{"id":27977,"date":"2025-05-30T14:55:33","date_gmt":"2025-05-30T12:55:33","guid":{"rendered":"https:\/\/scf-5-sci-2025.hipdev.pro\/ki-agenten\/"},"modified":"2025-07-07T16:16:35","modified_gmt":"2025-07-07T14:16:35","slug":"ki-agenten","status":"publish","type":"page","link":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/","title":{"rendered":"KI-Agenten"},"content":{"rendered":"\n<h2>\n\t\t\tKI-Agenten-Schulung\t<\/h2>\n\t<p>Dieser Kurs vermittelt nicht-technischen Fachleuten das praktische Know-how, um fortschrittliche KI-Agenten zu entwerfen, zu erstellen und einzusetzen. Beherrschen Sie Plattformen wie Power Automate Desktop, Zapier, Landbot und n8n und lernen Sie, OpenAI f\u00fcr intelligente Automatisierung zu integrieren. Ganz gleich, ob Sie Aufgaben automatisieren, komplexe Workflows orchestrieren oder intelligente Konversationsagenten erstellen m\u00f6chten, dieser Kurs macht es Ihnen leicht und effektiv.<\/p>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/001-high.svg\" alt=\"001-high\" itemprop=\"image\" height=\"54\" width=\"54\" title=\"001-high\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tF\u00fcr Fortgeschrittene\t<\/h2>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/003-professional.svg\" alt=\"003-professional\" itemprop=\"image\" height=\"54\" width=\"54\" title=\"003-professional\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tSpezialisiertes Wissen\t<\/h2>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/038-Global-Language.svg\" alt=\"038---Global-Language\" itemprop=\"image\" height=\"54\" width=\"54\" title=\"038---Global-Language\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tAuf<br \/> Englisch\t<\/h2>\n    <a target=\"_blank\" href=\"https:\/\/campus.swisscyberinstitute.com\/cart\/add_product\/3404221?price_id=4316138\">\n JETZT KAUFEN &#8211; CHF 1&#8217;590.-\n    <\/a>\n    <a target=\"_blank\" href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/ai-agents\/brochure\/\">\n            Brosch\u00fcre herunterladen\n    <\/a>\n\t<p>N\u00e4chster Starttermin<\/p>\n\t<p>25. November 2025<\/p>\n\t<p>Online-Schulung unter Anleitung<\/p>\n\t<p>4 Wochen Ausbildung | 4 Stunden pro Woche | 16 Stunden insgesamt | dienstags von 16:00 bis 20:00<\/p>\n\t<p><strong>Preis des Kurses<\/strong>: CHF 1&#8217;590 inkl. Materialien, Lizenzgeb\u00fchren und interne Pr\u00fcfungsschulungen.<\/p>\n<p>Nach Abschluss des Kurses stellt das Swiss Cyber Institute allen erfolgreichen Teilnehmern das Zertifikat <strong>&#8222;AI Agents Expert&#8220; <\/strong>in elektronischer Form zur Verf\u00fcgung.<\/p>\n<p><strong>Beginnen Sie mit dem Bau von Ihren eigenen KI-Agenten!<\/strong><\/p>\n<h2>\n\t\t\tInfo Session<br \/>Online.<br \/>Onsite.\t<\/h2>\n\t\t\t\t<h4>jeden Donnerstag<\/h4><p>12:30 &#8211; 13:00<\/p>\n<p>Online \u00fcber Zoom<\/p>\n\t\t\t<a href=\"https:\/\/us02web.zoom.us\/webinar\/register\/7117248481327\/WN_lHwVUDmGQFKX2lZqmxG1XQ\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tRegistrieren\n\t\t\t\t\t<\/a>\n\t\t\t\t<h4>26 June 2025<\/h4><p>18:00 &#8211; 20:00<\/p>\n<p>Swiss Cyber Institute B\u00fcro<\/p>\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/ai-education-information-event\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tRegistrieren\n\t\t\t\t\t<\/a>\n\t\t\t\t<a href=\"#\" aria-label=\"previous\" role=\"button\">\n<\/a>\n\t\t\t\t<a href=\"#\" aria-label=\"next\" role=\"button\">\n<\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png\" alt=\"AI Agents Training\" itemprop=\"image\" height=\"2000\" width=\"1414\" title=\"AI Agents Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h2>\n\t\t\tKursziele\t<\/h2>\n\t<p>Am Ende des Kurses werden Sie in der Lage sein:<\/p>\n<ul>\n<li>Die Konfiguration von Ausl\u00f6sern, Aktionen und Bedingungen in Power Automate Desktop <strong>beherrschen<\/strong>, einschliesslich der Parametrisierung von Variablen und der Handhabung dynamischer Dateipfade.<\/li>\n<li>Mindestens f\u00fcnf verschiedene Benutzerintentionen und entsprechende Entit\u00e4ten <strong>definieren<\/strong> und kennzeichnen und Slot-Filling-Routinen erstellen, um fehlende Informationen in Gespr\u00e4chsabl\u00e4ufen zu erfassen.<\/li>\n<li>eine dreistufige Orchestrierung in n8n zu<strong> entwickeln und zu debuggen<\/strong>, die Function- und SplitInBatches-Knoten enth\u00e4lt, um JSON-Nutzdaten zu transformieren und Massendatens\u00e4tze zu verarbeiten.<\/li>\n<li>anwendungs\u00fcbergreifende \u201eZaps&#8220; in Zapier AI <strong>entwerfen und implementieren<\/strong>, die Filter, Verz\u00f6gerungen und Fehlerbehandlungsschritte enthalten, um einen zuverl\u00e4ssigen Datenfluss zu gew\u00e4hrleisten.