{"id":27975,"date":"2025-05-30T13:57:04","date_gmt":"2025-05-30T11:57:04","guid":{"rendered":"https:\/\/scf-5-sci-2025.hipdev.pro\/ki-sicherheit\/"},"modified":"2025-06-11T10:59:53","modified_gmt":"2025-06-11T08:59:53","slug":"ki-sicherheit","status":"publish","type":"page","link":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/","title":{"rendered":"KI-Sicherheit"},"content":{"rendered":"\n<h2>\n\t\t\tKI-Sicherheitsschulung\t<\/h2>\n\t<p>Dieser Kurs f\u00fcr Fortgeschrittene vermittelt Cybersicherheitsexperten und KI\/ML-Ingenieuren praktische F\u00e4higkeiten zur Sicherung von KI-Systemen w\u00e4hrend ihres gesamten Lebenszyklus. Durch Live-Unterricht, Gruppenarbeit und laborbasierte Simulationen lernen die Teilnehmer, KI-spezifische Bedrohungen zu modellieren, sichere Architekturen zu entwerfen, sich gegen gegnerische Angriffe zu verteidigen, auf Anomalien zu achten und auf reale Sicherheitsvorf\u00e4lle zu reagieren.<\/p>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/001-high.svg\" alt=\"001-high\" itemprop=\"image\" height=\"54\" width=\"54\" title=\"001-high\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tF\u00fcr Fortgeschrittene\t<\/h2>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/003-professional.svg\" alt=\"003-professional\" itemprop=\"image\" height=\"54\" width=\"54\" title=\"003-professional\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tSpezialisiertes Wissen\t<\/h2>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/038-Global-Language.svg\" alt=\"038---Global-Language\" itemprop=\"image\" height=\"54\" width=\"54\" title=\"038---Global-Language\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tAuf <br \/>Englisch\t<\/h2>\n    <a target=\"_blank\" href=\"https:\/\/campus.swisscyberinstitute.com\/cart\/add_product\/3404142?price_id=4316052\">\n JETZT KAUFEN &#8211; CHF 1&#8217;590.-\n    <\/a>\n    <a target=\"_blank\" href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/ai-security\/brochure\/\">\n            Brosch\u00fcre herunterladen\n    <\/a>\n\t<p>N\u00e4chster Starttermin<\/p>\n\t<p>27. November<\/p>\n\t<p>Online-Schulung unter Anleitung<\/p>\n\t<p>4 Wochen Ausbildung | 4 Stunden pro Woche | 16 Stunden insgesamt |\u00a0 donnerstags von 16:00 bis 20:00<\/p>\n\t<p><strong>Preis des Kurses<\/strong>: CHF 1&#8217;590 inkl. Materialien, Lizenzgeb\u00fchren und interne Pr\u00fcfungen.<\/p>\n<p>Nach Abschluss des Kurses stellt das Swiss Cyber Institute allen erfolgreichen Teilnehmern das Zertifikat <strong>&#8222;AI Security Engineer&#8220;<\/strong> in elektronischer Form zur Verf\u00fcgung.<\/p>\n<p><strong>Jetzt KI-Sicherheit beherrschen!<\/strong><\/p>\n<h2>\n\t\t\tInfo Session<br \/>Online.<br \/>Onsite.\t<\/h2>\n\t\t\t\t<h4>jeden Donnerstag<\/h4><p>12:30 &#8211; 13:00<\/p>\n<p>Online \u00fcber Zoom<\/p>\n\t\t\t<a href=\"https:\/\/us02web.zoom.us\/webinar\/register\/7117248481327\/WN_lHwVUDmGQFKX2lZqmxG1XQ\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tRegistrieren\n\t\t\t\t\t<\/a>\n\t\t\t\t<h4>26 June 2025<\/h4><p>18:00 &#8211; 20:00<\/p>\n<p>Swiss Cyber Institute B\u00fcro<\/p>\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/ai-education-information-event\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tRegistrieren\n\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"#\" aria-label=\"previous\" role=\"button\">\n<\/a>\n\t\t\t\t<a href=\"#\" aria-label=\"next\" role=\"button\">\n<\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png\" alt=\"AI Security Training\" itemprop=\"image\" height=\"2000\" width=\"1414\" title=\"AI Security Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tKursziele\t<\/h2>\n\t<p>Am Ende des Kurses werden Sie in der Lage sein:<\/p>\n<ul>\n<li><strong>KI-spezifische Bedrohungen<\/strong> zu modellieren und <strong>Schwachstellen<\/strong> wie Data Poisoning und Umgehung zu erkennen.<\/li>\n<li>sichere KI-Systeme unter Verwendung von <strong>Least Privilege, Sandboxing und Integrit\u00e4tskontrollen<\/strong> zu entwickeln.<\/li>\n<li><strong>gegnerische Angriffe<\/strong> auszuf\u00fchren und <strong>effektive Verteidigungsmassnahmen<\/strong> wie gegnerisches Training einzusetzen.