{"id":40246,"date":"2023-12-19T18:07:02","date_gmt":"2023-12-19T18:07:02","guid":{"rendered":"https:\/\/www.cyberguru.it\/zweite-staffel-channel\/"},"modified":"2024-10-04T10:14:17","modified_gmt":"2024-10-04T10:14:17","slug":"zweite-staffel-channel","status":"publish","type":"page","link":"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/","title":{"rendered":"Zweite Staffel Channel"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Hero-1.webp&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; width=&#8220;100%&#8220; max_width=&#8220;2560px&#8220; custom_margin=&#8220;150px||||false|false&#8220; custom_padding=&#8220;|||10%|false|false&#8220; custom_padding_tablet=&#8220;|||10%|false|false&#8220; custom_padding_phone=&#8220;|5%||5%|false|true&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.23.2&#8243; _module_preset=&#8220;default&#8220; header_font=&#8220;Inter|700|||||||&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;0px||||false|false&#8220; header_font_size_tablet=&#8220;60px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1>Zweite\u00a0Staffel<\/h1>\n<h1>Cybersecurity Eilmeldungen<\/h1>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_text_color=&#8220;#FFFFFF&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p>Channel Ausbildung \/ <span style=\"color: #f18a00;\">Episoden der zweiten Staffel<\/span><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|tablet&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_enable_color=&#8220;off&#8220; background_image=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/10\/Rete_Neuronale-2ng.webp&#8220; custom_margin=&#8220;|||0px|false|false&#8220; custom_padding=&#8220;0px||0px||true|false&#8220; custom_padding_tablet=&#8220;0px||0px||true|false&#8220; custom_padding_phone=&#8220;0px||0px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/1-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.1&#8243; title_text=&#8220;Channel Episode 2.1&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">ALL CRAZY FOR WATERING HOLE \/ WATERING HOLE <\/span><br \/>\nIn dieser Folge analysieren wir wieder einmal eine der Natur entlehnte Cyber-Angriffstechnik: die Watering Hole-Technik.<br \/>\nDer Angreifer legt sich wie ein Krokodil auf die Lauer f\u00fcr sein Opfer.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/2-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.2&#8243; title_text=&#8220;Channel Episode 2.2&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">A FRUITFUL PESCA \/ WHATSAPP SCAM <\/span><br \/>\nIn dieser Folge berichten wir \u00fcber einen Betrug, der auf eine &#8222;technisch unvorbereitete&#8220; F\u00fchrungskraft abzielt. Es handelt sich um einen Betrug, der auf psychologischer Manipulation beruht, bei dem der Hacker, getarnt hinter einer falschen Identit\u00e4t, seine kriminellen Absichten durchsetzt.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/3-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.3&#8243; title_text=&#8220;Channel Episode 2.3&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">IF TELEPHONING \/ VISHING &amp; DATA THEFT <\/span><br \/>\nMittlerweile haben wir uns daran gew\u00f6hnt, Anrufe von Betreibern zu erhalten, die uns \u00fcber einseitige \u00c4nderungen der von uns abgeschlossenen Vertr\u00e4ge informieren. Die Wahrnehmung des Risikos bei diesen Anrufen ist so weit gesunken, dass wir sensible Kreditkartendaten preisgeben.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;10px||10px||true|false&#8220; custom_padding_tablet=&#8220;10px||10px||true|false&#8220; custom_padding_phone=&#8220;10px||10px||true|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/4-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.4&#8243; title_text=&#8220;Channel Episode 2.4&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">GEF\u00c4HRLICHES&#8216; PARKEN \/ QUISHING <\/span><br \/>\nIn dieser Folge untersuchen wir einen in letzter Zeit sehr beliebten Betrug, der sich auf einen immer beliebter werdenden Code st\u00fctzt: den QR-Code. Der grundlegende T\u00e4uschungsmechanismus ist derselbe wie beim Phishing: das potenzielle Opfer soll dazu gebracht werden, eine Aktion durchzuf\u00fchren.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/5-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.5&#8243; title_text=&#8220;Channel Episode 2.5&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">TRY, BUT DON&#8217;T FORGET \/ FAKE WEBSITE <\/span><br \/>\nDas Echte vom Gef\u00e4lschten in der digitalen Dimension zu unterscheiden, kann eine sehr schwierige \u00dcbung sein. Die Gefahr, Opfer von Cyber-Kriminellen zu werden, ist immer gegeben. Wie k\u00f6nnen wir uns sch\u00fctzen? Indem wir auf tugendhaftes digitales Verhalten zur\u00fcckgreifen.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/6-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.6&#8243; title_text=&#8220;Channel Episode 2.6&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">COPYING WITH TROUBLE KNOWLEDGE \/ CEO FRAUD <\/span><br \/>\nDie Kompromittierung von Firmenkonten und das Eindringen in den E-Mail-Verkehr von Unternehmen ist die Bedrohung, mit der Cyberkriminelle die schlimmsten Albtr\u00e4ume von Topmanagern bev\u00f6lkern, insbesondere wenn die Eindringlinge genau wissen, wie sie sich tarnen k\u00f6nnen.