<\/li>\n<li>adaptive Dialogb\u00e4ume in Landbot <strong>konstruieren<\/strong>, die bedingte Verzweigungen und Benutzer-Metadaten nutzen, um Antworten zu personalisieren.<\/li>\n<li>OpenAI-Funktionsaufrufe in den Google Vertex AI Agent Builder<strong> integrieren<\/strong>, um PDF-Ingestion, Feldextraktion per OCR und automatische Zusammenfassungen durchzuf\u00fchren und anschlie\u00dfend Latenz- und Genauigkeitsmetriken zu quantifizieren.<\/li>\n<\/ul>\n\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/meet-with-rob-glueckselig\/\">\n            Sprechen Sie mit unserem Berater\n    <\/a>\n<h2>\n\t\t\tStudieninhalt\t<\/h2>\n<h3>\n\t\t\tInteraktives Live-Lernen, angeleitet von internationalen KI-Experten und Forschern, mit praktischen \u00dcbungen.\t<\/h3>\n\t<p>Der Kursinhalt basiert auf branchenf\u00fchrenden Best Practices f\u00fcr KI-Automatisierung und Workflow-Design und konzentriert sich auf praktische Frameworks und Tools wie Power Automate Desktop, Zapier AI und Google Vertex AI Agent Builder.<\/p>\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/ai-agents\/brochure\/\" target=\"_blank\" rel=\"noopener\">\n\t\t\t\t\t\t\tBrosch\u00fcre herunterladen\n\t\t\t\t\t<\/a>\n\t\t\t\t\tGrundlagen der KI-Agenten\t\t\t\t\n\t\t\t\t\t<ul>\n<li>Identifizierung von Ausl\u00f6sern, Aktionen und Bedingungen<\/li>\n<li>Navigation auf dem Power Automate Desktop<\/li>\n<li>Aufzeichnung und Wiederholung von Desktop-Aufgaben<\/li>\n<li>Erstellung eines Zapier AI &#8222;Zap&#8220;<\/li>\n<li>Abbildung manueller Arbeitsabl\u00e4ufe auf Low-Code-Agenten<\/li>\n<\/ul>\n\t\t\t\t\tKonversations-Agenten\t\t\t\t\n\t\t\t\t\t<ul>\n<li>Definition von Absichten, Einheiten und Antwortvorlagen<\/li>\n<li>Gestaltung einer Gespr\u00e4chskarte<\/li>\n<li>Bauen &amp; Testen im Landbot-Canvas<\/li>\n<li>Konfigurierung von Rich-Antworten in Chatfuel<\/li>\n<li>Analyse von Bot-Protokollen f\u00fcr Verbesserungen<\/li>\n<\/ul>\n\t\t\t\t\tAgenten f\u00fcr die Aufgaben-Orchestrierung\t\t\t\t\n\t\t\t\t\t<ul>\n<li>Abbildung von mehrstufigen Prozessen<\/li>\n<li>Verkn\u00fcpfung &#8222;Formular \u2192 E-Mail \u2192 Tabellenkalkulation in Zapier AI&#8220;<\/li>\n<li>Verwendung von n8n-Knoten zum Abrufen, Umwandeln und Ver\u00f6ffentlichen von Daten<\/li>\n<li>Einbettung bedingter Logik in visuelle Pipelines<\/li>\n<li>Fehlerbehebung und \u00dcberwachung von Protokollen<\/li>\n<\/ul>\n\t\t\t\t\tErweiterte No-Code-Agent-Integrationen\t\t\t\t\n\t\t\t\t\t<ul>\n<li>Vergleich der Google Vertex AI Agent Builder-Vorlagen<\/li>\n<li>Konfigurieren von Unternehmensdatenquellen und Autorisierung<\/li>\n<li>Einbindung von OpenAI-Funktionsaufrufen \u00fcber no-code<\/li>\n<li>Erstellung eines PDF-Analyse-Agenten<\/li>\n<li>Pr\u00e4sentation von Leistungskennzahlen und Iterationsplan<\/li>\n<\/ul>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/icon-11.svg\" alt=\"icon (11)\" itemprop=\"image\" height=\"77\" width=\"77\" title=\"icon (11)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h3>\n\t\t\tVoraussetzungen\t<\/h3>\n\t<ul>\n<li>Kenntnisse im Umgang mit einem Windows-PC und Grundlagen der macOS\/Windows-Benutzeroberfl\u00e4che (f\u00fcr Power Automate Desktop).<\/li>\n<li>Vertrautheit mit Webanwendungen und g\u00e4ngigen SaaS-Tools (z. B. E-Mail, Tabellenkalkulationen, Cloud-Speicher).<\/li>\n<li>Grundlegendes Verst\u00e4ndnis von Gesch\u00e4ftsprozessen und Workflow-Logik (z. B. \u201eWenn-dann&#8220;-Entscheidungsstrukturen).<\/li>\n<li>Vertrautheit mit der Erstellung und Verwaltung von Benutzerkonten in SaaS-Plattformen (Zapier, Landbot, Chatfuel, n8n, Google Cloud).<\/li>\n<li>Ein g\u00fcltiger OpenAI-API-Schl\u00fcssel und die Bereitschaft, sich mit einfachen API-Integrationen \u00fcber No-Code-Plugins zu besch\u00e4ftigen.<\/li>\n<\/ul>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/\/2021\/09\/icon-11.svg\" alt=\"icon (11)\" itemprop=\"image\" height=\"77\" width=\"77\" title=\"icon (11)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n<h3>\n\t\t\tZielgruppe\t<\/h3>\n\t<ul>\n<li>Unternehmensanalysten und Betriebsleiter, die Routineaufgaben automatisieren m\u00f6chten.<\/li>\n<li>Citizen-Entwickler, die f\u00fcr interne Tools und Prozessoptimierung zust\u00e4ndig sind.<\/li>\n<li>Kundenbetreuer, die Chatbots einsetzen wollen, um das Engagement zu verbessern.<\/li>\n<li>Projektleiter, die die Integration mehrerer Systeme und Arbeitsabl\u00e4ufe koordinieren.<\/li>\n<li>Wissensarbeiter im Finanz-, Personal- oder Rechtswesen, die aus Dokumenten Erkenntnisse gewinnen wollen.<\/li>\n<\/ul>\n\t<p>TRAININGSGEB\u00dcHR<\/p>\n<h2>\n\t\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/cart\/add_product\/3404221?price_id=4316138\" title=\"Preis: CHF 1&#039;590.-\"  target=\"_blank\"  rel=\"noopener\">\n\t\t\tPreis: CHF 1&#8217;590.