{"id":32199,"date":"2017-07-06T09:57:30","date_gmt":"2017-07-06T13:57:30","guid":{"rendered":"https:\/\/www.cyberark.com\/training-certification\/"},"modified":"2020-08-13T14:05:23","modified_gmt":"2020-08-13T18:05:23","slug":"training-certification","status":"publish","type":"page","link":"https:\/\/www.cyberark.com\/de\/services-support\/training-certification\/","title":{"rendered":"Schulung &#038; amp; Zertifizierung"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1564520070719{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/training-hero.jpg?id=26907) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;bottom&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SCHULUNG &#038; amp; ZERTIFIKATION&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_custom_heading text=&#8220;CyberArk bietet verschiedene Schulungsoptionen und Zertifizierungsstufen an&#8220; font_container=&#8220;tag:h3|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_btn title=&#8220;EINEN KURS FINDEN&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Ftraining.cyberark.com%2Fcatalog|target:%20_blank|&#8220; el_class=&#8220;cyb-button large event-click&#8220; el_id=&#8220;PAS Page: Download Datasheet&#8220;][vc_btn title=&#8220;TERMINE&#8220; style=&#8220;custom&#8220; custom_background=&#8220;&#8220; custom_text=&#8220;#ffffff&#8220; shape=&#8220;square&#8220; link=&#8220;url:https%3A%2F%2Ftraining.cyberark.com%2F%23upcoming-events|target:%20_blank|&#8220; el_class=&#8220;cyb-button green large event-click&#8220; el_id=&#8220;PAS Page: Request A Demo&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row][vc_column width=&#8220;1\/12&#8243;][\/vc_column][vc_column width=&#8220;5\/6&#8243; css=&#8220;.vc_custom_1537559065797{padding-top: 2.1875rem !important;padding-bottom: 2.5rem !important;}&#8220;][vc_custom_heading text=&#8220;\u00dcBERBLICK&#8220; font_container=&#8220;tag:h2|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-6&#8243; css=&#8220;.vc_custom_1537554395358{margin-bottom: 0.375rem !important;}&#8220;][vc_custom_heading text=&#8220;Denjenigen, die einen Nachweis f\u00fcr ihr technisches Fachwissen w\u00fcnschen, bietet das CyberArk Zertifizierungsprogramm eine Vielzahl von M\u00f6glichkeiten. In jeder Stufe wird Fachwissen im Bereich Cyber-Sicherheit sowie bei der innovativen und branchenf\u00fchrenden Privileged Access Security L\u00f6sung von CyberArk bewiesen.&#8220; font_container=&#8220;tag:p|text_align:center|line_height:1.375rem&#8220; use_theme_fonts=&#8220;yes&#8220;][\/vc_column][vc_column width=&#8220;1\/12&#8243;][\/vc_column][\/vc_row][vc_row equal_height=&#8220;yes&#8220; el_class=&#8220;cyb-margin&#8220;][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cyb-center&#8220; css=&#8220;.vc_custom_1537558961444{padding-bottom: 2.5rem !important;}&#8220;][vc_row_inner css=&#8220;.vc_custom_1536071597162{margin-right: 0px !important;margin-left: 0px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;border-left-color: #f1f2f2 !important;border-left-style: solid !important;border-right-color: #f1f2f2 !important;border-right-style: solid !important;border-top-color: #f1f2f2 !important;border-top-style: solid !important;border-bottom-color: #f1f2f2 !important;border-bottom-style: solid !important;}&#8220;][vc_column_inner css=&#8220;.vc_custom_1537558185064{padding-bottom: 0.875rem !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1537556189195{padding-top: 2.5rem !important;}&#8220; el_class=&#8220;cyb-fxd-hgt-142&#8243;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26910\" style=\"width: 5.5625rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8220;25%&#8220; font_container=&#8220;tag:h1|font_size:3.375rem|text_align:center|color:%234d8fcc&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-4&#8243;][vc_custom_heading text=&#8220;aller neuen Stellen im Bereich Cyber-Sicherheitwerden erst nach 6 Monaten besetzt.