<\/li>\n<li><strong>Echtzeit-\u00dcberwachung und Anomalie-Erkennung <\/strong>unter Ber\u00fccksichtigung von Compliance-Standards einzurichten.<\/li>\n<li><strong>Playbooks <\/strong>f\u00fcr die Reaktion auf Vorf\u00e4lle zu erstellen, Rollen zuzuweisen und die Eind\u00e4mmung zu koordinieren.<\/li>\n<li><strong>forensische Analysen <\/strong>von KI-Artefakten durchzuf\u00fchren, um Berichte zu erstellen und Verbesserungen zu empfehlen.<\/li>\n<\/ul>\n\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/meet-with-rob-glueckselig\/\">\n            Sprechen Sie mit unserem Berater\n    <\/a>\n<h2>\n\t\t\tStudieninhalt\t<\/h2>\n<h3>\n\t\t\tInteraktives Live-Lernen, angeleitet von internationalen KI-Akademikern und -Forschern, mit praktischen Trainings\u00fcbungen.\t<\/h3>\n\t<p>Der Kursinhalt basiert auf f\u00fchrenden industriellen und akademischen Praktiken f\u00fcr KI-Sicherheit und orientiert sich an Frameworks und Standards wie NIST, ISO 42001 und MITRE ATLAS.<\/p>\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/ai-security\/brochure\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tBrosch\u00fcre herunterladen\n\t\t\t\t\t<\/a>\n\t\t\t\t\tBedrohungsorientiertes sicheres Design\t\t\t\t\n<ul>\n<li>\nWarum Bedrohungsmodellierung f\u00fcr KI wichtig ist: Unterschiede zur traditionellen IT, Schl\u00fcsselkonzepte (Assets, Angreifer, Angriffsfl\u00e4che).\n<\/li>\n<li>Gehen Sie durch STRIDE, PASTA, OCTAVE, zugeschnitten auf KI-Workflows.<\/li>\n<li>H\u00e4ufige KI-Schwachstellen (Data Poisoning, Modellumgehung, Inferenzangriffe) und deren Zuordnung zu Bedrohungsmodellen.<\/li>\n<li>Praktische Gruppen\u00fcbung: Erstellen eines Bedrohungsmodells f\u00fcr einen KI-Beispielservice in VMs.\n<\/li>\n<\/ul>\n\t\t\t\t\tSicheres KI-Systemdesign\t\t\t\t\n\t\t\t\t\t<ul>\n<li>Grundprinzipien (Least Privilege, Defense-in-Depth, Fail-Secure), die auf Daten-, Modell- und Inferenzkomponenten angewendet werden.<\/li>\n<li>Entwurfsmuster (Sandboxing-Inferenz, Modellsignierung, verschl\u00fcsselte Trainingsdaten) und wann sie zu verwenden sind.<\/li>\n<li>Integration von Sicherheitsgates in CI\/CD f\u00fcr KI: Datenvalidierung, Modelltests, Code-Reviews.<\/li>\n<li>Entwicklung in der Gruppe und Pr\u00e4sentation einer sicheren End-to-End-KI-Pipeline unter Verwendung der bereitgestellten VM-Sandbox.<\/li>\n<\/ul>\n\t\t\t\t\tPraktische KI-Sicherheitstechnik\t\t\t\t\n\t\t\t\t\t<ul>\n<li>FGSM, PGD, Poisoning, Backdoors: wie sie unter der Haube funktionieren.<\/li>\n<li>Verteidigungsmassnahmen wie gegnerisches Training, Eingabesanierung, Modellh\u00e4rtung.<\/li>\n<li>Messung der Robustheit: Abw\u00e4gung zwischen Genauigkeit und Robustheit, zertifizierte Schutzmassnahmen, Benchmarks.<\/li>\n<li>Red-Team\/Blue-Team-\u00dcbung: Angriff auf ein Modell, dann Implementierung und Test der Verteidigungsmassnahmen.<\/li>\n<\/ul>\n\t\t\t\t\tReaktion auf Zwischenf\u00e4lle und Forensik\t\t\t\t\n\t\t\t\t\t<ul>\n<li>Protokollierungsstrategien, Telemetrie f\u00fcr KI-Workloads, ML-gest\u00fctzte Anomalieerkennung.<\/li>\n<li>Erstellung von IR-Pl\u00e4nen f\u00fcr KI-Vorf\u00e4lle, Rollen\/Zust\u00e4ndigkeiten, Kommunikationsfl\u00fcsse.<\/li>\n<li>Sammeln und Aufbewahren von KI-Nachweisen: Modellartefakte, Protokolle, Speicherausz\u00fcge.<\/li>\n<li>Team-basierte \u00dcbung: Entdeckung einer Live-Kompromittierung, Eind\u00e4mmung und Erstellung eines forensischen Berichts.<\/li>\n<\/ul>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/icon-11.svg\" alt=\"icon (11)\" itemprop=\"image\" height=\"77\" width=\"77\" title=\"icon (11)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h3>\n\t\t\tVoraussetzungen\t<\/h3>\n\t<ul>\n<li data-start=\"116\" data-end=\"290\">\nVerst\u00e4ndnis grundlegender Sicherheitsgrunds\u00e4tze (Vertraulichkeit, Integrit\u00e4t, Verf\u00fcgbarkeit), g\u00e4ngiger Bedrohungen und Risikomanagementverfahren.\n<\/li>\n<li data-start=\"292\" data-end=\"464\">\nGrundlegende Kenntnisse dar\u00fcber, wie ML-Modelle trainiert, validiert und eingesetzt werden (z. B. \u00fcberwachtes Lernen, Modelllebenszyklus).