- \t\t<\/a>\n\t<\/h2>\n\t<p>inkl. Materialien, Lizenzgeb\u00fchren, interne Pr\u00fcfungsausbildung<\/p>\n\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/cart\/add_product\/3404221?price_id=4316138\">\n    JETZT REGISTRIEREN\n<\/a>\n\t<p>ZERTIFIKAT<\/p>\n\t<p>Nach Abschluss des Kurses stellt das Swiss Cyber Institute allen erfolgreichen Teilnehmern das Zertifikat <strong>&#8222;AI Agents Expert&#8220; <\/strong>in elektronischer Form zur Verf\u00fcgung.<\/p>\n\t<p>TEAM-SCHULUNG<\/p>\n\t<p>Wir konzipieren massgeschneiderte Teamtrainings f\u00fcr Ihr Unternehmen, um Ihr KI-Wissen innerhalb der Organisation zu st\u00e4rken. Wir sind hier, um Ihr Team auf die Zukunft vorzubereiten.<\/p>\n\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/team-training\/\">\n    MEHR ERFAHREN\n<\/a>\n<h2>\n\t\t\tBook a free Consultation Call\t<\/h2>\n\t<!-- Start of Meetings Embed Script --><!-- End of Meetings Embed Script ->\n<h1  data-animation-delay=\"0\" data-animation-duration=\"1\">\n\t\t\tAll our courses\t<\/h1>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" content=\"KI-Agenten\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" title=\"KI-Agenten\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Agents-Training-square-01010e9751f7ab6ca9a87477d0c4b2cb-.png\" alt=\"AI Agents Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Agents Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Agenten\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" content=\"KI-Sicherheit\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" title=\"KI-Sicherheit\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Security-Training-square-42ad92a734af3e39f321c1e02f2399a1-.png\" alt=\"AI Security Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Security Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Sicherheit\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" content=\"KI-Governance\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Governance-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" title=\"KI-Governance\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Governance-Training-square-6dff1bf2379d4107dc527486bc820ab2-.png\" alt=\"AI Governance Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Governance Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Governance\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" content=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2025-01-26\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/01\/download-1.jpg\" \/><meta itemprop=\"width\" content=\"1024\" \/><meta itemprop=\"height\" content=\"768\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" title=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/download-1-square-6fcb055d32b4910bdd3cc6033a98e67b-.jpg\" alt=\"Business AI Specliast with Federal Diploma\" itemprop=\"image\" data-no-lazy=\"1\" height=\"768\" width=\"1024\" title=\"download (1)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tAI Business Specialist mit eidgen\u00f6ssischem Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" content=\"Certified Security Professional\" \/><meta itemprop=\"datePublished\" content=\"2024-07-17\" \/><meta itemprop=\"dateModified\" content=\"2025-03-20\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/07\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" title=\"Certified Security Professional\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website-square-3f30d98bbf7bfb7f968a66fbf01d6dca-.png\" alt=\"Swiss Cyber Institute Certified Security Professional Course_website\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"Swiss Cyber Institute Certified Security Professional Course_website\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified Security Professional\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" content=\"KI-Prompt-Engineering\" \/><meta itemprop=\"datePublished\" content=\"2024-05-25\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI.png\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" title=\"KI-Prompt-Engineering\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-square-9977bd83db536ba946483a07d406130a-.png\" alt=\"AI Prompt Engineering\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"AI\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Prompt-Engineering\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy\/\" content=\"KI-Grundlagen\" \/><meta itemprop=\"datePublished\" content=\"2024-05-23\" \/><meta itemprop=\"dateModified\" content=\"2025-04-17\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI-Literacy-Main-Visual.