&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-4 cyb-cta-match light&#8220; css=&#8220;.vc_custom_1538407054405{padding-right: 1.375rem !important;padding-bottom: 1rem !important;padding-left: 1.375rem !important;}&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cyb-center&#8220; css=&#8220;.vc_custom_1537558967598{padding-bottom: 2.5rem !important;}&#8220;][vc_row_inner css=&#8220;.vc_custom_1534264983047{margin-right: 0px !important;margin-left: 0px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;border-left-color: #f1f2f2 !important;border-left-style: solid !important;border-right-color: #f1f2f2 !important;border-right-style: solid !important;border-top-color: #f1f2f2 !important;border-top-style: solid !important;border-bottom-color: #f1f2f2 !important;border-bottom-style: solid !important;}&#8220;][vc_column_inner css=&#8220;.vc_custom_1537558190960{padding-bottom: 0.875rem !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1537556725736{padding-top: 3rem !important;}&#8220; el_class=&#8220;cyb-fxd-hgt-142&#8243;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26911\" style=\"width: 5.4375rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/percentile-decrease.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8220;70%&#8220; font_container=&#8220;tag:h1|font_size:3.375rem|text_align:center|color:%234d8fcc&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-4&#8243;][vc_custom_heading text=&#8220;der Unternehmen verf\u00fcgen \u00fcber zu wenig Fachkr\u00e4fte f\u00fcr Cyber-Sicherheit&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-4 cyb-cta-match light&#8220; css=&#8220;.vc_custom_1538515744484{padding-bottom: 1rem !important;}&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column width=&#8220;1\/3&#8243; el_class=&#8220;cyb-center&#8220; css=&#8220;.vc_custom_1537558975370{padding-bottom: 2.5rem !important;}&#8220;][vc_row_inner css=&#8220;.vc_custom_1534265030218{margin-right: 0px !important;margin-left: 0px !important;border-top-width: 2px !important;border-right-width: 2px !important;border-bottom-width: 2px !important;border-left-width: 2px !important;border-left-color: #f1f2f2 !important;border-left-style: solid !important;border-right-color: #f1f2f2 !important;border-right-style: solid !important;border-top-color: #f1f2f2 !important;border-top-style: solid !important;border-bottom-color: #f1f2f2 !important;border-bottom-style: solid !important;}&#8220;][vc_column_inner css=&#8220;.vc_custom_1537558197697{padding-bottom: 0.875rem !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1537556492524{padding-top: 2.5rem !important;}&#8220; el_class=&#8220;cyb-fxd-hgt-142&#8243;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26912\" style=\"width: 4.8125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/cyber-cecurity-professional.svg\" alt=\"\" \/>[\/vc_column_text][vc_custom_heading text=&#8220;1,8\u00a0Millionen&#8220; font_container=&#8220;tag:h1|font_size:3.375rem|text_align:center|color:%234d8fcc&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-4&#8243;][vc_custom_heading text=&#8220;Mitarbeiter im Bereich Cybersicherheit werden bis 2022 fehlen.&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-4 cyb-cta-match light&#8220; css=&#8220;.vc_custom_1567105993366{padding-right: 1.375rem !important;padding-bottom: 1rem !important;padding-left: 1.375rem !important;}&#8220;][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; css=&#8220;.vc_custom_1537558402317{background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;1\/6&#8243;][\/vc_column][vc_column width=&#8220;2\/3&#8243; css=&#8220;.vc_custom_1537559190649{padding-top: 2.1875rem !important;padding-bottom: 2.5rem !important;}&#8220;][vc_custom_heading text=&#8220;SCHULUNGSM\u00d6GLICHKEITEN&#8220; font_container=&#8220;tag:h2|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-6&#8243; css=&#8220;.vc_custom_1537558258327{margin-bottom: 0.375rem !important;}&#8220;][vc_custom_heading text=&#8220;Die Teilnehmer k\u00f6nnen aus verschiedenen Lernoptionen ausw\u00e4hlen, einschlie\u00dflich virtuellem Klassenzimmer, Live-Pr\u00e4senzschulungen oder Selbststudium. Unsere Kurse bieten umfassende, praktische \u00dcbungen, f\u00fcr die Rechenzentren auf der ganzen Welt herangezogen werden.