\n<\/li>\n<li data-start=\"466\" data-end=\"612\">\nErfahrung im Umgang mit Linux-basierten Umgebungen, Befehlszeilenschnittstellen und virtuellen Maschinen.\n<\/li>\n<li data-start=\"614\" data-end=\"778\">\nPython-Kenntnisse werden empfohlen, insbesondere f\u00fcr die Interaktion mit ML-Bibliotheken (z. B. scikit-learn, PyTorch, TensorFlow).\n<\/li>\n<li data-start=\"780\" data-end=\"944\">\nKenntnisse \u00fcber Netzwerke, APIs, Cloud-basierte Bereitstellungen und Softwareentwicklungszyklen (SDLC).\n<\/li>\n<\/ul>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/icon-11.svg\" alt=\"icon (11)\" itemprop=\"image\" height=\"77\" width=\"77\" title=\"icon (11)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h3>\n\t\t\tZielgruppe\t<\/h3>\n\t<ul>\n<li data-start=\"55\" data-end=\"244\">\nSicherheitsingenieure, -analysten und -architekten, die ihr Fachwissen in den Bereichen KI-spezifische Bedrohungsmodellierung, sicheres Design und Verteidigungsstrategien erweitern m\u00f6chten.\n<\/li>\n<li data-start=\"246\" data-end=\"424\">\nEntwickler f\u00fcr maschinelles Lernen und Datenwissenschaftler, die die Sicherheitsrisiken und Abwehrmechanismen im Zusammenhang mit dem Einsatz von KI-Systemen verstehen m\u00fcssen.\n<\/li>\n<li data-start=\"426\" data-end=\"619\">\nSOC-Analysten und blaue Teams, die an der Erkennung, Untersuchung und Reaktion auf Sicherheitsvorf\u00e4lle mit KI-gest\u00fctzten Anwendungen beteiligt sind.\n<\/li>\n<li data-start=\"814\" data-end=\"988\">\nEntwickler von KI-Systemarchitekturen, die eine sichere Integration von Modellen, Datenpipelines und APIs \u00fcber den gesamten Lebenszyklus hinweg gew\u00e4hrleisten wollen.\n<\/li>\n<\/ul>\n\t<p>TRAININGSGEB\u00dcHR<\/p>\n<h2>\n\t\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/cart\/add_product\/3404142?price_id=4316052\" title=\"Preis: CHF 1&#039;590.-\"  target=\"_blank\"  rel=\"noopener\">\n\t\t\tPreis: CHF 1&#8217;590.- \t\t<\/a>\n\t<\/h2>\n\t<p>inkl. Materialien, Lizenzgeb\u00fchren und interne Pr\u00fcfungen.<\/p>\n\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/cart\/add_product\/3404142?price_id=4316052\">\n    JETZT REGISTRIEREN\n<\/a>\n\t<p>ZERTIFIKAT<\/p>\n\t<p>Nach Abschluss des Kurses stellt das Swiss Cyber Institute allen erfolgreichen Teilnehmern das Zertifikat <strong>&#8222;AI Security Engineer&#8220;<\/strong> in elektronischer Form zur Verf\u00fcgung.<\/p>\n\t<p>TEAM-SCHULUNG<\/p>\n\t<p>Wir konzipieren massgeschneiderte Teamtrainings f\u00fcr Ihr Unternehmen, um Ihr KI-Wissen innerhalb der Organisation zu st\u00e4rken. Wir sind hier, um Ihr Team auf die Zukunft vorzubereiten.<\/p>\n\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/team-training\/\">\n    MEHR ERFAHREN\n<\/a>\n<h2>\n\t\t\tBook a free Consultation Call\t<\/h2>\n\t<!-- Start of Meetings Embed Script --><!-- End of Meetings Embed Script ->\n<h1  data-animation-delay=\"0\" data-animation-duration=\"1\">\n\t\t\tAll our courses\t<\/h1>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" content=\"KI-Agenten\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" title=\"KI-Agenten\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Agents-Training-square-01010e9751f7ab6ca9a87477d0c4b2cb-.png\" alt=\"AI Agents Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Agents Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Agenten\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" content=\"KI-Sicherheit\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" title=\"KI-Sicherheit\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Security-Training-square-42ad92a734af3e39f321c1e02f2399a1-.png\" alt=\"AI Security Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Security Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Sicherheit\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" content=\"KI-Governance\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Governance-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" title=\"KI-Governance\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Governance-Training-square-6dff1bf2379d4107dc527486bc820ab2-.png\" alt=\"AI