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;10px||10px||true|false&#8220; custom_padding_tablet=&#8220;10px||10px||true|false&#8220; custom_padding_phone=&#8220;10px||10px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/7-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.7&#8243; title_text=&#8220;Channel Episode 2.7&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">REMEMBER PHOTOS&#8230;TO REMEMBER \/ DATENSCHUTZ <\/span><br \/>\nDie Leichtigkeit, mit der wir heutzutage Daten und Informationen teilen, kann zu sehr kritischen Situationen f\u00fcr unsere Privatsph\u00e4re f\u00fchren. Die Beachtung einiger einfacher Verhaltensregeln kann uns jedoch vor einer &#8222;indiskreten&#8220; Weitergabe sch\u00fctzen.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/8-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.8&#8243; title_text=&#8220;Channel Episode 2.8&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">GALEOTTA FU L&#8217;E-MAIL \/ SPEAR PHISHING <\/span><br \/>\nPhishing ist eine Computer-Angriffstechnik, die je nach Kontext unterschiedliche Formen annehmen kann.<br \/>\nSpear-Phishing-Angriffe, wie der in dieser Folge beschriebene, sind im Allgemeinen genauer, aber kaum &#8222;perfekt&#8220;.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/9-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.9&#8243; title_text=&#8220;Channel Episode 2.9&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">BEYOND THE APEARANCES \/ FAKE NEWS <\/span><br \/>Diese Folge befasst sich mit der Bedrohung, die von den Fake News ausgeht, die sich inzwischen ungehindert im Internet verbreiten. Bevor wir einer sensationellen Nachricht aus dem Internet Glauben schenken, m\u00fcssen wir sie gr\u00fcndlich durchleuchten.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; custom_padding=&#8220;10px||10px||true|false&#8220; custom_padding_tablet=&#8220;10px||10px||true|false&#8220; custom_padding_phone=&#8220;10px||10px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_divider color=&#8220;gcid-ea7ac644-2741-4063-86d6-d9905bae6680&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22color%22%93}&#8220;][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;2&#8243; make_equal=&#8220;on&#8220; custom_padding_last_edited=&#8220;on|desktop&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; custom_margin_tablet=&#8220;&#8220; custom_margin_phone=&#8220;&#8220; custom_margin_last_edited=&#8220;on|desktop&#8220; custom_padding=&#8220;50px||||false|false&#8220; custom_padding_tablet=&#8220;50px||||false|false&#8220; custom_padding_phone=&#8220;50px||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/10-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.10&#8243; title_text=&#8220;Channel Episode 2.10&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">EINE &#8218;FALSCHE&#8216; SPENDE \/ PHARMING <\/span><br \/>\nIn dieser Folge geht es um eine besonders hinterh\u00e4ltige Angriffstechnik, die in der Kreativit\u00e4t der Cybersicherheitsspezialisten einen besonderen Namen hat: Pharming, die Technik der geklonten Website.<br \/>\nAber was ist Pharming?<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/11-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.11&#8243; title_text=&#8220;Channel Episode 2.11&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">GEF\u00c4HRLICHE POSTS \/ PRIVACY <\/span><br \/>\nGibt es im Zeitalter des Austauschs \u00fcber soziale Medien noch Privatsph\u00e4re? In dieser Folge wird die Geschichte eines Kandidaten erz\u00e4hlt, der aufgrund eines Posts auf seinen sozialen Profilen von einem Auswahlverfahren &#8218;abgelehnt&#8216; wurde. Eine Warnung f\u00fcr die Jungen, aber auch f\u00fcr die nicht mehr ganz so Jungen.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/12-1-scaled.webp&#8220; alt=&#8220;Channel Episode 2.12&#8243; title_text=&#8220;Channel Episode 2.12&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][et_pb_text _builder_version=&#8220;4.27.2&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik||||||||&#8220; text_orientation=&#8220;center&#8220; hover_enabled=&#8220;0&#8243; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220; sticky_enabled=&#8220;0&#8243;]<\/p>\n<p style=\"text-align: left;\"><span style=\"color: #f18a00;\">EIN SEHR &#8218;EXPENSIVER&#8216; URLAUB \/ GETEILTE GER\u00c4TE<\/span><br \/>\nDer Kernpunkt dieser Geschichte ist die Bedeutung, die unsere Ger\u00e4te sowohl im privaten als auch im beruflichen Bereich angenommen haben.<br \/>\nAus diesem Grund m\u00fcssen wir sehr vorsichtig sein, wie wir diese Ger\u00e4te nutzen.