&#8220; font_container=&#8220;tag:p|text_align:center|line_height:1.375rem&#8220; use_theme_fonts=&#8220;yes&#8220;][\/vc_column][vc_column width=&#8220;1\/6&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cyb-center&#8220; css=&#8220;.vc_custom_1537558490433{background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cyb-center&#8220; css=&#8220;.vc_custom_1537559741054{padding-bottom: 1.375rem !important;}&#8220;][vc_single_image image=&#8220;26917&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220;][vc_custom_heading text=&#8220;PR\u00c4SENZSCHULUNG MIT KURSLEITER&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; css=&#8220;.vc_custom_1537559580880{padding-top: 1rem !important;}&#8220; el_class=&#8220;cyb-ltr-spc-7&#8243;][\/vc_column][vc_column width=&#8220;1\/4&#8243; el_class=&#8220;cyb-center&#8220; css=&#8220;.vc_custom_1537559746719{padding-bottom: 1.375rem !important;}&#8220;][vc_single_image image=&#8220;26918&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220;][vc_custom_heading text=&#8220;LIVE-ONLINE-SCHULUNG&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; css=&#8220;.vc_custom_1537559595359{padding-top: 1rem !important;}&#8220; el_class=&#8220;cyb-ltr-spc-7&#8243;][\/vc_column][vc_column width=&#8220;1\/4&#8243; css=&#8220;.vc_custom_1537559751674{padding-bottom: 1.375rem !important;}&#8220;][vc_single_image image=&#8220;26919&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220;][vc_custom_heading text=&#8220;INDIVIDUELLE SCHULUNG&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; css=&#8220;.vc_custom_1537559615642{padding-top: 1rem !important;}&#8220; el_class=&#8220;cyb-ltr-spc-7&#8243;][\/vc_column][vc_column width=&#8220;1\/4&#8243; css=&#8220;.vc_custom_1537559758227{padding-bottom: 1.375rem !important;}&#8220;][vc_single_image image=&#8220;26920&#8243; img_size=&#8220;full&#8220; alignment=&#8220;center&#8220;][vc_custom_heading text=&#8220;E-LEARNING&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; css=&#8220;.vc_custom_1537559629041{padding-top: 1rem !important;}&#8220; el_class=&#8220;cyb-ltr-spc-7&#8243;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220;][vc_column css=&#8220;.vc_custom_1594820356603{padding-top: 2.1875rem !important;}&#8220;][vc_custom_heading text=&#8220;ZERTIFIZIERUNGSOPTIONEN&#8220; font_container=&#8220;tag:h2|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220; el_class=&#8220;cyb-ltr-spc-6&#8243; css=&#8220;.vc_custom_1543851954461{margin-bottom: 0.375rem !important;}&#8220;][vc_column_text css=&#8220;.vc_custom_1538710899334{padding-bottom: 2.5rem !important;}&#8220;]<\/p>\n<p style=\"text-align: center;\">Das CyberArk Zertifizierungsprogramm bietet Personen, die einen Nachweis f\u00fcr ihre technischen Kenntnisse w\u00fcnschen, zahlreiche Optionen an.<\/p>\n<p style=\"text-align: center;\">Das CyberArk Zertifizierungsprogramm wird von Pearson VUE* gehostet und beaufsichtigt und stellt Branchenzertifizierungen verschiedener Stufen im Bereich Privileged-Account-Sicherheit bereit.<\/p>\n<p>[\/vc_column_text][vc_custom_heading text=&#8220;CyberArk bietet Zertifizierungen f\u00fcr zahlreiche Rollen und Erfahrungsstufen an. Bei jeder werden schrittweise umfassendere und anspruchsvollere Materialien und Pr\u00fcfungen eingesetzt. Sie k\u00f6nnen sich bis zu der Stufe hocharbeiten, die am besten Ihrem Verantwortungsbereich und Ihren Berufszielen entspricht.&#8220; font_container=&#8220;tag:h4|text_align:center&#8220; use_theme_fonts=&#8220;yes&#8220;][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; equal_height=&#8220;yes&#8220; el_class=&#8220;cyb-card-hover-icon&#8220;][vc_column width=&#8220;1\/2&#8243; column_link=&#8220;url:https%3A%2F%2Ftraining.cyberark.com%2Fexam%2Flevel-1-Trustee|target:%20_blank|&#8220;][vc_column_text css=&#8220;.vc_custom_1594820241872{padding-top: 1.625rem !important;}&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26928\" style=\"width: 7.3125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/trustee.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594819916942{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]<\/p>\n<h3>STUFE EINS: TRUSTEE<\/h3>\n<p>Der Tr\u00e4ger dieses Zertifikats hat sein Basiswissen \u00fcber privilegierten Zugriff in der Cyber-Sicherheit sowie sein Verst\u00e4ndnis der CyberArk L\u00f6sungen unter Beweis gestellt.