Governance Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Governance Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Governance\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" content=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2025-01-26\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/01\/download-1.jpg\" \/><meta itemprop=\"width\" content=\"1024\" \/><meta itemprop=\"height\" content=\"768\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" title=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/download-1-square-6fcb055d32b4910bdd3cc6033a98e67b-.jpg\" alt=\"Business AI Specliast with Federal Diploma\" itemprop=\"image\" data-no-lazy=\"1\" height=\"768\" width=\"1024\" title=\"download (1)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tAI Business Specialist mit eidgen\u00f6ssischem Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" content=\"Certified Security Professional\" \/><meta itemprop=\"datePublished\" content=\"2024-07-17\" \/><meta itemprop=\"dateModified\" content=\"2025-03-20\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/07\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" title=\"Certified Security Professional\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website-square-3f30d98bbf7bfb7f968a66fbf01d6dca-.png\" alt=\"Swiss Cyber Institute Certified Security Professional Course_website\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"Swiss Cyber Institute Certified Security Professional Course_website\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified Security Professional\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" content=\"KI-Prompt-Engineering\" \/><meta itemprop=\"datePublished\" content=\"2024-05-25\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI.png\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" title=\"KI-Prompt-Engineering\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-square-9977bd83db536ba946483a07d406130a-.png\" alt=\"AI Prompt Engineering\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"AI\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Prompt-Engineering\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy\/\" content=\"KI-Grundlagen\" \/><meta itemprop=\"datePublished\" content=\"2024-05-23\" \/><meta itemprop=\"dateModified\" content=\"2025-04-17\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI-Literacy-Main-Visual.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy-training\/\" title=\"KI-Grundlagen\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Literacy-Main-Visual-square-49a4a1c25a663cbe520dde57c67eda96-.png\" alt=\"AI Literacy Main Visual\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Literacy Main Visual\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Grundlagen\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" content=\"Certified in Cybersecurity\" \/><meta itemprop=\"datePublished\" content=\"2023-08-24\" \/><meta itemprop=\"dateModified\" content=\"2025-06-05\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/08\/CC.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" title=\"Certified in Cybersecurity\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/CC-square-a3de474585a112db06a1c8be10357ead-.png\" alt=\"CC\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"CC\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified in Cybersecurity\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" content=\"Cyber Security Specialist mit eidg. Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2021-09-28\" \/><meta itemprop=\"dateModified\" content=\"2025-05-16\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/harit\/\" \/><meta itemprop=\"name\" content=\"Harit Raval\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/07\/iStock-184313912-scaled-e1689433132557.jpg\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" title=\"Cyber Security Specialist mit eidg. Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/iStock-184313912-scaled-e1689433132557-square-62f38e3c5cc0786d8c5841d76f3fed09-.jpg\" alt=\"Businessman examining cube at desk in office\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"Businessman examining cube at desk in office\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCyber Security Specialist mit eidg. Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t\t<!-- .pp-content-posts -->\n\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/collections\/courses\">\n    DISCOVER NOW\n<\/a>\n<h1  data-animation-delay=\"0\" data-animation-duration=\"1\">\n\t\t\tAll our courses\t<\/h1>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" content=\"KI-Agenten\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" title=\"KI-Agenten\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Agents-Training-square-01010e9751f7ab6ca9a87477d0c4b2cb-.png\" alt=\"AI Agents Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Agents Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Agenten\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" content=\"KI-Sicherheit\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" title=\"KI-Sicherheit\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Security-Training-square-42ad92a734af3e39f321c1e02f2399a1-.png\" alt=\"AI Security Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Security Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Sicherheit\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" content=\"KI-Governance\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Governance-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" title=\"KI-Governance\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Governance-Training-square-6dff1bf2379d4107dc527486bc820ab2-.png\" alt=\"AI Governance Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Governance Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Governance\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" content=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2025-01-26\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/01\/download-1.jpg\" \/><meta itemprop=\"width\" content=\"1024\" \/><meta itemprop=\"height\" content=\"768\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" title=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/download-1-square-6fcb055d32b4910bdd3cc6033a98e67b-.jpg\" alt=\"Business AI Specliast with Federal Diploma\" itemprop=\"image\" data-no-lazy=\"1\" height=\"768\" width=\"1024\" title=\"download (1)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tAI Business Specialist mit eidgen\u00f6ssischem Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" content=\"Certified Security Professional\" \/><meta itemprop=\"datePublished\" content=\"2024-07-17\" \/><meta itemprop=\"dateModified\" content=\"2025-03-20\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/07\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" title=\"Certified Security Professional\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website-square-3f30d98bbf7bfb7f968a66fbf01d6dca-.png\" alt=\"Swiss Cyber Institute Certified Security Professional Course_website\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"Swiss Cyber Institute Certified Security Professional Course_website\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified Security Professional\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" content=\"KI-Prompt-Engineering\" \/><meta itemprop=\"datePublished\" content=\"2024-05-25\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI.png\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" title=\"KI-Prompt-Engineering\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-square-9977bd83db536ba946483a07d406130a-.png\" alt=\"AI Prompt Engineering\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"AI\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Prompt-Engineering\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy\/\" content=\"KI-Grundlagen\" \/><meta itemprop=\"datePublished\" content=\"2024-05-23\" \/><meta itemprop=\"dateModified\" content=\"2025-04-17\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI-Literacy-Main-Visual.