{"id":2701,"date":"2025-03-27T09:47:44","date_gmt":"2025-03-27T08:47:44","guid":{"rendered":"https:\/\/cyberoperations.hu\/?post_type=product&#038;p=2701"},"modified":"2025-03-27T09:47:44","modified_gmt":"2025-03-27T08:47:44","slug":"kibervedelmi-es-kiberhigieniai-trening","status":"publish","type":"product","link":"https:\/\/cyberoperations.hu\/de\/produkt\/kibervedelmi-es-kiberhigieniai-trening\/","title":{"rendered":"Cybersicherheits- und Cyberhygiene-Schulung"},"content":{"rendered":"<p aria-level=\"3\"><span data-contrast=\"auto\">Das Cybersicherheits- und Cyberhygiene-Training von Cyber Operations ist ein umfassendes, praxisorientiertes Training, das sicherstellt, dass die Mitarbeiter und F\u00fchrungskr\u00e4fte Ihres Unternehmens \u00fcber moderne Cyberbedrohungen und Abwehrstrategien auf dem Laufenden sind. Das Training zielt darauf ab, praktisches Wissen und Werkzeuge f\u00fcr effektive Cybersicherheitsma\u00dfnahmen zu vermitteln, sei es die richtige Softwarenutzung, das IT-Sicherheitsdesign im B\u00fcro oder allt\u00e4gliche Cyberhygienema\u00dfnahmen.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Trainingsdetails:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udccc Dauer: 2 Tage<\/span><br \/>\n<span data-contrast=\"auto\"> \ud83d\udccc Ort: Vor Ort oder online<\/span><br \/>\n<span data-contrast=\"auto\"> \ud83d\udccc Preis: Basierend auf individuellem Angebot<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Die Schulungsinhalte:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udd0d <\/span><b><span data-contrast=\"auto\">Grundlagen und Best Practices der Cybersicherheit<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 Identifizierung der neuesten Cyberbedrohungen und Angriffstechniken<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Abwehrstrategien und Sofortreaktionen bei Zwischenf\u00e4llen<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Grundlagen der Systemsicherheit und des Endpunktschutzes<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udee0 <\/span><b><span data-contrast=\"auto\">Geeignete Software- und Ger\u00e4tenutzung<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 Welche Tools und Software sollten f\u00fcr die Datensicherheit verwendet werden?<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Verschl\u00fcsselungs- und Zugriffsverwaltungsl\u00f6sungen<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Einrichten von VPN, Multi-Faktor-Authentifizierung und anderen Schutzmechanismen<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83c\udfe2 <\/span><b><span data-contrast=\"auto\">Schaffung einer sicheren Arbeitsumgebung<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 IT-Sicherheitsplanung und Gestaltung eines neuen B\u00fcros<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Umbau eines bestehenden B\u00fcros gem\u00e4\u00df modernen Cybersicherheitsanforderungen<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Festlegung von Regeln f\u00fcr die physische Sicherheit, den Zutritt und den Netzwerkzugriff<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83e\uddfc <\/span><b><span data-contrast=\"auto\">Aufkl\u00e4rung zur Cyberhygiene<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 Passwortregeln und Zugriffsverwaltung<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Social-Engineering-Angriffe erkennen und verhindern<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Schutz vor Phishing und anderen g\u00e4ngigen Cybercrime-Techniken<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Sicherheitsprinzipien f\u00fcr mobile Ger\u00e4te und Remote-Arbeit<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udcca <\/span><b><span data-contrast=\"auto\">Cybersicherheitsaudit und -umfrage<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> \u2013 Bewertung des aktuellen Cybersicherheitsstatus des Unternehmens<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Identifizierung von Schwachstellen und Verbesserungsvorschl\u00e4gen<\/span><br \/>\n<span data-contrast=\"auto\"> \u2013 Erstellung einer umfassenden Cybersicherheits\u00fcbersicht am Ende der Schulung<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p aria-level=\"3\"><b><span data-contrast=\"none\">Cyber Operations-Expertise:<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335559738&quot;:281,&quot;335559739&quot;:281}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Die Ausbildung wird durchgef\u00fchrt von <\/span><b><span data-contrast=\"auto\">Cyber Operations Group Ltd.