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_enable_image=&#8220;off&#8220; background_position=&#8220;bottom_center&#8220; custom_padding=&#8220;50px||50px||true|false&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Di-piu\u0300.webp&#8220; alt=&#8220;Mehr&#8220; title_text=&#8220;Mehr&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-200px&#8220; horizontal_offset=&#8220;85px&#8220; vertical_offset_tablet=&#8220;-55px&#8220; vertical_offset_phone=&#8220;-90px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-55px&#8220; horizontal_offset_phone=&#8220;-50px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; position_origin_a_tablet=&#8220;top_left&#8220; position_origin_a_phone=&#8220;top_left&#8220; position_origin_a_last_edited=&#8220;on|phone&#8220; position_origin_f_tablet=&#8220;&#8220; position_origin_f_phone=&#8220;&#8220; position_origin_f_last_edited=&#8220;on|phone&#8220; position_origin_r_tablet=&#8220;&#8220; position_origin_r_phone=&#8220;&#8220; position_origin_r_last_edited=&#8220;on|phone&#8220; width=&#8220;100%&#8220; custom_margin=&#8220;||||false|false&#8220; positioning_tablet=&#8220;absolute&#8220; positioning_phone=&#8220;absolute&#8220; positioning_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=&#8220;on|phone&#8220; admin_label=&#8220;Linie&#8220; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;||0px||false|false&#8220; custom_padding=&#8220;70px|170px|0px|170px|false|true&#8220; custom_padding_tablet=&#8220;|100px||100px|false|true&#8220; custom_padding_phone=&#8220;70px|20px|0px|20px|false|true&#8220; border_radii=&#8220;off|10px|10px||&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;0px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; text_font=&#8220;Rubik|300|||||||&#8220; text_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; text_font_size=&#8220;20px&#8220; header_2_font=&#8220;Inter|700|||||||&#8220; header_2_text_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; header_2_font_size=&#8220;48px&#8220; header_2_line_height=&#8220;58px&#8220; module_alignment=&#8220;center&#8220; custom_margin=&#8220;||25px||false|false&#8220; custom_padding=&#8220;||0px||false|false&#8220; header_2_font_size_tablet=&#8220;48px&#8220; header_2_font_size_phone=&#8220;32px&#8220; header_2_font_size_last_edited=&#8220;on|phone&#8220; header_2_line_height_tablet=&#8220;58px&#8220; header_2_line_height_phone=&#8220;35px&#8220; header_2_line_height_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{%22gcid-65b65f10-97af-4b49-9890-b01efe796309%22:%91%22text_text_color%22,%22header_2_text_color%22%93}&#8220;]<\/p>\n<h2 style=\"text-align: center;\">M\u00f6chten Sie mehr erfahren?<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8220;1_3,1_3,1_3&#8243; use_custom_gutter=&#8220;on&#8220; gutter_width=&#8220;1&#8243; custom_padding_last_edited=&#8220;on|phone&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;#FFFFFF&#8220; max_width=&#8220;1440px&#8220; custom_margin=&#8220;0px||||false|false&#8220; custom_padding=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_tablet=&#8220;0px|160px|70px|160px|false|true&#8220; custom_padding_phone=&#8220;0px|0px|70px|0px|false|true&#8220; border_radii=&#8220;off|||15px|15px&#8220; box_shadow_style=&#8220;preset2&#8243; box_shadow_horizontal=&#8220;1px&#8220; box_shadow_vertical=&#8220;20px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMzNyIsImVuYWJsZV9odG1sIjoib2ZmIn19@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;KONTAKT US&#8220; button_alignment=&#8220;center&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.23.2&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9hdHRhY2htZW50Iiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjMyODk1IiwiZW5hYmxlX2h0bWwiOiJvZmYifX0=@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DATENBLATT&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;on|phone&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.23.2&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;#f18a00&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:230px;||min-width:230px;||max-width:230px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_3&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjExMTgiLCJlbmFibGVfaHRtbCI6Im9mZiJ9fQ==@&#8220; url_new_window=&#8220;on&#8220; button_text=&#8220;DEMO ANFORDERN&#8220; button_alignment=&#8220;center&#8220; button_alignment_tablet=&#8220;center&#8220; button_alignment_phone=&#8220;center&#8220; button_alignment_last_edited=&#8220;off|desktop&#8220; disabled_on=&#8220;off|off|off&#8220; _builder_version=&#8220;4.23.2&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_text_size=&#8220;14px&#8220; button_text_color=&#8220;#FFFFFF&#8220; button_bg_color=&#8220;gcid-65b65f10-97af-4b49-9890-b01efe796309&#8243; button_border_width=&#8220;0px&#8220; button_border_radius=&#8220;3px&#8220; button_font=&#8220;Rubik|||on|||||&#8220; button_use_icon=&#8220;off&#8220; custom_margin=&#8220;10px||10px||true|false&#8220; custom_padding=&#8220;12px||12px||true|true&#8220; custom_css_main_element=&#8220;width:200px;||min-width:200px;||max-width:200px;||text-align:center;&#8220; saved_tabs=&#8220;all&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{%22gcid-ea7ac644-2741-4063-86d6-d9905bae6680%22:%91%22button_bg_color%22%93}&#8220;][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; max_width=&#8220;1440px&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.18.