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy-training\/\" title=\"KI-Grundlagen\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Literacy-Main-Visual-square-49a4a1c25a663cbe520dde57c67eda96-.png\" alt=\"AI Literacy Main Visual\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Literacy Main Visual\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Grundlagen\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" content=\"Certified in Cybersecurity\" \/><meta itemprop=\"datePublished\" content=\"2023-08-24\" \/><meta itemprop=\"dateModified\" content=\"2025-06-05\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/08\/CC.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" title=\"Certified in Cybersecurity\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/CC-square-a3de474585a112db06a1c8be10357ead-.png\" alt=\"CC\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"CC\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified in Cybersecurity\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" content=\"Cyber Security Specialist mit eidg. Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2021-09-28\" \/><meta itemprop=\"dateModified\" content=\"2025-05-16\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/harit\/\" \/><meta itemprop=\"name\" content=\"Harit Raval\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/07\/iStock-184313912-scaled-e1689433132557.jpg\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" title=\"Cyber Security Specialist mit eidg. Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/iStock-184313912-scaled-e1689433132557-square-62f38e3c5cc0786d8c5841d76f3fed09-.jpg\" alt=\"Businessman examining cube at desk in office\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"Businessman examining cube at desk in office\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCyber Security Specialist mit eidg. Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t\t<!-- .pp-content-posts -->\n\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/collections\/courses\">\n    DISCOVER NOW\n<\/a>\n<h2>\n\t\t\tSubscribe for updates\t<\/h2>\n\t<p>We share the most important cyber security news. Stay informed for free and stay cyber secure.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>KI-Sicherheitsschulung Dieser Kurs f\u00fcr Fortgeschrittene vermittelt Cybersicherheitsexperten und KI\/ML-Ingenieuren praktische F\u00e4higkeiten zur Sicherung von KI-Systemen w\u00e4hrend ihres gesamten Lebenszyklus. Durch&#8230;<\/p>\n","protected":false},"author":189,"featured_media":27768,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-27975","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>KI-Sicherheit - Swiss Cyber Institute<\/title>\n<meta name=\"description\" content=\"Lernen Sie, wie Sie KI-Systeme mit Hilfe von Bedrohungsmodellen, sicherem Design, gegnerischen Verteidigungsmassnahmen und Forensik absichern k\u00f6nnen, abgestimmt auf globale Sicherheitsstandards.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KI-Sicherheit\" \/>\n<meta property=\"og:description\" content=\"Lernen Sie, wie Sie KI-Systeme mit Hilfe von Bedrohungsmodellen, sicherem Design, gegnerischen Verteidigungsmassnahmen und Forensik absichern k\u00f6nnen, abgestimmt auf globale Sicherheitsstandards.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" \/>\n<meta property=\"og:site_name\" content=\"Swiss Cyber Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/swisscyberinstitute\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-11T08:59:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1414\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swisscyberinst\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/\",\"name\":\"KI-Sicherheit - Swiss Cyber Institute\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AI-Security-Training.png\",\"datePublished\":\"2025-05-30T11:57:04+00:00\",\"dateModified\":\"2025-06-11T08:59:53+00:00\",\"description\":\"Lernen Sie, wie Sie KI-Systeme mit Hilfe von Bedrohungsmodellen, sicherem Design, gegnerischen Verteidigungsmassnahmen und Forensik absichern k\u00f6nnen, abgestimmt auf globale Sicherheitsstandards.