[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594820106790{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; column_link=&#8220;url:https%3A%2F%2Ftraining.cyberark.com%2Fexam%2Flevel-2-defender|target:%20_blank|&#8220;][vc_column_text css=&#8220;.vc_custom_1594820247202{padding-top: 1.625rem !important;}&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26929\" style=\"width: 7.3125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/defender.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594819955228{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]<\/p>\n<h3>STUFE ZWEI: DEFENDER<\/h3>\n<p>Der Tr\u00e4ger dieses Zertifikats hat seine theoretischen und praktischen Kenntnisse zu den t\u00e4glichen Wartungs- und Betriebsaufgaben der Privileged Access Security L\u00f6sung bewiesen.[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594820106790{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; column_link=&#8220;url:https%3A%2F%2Ftraining.cyberark.com%2Fexam%2Flevel-3-Sentry|target:%20_blank|&#8220;][vc_column_text css=&#8220;.vc_custom_1594820253314{padding-top: 1.625rem !important;}&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26934\" style=\"width: 7.3125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/sentry.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594820031345{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]<\/p>\n<h3>STUFE DREI: SENTRY<\/h3>\n<p>Der Inhaber der Sentry-Zertifizierung hat seine theoretischen und praktischen F\u00e4higkeiten bei der Bereitstellung und Konfiguration der CyberArk-L\u00f6sung unter Beweis gestellt.[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594820106790{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][vc_column width=&#8220;1\/2&#8243; column_link=&#8220;url:https%3A%2F%2Ftraining.cyberark.com%2Fexam%2Flevel-4-Guardian|target:%20_blank|&#8220;][vc_column_text css=&#8220;.vc_custom_1594820259251{padding-top: 1.625rem !important;}&#8220;]<img decoding=\"async\" class=\"alignnone size-full wp-image-26935\" style=\"width: 7.3125rem;\" src=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/guardian.svg\" alt=\"\" \/>[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594820059991{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]<\/p>\n<h3>STUFE VIER: GUARDIAN<\/h3>\n<p>Tr\u00e4ger dieses Zertifikats haben ihre fortgeschrittenen Kompetenzen hinsichtlich der verschiedenen CyberArk L\u00f6sungen und ihre F\u00e4higkeit unter Beweis gestellt, eine Unternehmensarchitektur mit einer Strategie f\u00fcr Privileged-Access-Sicherheit zu kombinieren.[\/vc_column_text][vc_column_text css=&#8220;.vc_custom_1594820106790{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]WEITERE INFORMATIONEN &gt;[\/vc_column_text][\/vc_column][\/vc_row][vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;middle&#8220; el_class=&#8220;cyb-pad&#8220; css=&#8220;.vc_custom_1588344085836{background-color: #f1f2f2 !important;}&#8220;][vc_column width=&#8220;1\/2&#8243;][vc_raw_html]W3dpc3RpYV92aWRlbyBpZD0ibHJ0MnNhaDEwMyJd[\/vc_raw_html][\/vc_column][vc_column width=&#8220;1\/3&#8243; offset=&#8220;vc_col-sm-offset-1&#8243; el_class=&#8220;cyb-subpad cyb-center-mobile&#8220;][vc_column_text css=&#8220;.vc_custom_1588343209219{padding-top: 2.5rem !important;padding-bottom: 2.5rem !important;}&#8220;]<\/p>\n<h3>VOM PAM-INGENIEUR<br \/>\nZUM DIREKTOR DES IAM<\/h3>\n<p>Erfahren Sie, wie Sie als Experte f\u00fcr Privileged Access Management Karrieren vorantreiben k\u00f6nnen.