Architecture

“In business, you’re either growing or you’re decaying: there’s no middle ground. If you’re standing still you’re decaying.” Alan Arkin. The business world is deterministic – that is to say, every cause has an effect. It is also very complex. The combination of determinism and complexity is chaos and chaotic systems are not readily predictable. What we do know is that to thrive a business must address the perceived threats. We have Security people to address security threats by adjusting the Security Architecture – analogously we are adjusting for Privacy threats and generally we evolve by adjusting for different commercial threats. These include new laws and regulations, process and quality improvements by competitors and a whole myriad of other external changes that threaten our corporate well-being. Understanding how to accommodate responses to subtle threats within our complex corporate environment requires a dispassionate and holistic view which is not easy when it feels like fire-fighting. The role of the Enterprise Architect is to support continuity of business whilst analysing and understanding these threats, then design optimal system modifications to accommodate, reconcile or resist them. This webinar is designed as an overview to the thinking processes that can be used to rationalise the ‘non-security’ commercial threats with a view to understanding the particular skill-set of the Enterprise Architect.

More Information
What is Enterprise Architecture for Architects and the IT community

Understanding how to accommodate responses to subtle threats within our complex corporate environment requires a dispassionate and holistic view which is not easy when it feels like fire-fighting. The role of the Enterprise Architecture is to support continuity of business whilst analysing and understanding these threats, then design optimal system modifications to accommodate, reconcile or resist them. Optimal, in this case, generally includes that they are capable of being implemented whilst minimally compromising the current operational environment – or that a great change is handled with predicted damage limitation. This webinar is designed as an overview to the thinking processes that can be used by the Enterprise Architect to rationalise these seemingly conflicting requirements.

More Information
BCS Blockchain Essentials (BCSBLOCKE) Undertand the basic concepts of blockchain, the potential fields of application, the potential value for the organization and the technology driving the blockchain

Explain how a blockchain works, explain the purpose ledgers have in a blockchain, Identify blockchain vulnerabilities, Explain the role of the public witness in a blockchain, Explain the role of decentralized autonomous organizations (DOA) and sophisticated smart contracts, describe possible applications for a blockchain with regard to identity, identify the possibilities of combining a blockchain with internet of things (IOT) or artifical intelligence (AI), describe the role blockchain can play in the supply chain, explain the use of blockchain technology for the protection of intellectual property (IP) and providence

More Information
Deploy to Kubernetes with Azure DevOps

Get a free official introduction on how to deploy Kubernetes with Azure DevOps.

More Information
An Overview of Skills Bootcamps In Digital

Skills Bootcamps in Digital - Part of the Government’s Lifetime Skills Guarantee and Skills for Life. Find out how you can kick start your career in digital.

More Information
AWS Cloud Practitioner Essentials

This course is for individuals who seek an overall understanding of the Amazon Web Services (AWS) Cloud, independent of specific technical roles.

More Information
Mission Ignition: Launch your IT Career with CompTIA

In this session, we will unpack three beginner CompTIA certifications – the ITF+ (IT Fundamentals), Cloud Essentials+, and the gold standard for IT Support technicians everywhere: the CompTIA A+.

More Information
Start Your Cybersecurity Career with Firebrand and (ISC)²

Start Your Cybersecurity Career with (ISC)² and Firebrand. (ISC)² is the World’s Leading Cybersecurity Professional Organization

More Information
AWS Discovery Day: Fundamentals of A Modern Data Strategy

Join this event to learn how to modernize, unify, and innovate your way to a modern data strategy with AWS.

More Information
AWS Discovery Day: Machine Learning Basics

Learn how you can unlock new insights and value for your business using machine learning.

More Information
AWS Discovery Day: Securing Your AWS Cloud

Whether you are thinking of migrating to the AWS Cloud or already have a workload running on AWS, securing your data and resources should be at the top of the list.

More Information
AWS Discovery Day: Strategies and Tools to Perform Large-Scale Migrations

Learn about the AWS strategy and best practices for performing large-scale cloud migrations.

More Information
The dynamic realm of project management methodologies

A comprehensive understanding of how predictive, adaptive, and Lean methods collaboratively shape successful project outcomes.

More Information
Generative AI Fundamentals

Unlock the Power of Generative AI

More Information
CoPilot Fundamentals

Unlock Your Potential with Microsoft CoPilot

More Information
Responsible AI

Navigating AI’s Ethical Frontiers

More Information
Setting AI Strategy

Unleashing AI's Strategic Potential: Crafting a Roadmap to Success

More Information

Press enter to see more results