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AI-Security-Training.png\",\"contentUrl\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AI-Security-Training.png\",\"width\":1414,\"height\":2000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-sicherheit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KI-Sicherheit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/\",\"name\":\"Swiss Cyber Institute\",\"description\":\"Cybersecurity and AI education center\",\"publisher\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#organization\",\"name\":\"Swiss Cyber Institute\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Favicon-PNG.png\",\"contentUrl\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Favicon-PNG.png\",\"width\":500,\"height\":500,\"caption\":\"Swiss Cyber Institute\"},\"image\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/swisscyberinstitute\\\/\",\"https:\\\/\\\/x.com\\\/swisscyberinst\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"KI-Sicherheit - Swiss Cyber Institute","description":"Lernen Sie, wie Sie KI-Systeme mit Hilfe von Bedrohungsmodellen, sicherem Design, gegnerischen Verteidigungsmassnahmen und Forensik absichern k\u00f6nnen, abgestimmt auf globale Sicherheitsstandards.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/","og_locale":"de_DE","og_type":"article","og_title":"KI-Sicherheit","og_description":"Lernen Sie, wie Sie KI-Systeme mit Hilfe von Bedrohungsmodellen, sicherem Design, gegnerischen Verteidigungsmassnahmen und Forensik absichern k\u00f6nnen, abgestimmt auf globale Sicherheitsstandards.","og_url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/","og_site_name":"Swiss Cyber Institute","article_publisher":"https:\/\/www.facebook.com\/swisscyberinstitute\/","article_modified_time":"2025-06-11T08:59:53+00:00","og_image":[{"width":1414,"height":2000,"url":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swisscyberinst","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/","name":"KI-Sicherheit - Swiss Cyber Institute","isPartOf":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/#primaryimage"},"image":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/#primaryimage"},"thumbnailUrl":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png","datePublished":"2025-05-30T11:57:04+00:00","dateModified":"2025-06-11T08:59:53+00:00","description":"Lernen Sie, wie Sie KI-Systeme mit Hilfe von Bedrohungsmodellen, sicherem Design, gegnerischen Verteidigungsmassnahmen und Forensik absichern k\u00f6nnen, abgestimmt auf globale Sicherheitsstandards.","breadcrumb":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/#primaryimage","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png","contentUrl":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png","width":1414,"height":2000},{"@type":"BreadcrumbList","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/"},{"@type":"ListItem","position":2,"name":"KI-Sicherheit"}]},{"@type":"WebSite","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#website","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/","name":"Swiss Cyber Institute","description":"Cybersecurity and AI education center","publisher":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#organization","name":"Swiss Cyber Institute","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#\/schema\/logo\/image\/","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2020\/01\/Favicon-PNG.png","contentUrl":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2020\/01\/Favicon-PNG.png","width":500,"height":500,"caption":"Swiss Cyber Institute"},"image":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/swisscyberinstitute\/","https:\/\/x.com\/swisscyberinst"]}]}},"_links":{"self":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/pages\/27975","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/comments?post=27975"}],"version-history":[{"count":0,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/pages\/27975\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/media\/27768"}],"wp:attachment":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/media?parent=27975"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}