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/www.cyberguru.it\/wp-content\/uploads\/2022\/09\/Vuoi-saperne.webp&#8220; alt=&#8220;Sie m\u00f6chten wissen&#8220; title_text=&#8220;Sie m\u00f6chten wissen&#8220; align=&#8220;right&#8220; _builder_version=&#8220;4.19.4&#8243; _module_preset=&#8220;default&#8220; positioning=&#8220;absolute&#8220; position_origin_a=&#8220;bottom_right&#8220; vertical_offset=&#8220;-20px&#8220; horizontal_offset=&#8220;-100px&#8220; vertical_offset_tablet=&#8220;-20px&#8220; vertical_offset_phone=&#8220;-80px&#8220; vertical_offset_last_edited=&#8220;on|phone&#8220; horizontal_offset_tablet=&#8220;-100px&#8220; horizontal_offset_phone=&#8220;-130px&#8220; horizontal_offset_last_edited=&#8220;on|phone&#8220; width=&#8220;25%&#8220; width_tablet=&#8220;25%&#8220; width_phone=&#8220;25%&#8220; width_last_edited=&#8220;on|phone&#8220; custom_margin=&#8220;||||false|false&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Zweite\u00a0Staffel Cybersecurity EilmeldungenChannel Ausbildung \/ Episoden der zweiten StaffelALL CRAZY FOR WATERING HOLE \/ WATERING HOLE In dieser Folge analysieren wir wieder einmal eine der Natur entlehnte Cyber-Angriffstechnik: die Watering Hole-Technik. Der Angreifer legt sich wie ein Krokodil auf die Lauer f\u00fcr sein Opfer.A FRUITFUL PESCA \/ WHATSAPP SCAM In dieser Folge berichten wir \u00fcber [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"class_list":["post-40246","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Zweite Staffel Channel - Cyber Guru<\/title>\n<meta name=\"description\" content=\"12 fesselnde Episoden in der zweiten Staffel des induktiven Schulungsprogramms von Cyber Guru Channel\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Zweite Staffel Channel\" \/>\n<meta property=\"og:description\" content=\"12 fesselnde Episoden in der zweiten Staffel des induktiven Schulungsprogramms von Cyber Guru Channel\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-04T10:14:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1512\" \/>\n\t<meta property=\"og:image:height\" content=\"981\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"16\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/zweite-staffel-channel\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/zweite-staffel-channel\\\/\",\"name\":\"Zweite Staffel Channel - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\"},\"datePublished\":\"2023-12-19T18:07:02+00:00\",\"dateModified\":\"2024-10-04T10:14:17+00:00\",\"description\":\"12 fesselnde Episoden in der zweiten Staffel des induktiven Schulungsprogramms von Cyber Guru Channel\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/zweite-staffel-channel\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/zweite-staffel-channel\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/zweite-staffel-channel\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/homepage-v2-entwurf\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Zweite Staffel Channel\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Zweite Staffel Channel - Cyber Guru","description":"12 fesselnde Episoden in der zweiten Staffel des induktiven Schulungsprogramms von Cyber Guru Channel","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/","og_locale":"de_DE","og_type":"article","og_title":"Zweite Staffel Channel","og_description":"12 fesselnde Episoden in der zweiten Staffel des induktiven Schulungsprogramms von Cyber Guru Channel","og_url":"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_modified_time":"2024-10-04T10:14:17+00:00","og_image":[{"width":1512,"height":981,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/12\/social.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"16\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/","url":"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/","name":"Zweite Staffel Channel - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/de\/#website"},"datePublished":"2023-12-19T18:07:02+00:00","dateModified":"2024-10-04T10:14:17+00:00","description":"12 fesselnde Episoden in der zweiten Staffel des induktiven Schulungsprogramms von Cyber Guru Channel","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/de\/zweite-staffel-channel\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/de\/homepage-v2-entwurf\/"},{"@type":"ListItem","position":2,"name":"Zweite Staffel Channel"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/de\/#website","url":"https:\/\/www.cyberguru.it\/de\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40246","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/comments?post=40246"}],"version-history":[{"count":4,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40246\/revisions"}],"predecessor-version":[{"id":40267,"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/pages\/40246\/revisions\/40267"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/de\/wp-json\/wp\/v2\/media?parent=40246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}