[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1564520070719{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/training-hero.jpg?id=26907) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;bottom&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SCHULUNG &#038; amp; ZERTIFIKATION&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_custom_heading text=&#8220;CyberArk bietet verschiedene Schulungsoptionen und Zertifizierungsstufen an&#8220; font_container=&#8220;tag:h3|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_btn title=&#8220;EINEN KURS FINDEN&#8220; style=&#8220;custom&#8220;&#8230;<\/p>\n","protected":false},"author":17,"featured_media":0,"parent":32307,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"product_category":[],"class_list":["post-32199","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberArk Schulungs- und Zertifizierungsprogramme<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberark.com\/services-support\/training-certification\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Schulung &amp; amp; Zertifizierung\" \/>\n<meta property=\"og:description\" content=\"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1564520070719{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/training-hero.jpg?id=26907) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;bottom&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SCHULUNG &#038; amp; ZERTIFIKATION&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_custom_heading text=&#8220;CyberArk bietet verschiedene Schulungsoptionen und Zertifizierungsstufen an&#8220; font_container=&#8220;tag:h3|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_btn title=&#8220;EINEN KURS FINDEN&#8220; style=&#8220;custom&#8220;...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberark.com\/services-support\/training-certification\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberArk\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberArk\/\" \/>\n<meta property=\"article:modified_time\" content=\"2020-08-13T18:05:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@CyberArk\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"9 Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.cyberark.com\/services-support\/training-certification\/\",\"url\":\"https:\/\/www.cyberark.com\/services-support\/training-certification\/\",\"name\":\"CyberArk Schulungs- und Zertifizierungsprogramme\",\"isPartOf\":{\"@id\":\"https:\/\/www.cyberark.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.cyberark.com\/services-support\/training-certification\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/services-support\/training-certification\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg\",\"datePublished\":\"2017-07-06T13:57:30+00:00\",\"dateModified\":\"2020-08-13T18:05:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.cyberark.com\/services-support\/training-certification\/#breadcrumb\"},\"inLanguage\":\"de-DE\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.cyberark.com\/services-support\/training-certification\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/services-support\/training-certification\/#primaryimage\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.cyberark.com\/services-support\/training-certification\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.cyberark.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Service und Support\",\"item\":\"https:\/\/www.cyberark.com\/services-support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Schulung &#038; amp; Zertifizierung\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.cyberark.com\/#website\",\"url\":\"https:\/\/www.cyberark.com\/\",\"name\":\"CyberArk\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.cyberark.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.cyberark.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de-DE\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.cyberark.com\/#organization\",\"name\":\"CyberArk Software\",\"url\":\"https:\/\/www.cyberark.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de-DE\",\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"contentUrl\":\"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"CyberArk Software\"},\"image\":{\"@id\":\"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberArk\/\",\"https:\/\/x.com\/CyberArk\",\"https:\/\/www.linkedin.com\/company\/cyber-ark-software\/\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberArk Schulungs- und Zertifizierungsprogramme","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberark.com\/services-support\/training-certification\/","og_locale":"de_DE","og_type":"article","og_title":"Schulung & amp; Zertifizierung","og_description":"[vc_row full_width=&#8220;stretch_row&#8220; content_placement=&#8220;top&#8220; css=&#8220;.vc_custom_1564520070719{background-image: url(https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/training-hero.jpg?id=26907) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8220; el_class=&#8220;cyb-hero-section&#8220;][vc_column][vc_row_inner content_placement=&#8220;bottom&#8220; el_class=&#8220;cyb-hero-header&#8220;][vc_column_inner el_class=&#8220;cyb-hero-header-text&#8220;][vc_custom_heading text=&#8220;SCHULUNG &#038; amp; ZERTIFIKATION&#8220; font_container=&#8220;tag:h1|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_custom_heading text=&#8220;CyberArk bietet verschiedene Schulungsoptionen und Zertifizierungsstufen an&#8220; font_container=&#8220;tag:h3|text_align:left&#8220; use_theme_fonts=&#8220;yes&#8220;][vc_btn title=&#8220;EINEN KURS FINDEN&#8220; style=&#8220;custom&#8220;...","og_url":"https:\/\/www.cyberark.com\/services-support\/training-certification\/","og_site_name":"CyberArk","article_publisher":"https:\/\/www.facebook.com\/CyberArk\/","article_modified_time":"2020-08-13T18:05:23+00:00","og_image":[{"url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@CyberArk","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"9 Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberark.com\/services-support\/training-certification\/","url":"https:\/\/www.cyberark.com\/services-support\/training-certification\/","name":"CyberArk Schulungs- und Zertifizierungsprogramme","isPartOf":{"@id":"https:\/\/www.cyberark.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberark.com\/services-support\/training-certification\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberark.com\/services-support\/training-certification\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg","datePublished":"2017-07-06T13:57:30+00:00","dateModified":"2020-08-13T18:05:23+00:00","breadcrumb":{"@id":"https:\/\/www.cyberark.com\/services-support\/training-certification\/#breadcrumb"},"inLanguage":"de-DE","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberark.com\/services-support\/training-certification\/"]}]},{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/services-support\/training-certification\/#primaryimage","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2018\/09\/help-wanted.svg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberark.com\/services-support\/training-certification\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberark.com\/"},{"@type":"ListItem","position":2,"name":"Service und Support","item":"https:\/\/www.cyberark.com\/services-support\/"},{"@type":"ListItem","position":3,"name":"Schulung &#038; amp; Zertifizierung"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberark.com\/#website","url":"https:\/\/www.cyberark.com\/","name":"CyberArk","description":"","publisher":{"@id":"https:\/\/www.cyberark.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberark.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de-DE"},{"@type":"Organization","@id":"https:\/\/www.cyberark.com\/#organization","name":"CyberArk Software","url":"https:\/\/www.cyberark.com\/","logo":{"@type":"ImageObject","inLanguage":"de-DE","@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","contentUrl":"https:\/\/www.cyberark.com\/wp-content\/uploads\/2021\/02\/cyberark-logo-dark.svg","width":"1024","height":"1024","caption":"CyberArk Software"},"image":{"@id":"https:\/\/www.cyberark.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberArk\/","https:\/\/x.com\/CyberArk","https:\/\/www.linkedin.com\/company\/cyber-ark-software\/"]}]}},"_links":{"self":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/comments?post=32199"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32199\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/pages\/32307"}],"wp:attachment":[{"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/media?parent=32199"}],"wp:term":[{"taxonomy":"product_category","embeddable":true,"href":"https:\/\/www.cyberark.com\/de\/wp-json\/wp\/v2\/product_category?post=32199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}