<\/span><\/b><span data-contrast=\"auto\"> ist ein national und international anerkannter Akteur im Bereich Cybersicherheit, regulatorische Compliance und Technologieausbildung. Die Schulungen und Beratungen werden von zwei herausragenden Experten geleitet und betreut:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83e\udded <\/span><b><span data-contrast=\"auto\">\u00c1ron Par\u00e9j \u2013 Milit\u00e4r- und Sicherheitsingenieur, Gesch\u00e4ftsf\u00fchrer<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> Gr\u00fcnder und CEO der Cyber Operations Group Ltd. Seine Expertise liegt in der Konzeption von Cyber-Abwehrsystemen und der koordinierten Entwicklung der IT- und physischen Sicherheit von Unternehmen. Er sammelte Erfahrungen in Projekten der Verteidigungsindustrie und in der strategischen Beratung auf hohem Niveau, mit besonderem Schwerpunkt auf kritischer Infrastruktur und Unternehmensrisikomanagement.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u2696\ufe0f <\/span><b><span data-contrast=\"auto\">Dr. Antal Csev\u00e1r LL.M. \u2013 Anwalt f\u00fcr K\u00fcnstliche Intelligenz und Technologie<\/span><\/b><br \/>\n<span data-contrast=\"auto\"> W\u00e4hrend seiner Karriere als Anwalt und Rechtsberater arbeitete er f\u00fcr mehrere multinationale Finanzunternehmen, wo er f\u00fcr die Entwicklung von Datenschutz-, Regulierungs- und Vertragssystemen verantwortlich war. Er war zehn Jahre lang Mitglied des Corporate Governance Committee der Budapester B\u00f6rse. Im Jahr 2023 w\u00fcrdigte die Budapester Anwaltskammer seine Arbeit mit dem Pro Excellentia-Preis. Er ist au\u00dferdem Vizepr\u00e4sident der Nationalen Vereinigung der Drohnenpiloten. Seine Expertise ist insbesondere in den Bereichen Rechtskonformit\u00e4t, Datenschutz und Technologieregulierung wertvoll.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"auto\">Wem empfehlen wir es?<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\u2714 F\u00fcr alle Unternehmen, die das Risiko von Cyberangriffen reduzieren m\u00f6chten<\/span><br \/>\n<span data-contrast=\"auto\"> \u2714 F\u00fcr Organisationen, die das Cybersicherheitsbewusstsein ihrer Mitarbeiter st\u00e4rken m\u00f6chten<\/span><br \/>\n<span data-contrast=\"auto\"> \u2714 F\u00fcr F\u00fchrungskr\u00e4fte, IT-Sicherheitsexperten und alle Mitarbeiter, die in ihrer t\u00e4glichen Arbeit digitale Ger\u00e4te verwenden<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">\ud83d\udce9 <\/span><b><span data-contrast=\"auto\">Kontaktieren Sie uns f\u00fcr ein individuelles Angebot und vermitteln Sie Ihren Mitarbeitern modernstes Wissen zum Thema Cyberschutz und Cyberhygiene \u2013 angeleitet von den Besten der Branche!<\/span><\/b><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>A Cyber Operations Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Oktat\u00e1sa egy \u00e1tfog\u00f3, gyakorlatorient\u00e1lt tr\u00e9ning, amely biztos\u00edtja, hogy v\u00e1llalat\u00e1nak munkav\u00e1llal\u00f3i \u00e9s vezet\u0151i naprak\u00e9szek legyenek [&hellip;]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[25],"product_tag":[],"class_list":{"0":"post-2701","1":"product","2":"type-product","3":"status-publish","5":"product_cat-uncategorized","6":"desktop-align-left","7":"tablet-align-left","8":"mobile-align-left","10":"first","11":"instock","12":"shipping-taxable","13":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning - Cyber Operations Group Kft.<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cyberoperations.hu\/de\/product\/cyber-protection-and-cyber-hygiene-training\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning\" \/>\n<meta property=\"og:description\" content=\"A Cyber Operations Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Oktat\u00e1sa egy \u00e1tfog\u00f3, gyakorlatorient\u00e1lt tr\u00e9ning, amely biztos\u00edtja, hogy v\u00e1llalat\u00e1nak munkav\u00e1llal\u00f3i \u00e9s vezet\u0151i naprak\u00e9szek legyenek [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cyberoperations.hu\/de\/product\/cyber-protection-and-cyber-hygiene-training\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Operations Group Kft.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Preis\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Verf\u00fcgbarkeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"Auf Lager\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/\",\"name\":\"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning - Cyber Operations Group Kft.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\"},\"datePublished\":\"2025-03-27T08:47:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/en\\\/product\\\/cyber-protection-and-cyber-hygiene-training\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Kezd\u0151lap\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shop\",\"item\":\"https:\\\/\\\/cyberoperations.hu\\\/shop\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#website\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"name\":\"Cyber Operations Group Kft.\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/cyberoperations.hu\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#organization\",\"name\":\"Cyber Operations Group Kft.\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"contentUrl\":\"https:\\\/\\\/cyberoperations.hu\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/simalogo-2.png\",\"width\":1500,\"height\":400,\"caption\":\"Cyber Operations Group Kft.\"},\"image\":{\"@id\":\"https:\\\/\\\/cyberoperations.hu\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<meta property=\"product:price:currency\" content=\"EUR\" \/>\n<meta property=\"og:availability\" content=\"instock\" \/>\n<meta property=\"product:availability\" content=\"instock\" \/>\n<meta property=\"product:condition\" content=\"new\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Schulung zu Cybersicherheit und Cyberhygiene \u2013 Cyber Operations Group Ltd.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cyberoperations.hu\/de\/product\/cyber-protection-and-cyber-hygiene-training\/","og_locale":"de_DE","og_type":"article","og_title":"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning","og_description":"A Cyber Operations Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Oktat\u00e1sa egy \u00e1tfog\u00f3, gyakorlatorient\u00e1lt tr\u00e9ning, amely biztos\u00edtja, hogy v\u00e1llalat\u00e1nak munkav\u00e1llal\u00f3i \u00e9s vezet\u0151i naprak\u00e9szek legyenek [&hellip;]","og_url":"https:\/\/cyberoperations.hu\/de\/product\/cyber-protection-and-cyber-hygiene-training\/","og_site_name":"Cyber Operations Group Kft.","twitter_card":"summary_large_image","twitter_misc":{"Preis":"","Verf\u00fcgbarkeit":"Auf Lager"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/","url":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/","name":"Schulung zu Cybersicherheit und Cyberhygiene \u2013 Cyber Operations Group Ltd.","isPartOf":{"@id":"https:\/\/cyberoperations.hu\/#website"},"datePublished":"2025-03-27T08:47:44+00:00","breadcrumb":{"@id":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cyberoperations.hu\/en\/product\/cyber-protection-and-cyber-hygiene-training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Kezd\u0151lap","item":"https:\/\/cyberoperations.hu\/"},{"@type":"ListItem","position":2,"name":"Shop","item":"https:\/\/cyberoperations.hu\/shop\/"},{"@type":"ListItem","position":3,"name":"Kiberv\u00e9delmi \u00e9s Kiberhigi\u00e9niai Tr\u00e9ning"}]},{"@type":"WebSite","@id":"https:\/\/cyberoperations.hu\/#website","url":"https:\/\/cyberoperations.hu\/","name":"Cyber Operations Group Ltd.","description":"","publisher":{"@id":"https:\/\/cyberoperations.hu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cyberoperations.hu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/cyberoperations.hu\/#organization","name":"Cyber Operations Group Ltd.","url":"https:\/\/cyberoperations.hu\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/","url":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","contentUrl":"https:\/\/cyberoperations.hu\/wp-content\/uploads\/2024\/12\/simalogo-2.png","width":1500,"height":400,"caption":"Cyber Operations Group Kft."},"image":{"@id":"https:\/\/cyberoperations.hu\/#\/schema\/logo\/image\/"}}]},"product_price_currency":"EUR","og_availability":"instock","product_availability":"instock","product_condition":"new"},"_links":{"self":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/product\/2701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/types\/product"}],"version-history":[{"count":0,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/product\/2701\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/media?parent=2701"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/product_brand?post=2701"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/product_cat?post=2701"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cyberoperations.hu\/de\/wp-json\/wp\/v2\/product_tag?post=2701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}