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy-training\/\" title=\"KI-Grundlagen\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Literacy-Main-Visual-square-49a4a1c25a663cbe520dde57c67eda96-.png\" alt=\"AI Literacy Main Visual\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Literacy Main Visual\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Grundlagen\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" content=\"Certified in Cybersecurity\" \/><meta itemprop=\"datePublished\" content=\"2023-08-24\" \/><meta itemprop=\"dateModified\" content=\"2025-06-05\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/08\/CC.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" title=\"Certified in Cybersecurity\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/CC-square-a3de474585a112db06a1c8be10357ead-.png\" alt=\"CC\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"CC\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified in Cybersecurity\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" content=\"Cyber Security Specialist mit eidg. Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2021-09-28\" \/><meta itemprop=\"dateModified\" content=\"2025-05-16\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/harit\/\" \/><meta itemprop=\"name\" content=\"Harit Raval\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/07\/iStock-184313912-scaled-e1689433132557.jpg\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" title=\"Cyber Security Specialist mit eidg. Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/iStock-184313912-scaled-e1689433132557-square-62f38e3c5cc0786d8c5841d76f3fed09-.jpg\" alt=\"Businessman examining cube at desk in office\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"Businessman examining cube at desk in office\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCyber Security Specialist mit eidg. Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t\t<!-- .pp-content-posts -->\n\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/collections\/courses\">\n    DISCOVER NOW\n<\/a>\n<h1  data-animation-delay=\"0\" data-animation-duration=\"1\">\n\t\t\tAll our courses\t<\/h1>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" content=\"KI-Agenten\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" title=\"KI-Agenten\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Agents-Training-square-01010e9751f7ab6ca9a87477d0c4b2cb-.png\" alt=\"AI Agents Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Agents Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Agenten\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" content=\"KI-Sicherheit\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Security-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-sicherheit\/\" title=\"KI-Sicherheit\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Security-Training-square-42ad92a734af3e39f321c1e02f2399a1-.png\" alt=\"AI Security Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Security Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Sicherheit\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" content=\"KI-Governance\" \/><meta itemprop=\"datePublished\" content=\"2025-05-30\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Governance-Training.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-governance\/\" title=\"KI-Governance\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Governance-Training-square-6dff1bf2379d4107dc527486bc820ab2-.png\" alt=\"AI Governance Training\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Governance Training\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Governance\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" content=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2025-01-26\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/01\/download-1.jpg\" \/><meta itemprop=\"width\" content=\"1024\" \/><meta itemprop=\"height\" content=\"768\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/business-ai-specialist-mit-eidgenoessischem-fachausweis\/\" title=\"AI Business Specialist mit eidgen\u00f6ssischem Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/download-1-square-6fcb055d32b4910bdd3cc6033a98e67b-.jpg\" alt=\"Business AI Specliast with Federal Diploma\" itemprop=\"image\" data-no-lazy=\"1\" height=\"768\" width=\"1024\" title=\"download (1)\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tAI Business Specialist mit eidgen\u00f6ssischem Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" content=\"Certified Security Professional\" \/><meta itemprop=\"datePublished\" content=\"2024-07-17\" \/><meta itemprop=\"dateModified\" content=\"2025-03-20\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/07\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-security-professional\/\" title=\"Certified Security Professional\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/Swiss-Cyber-Institute-Certified-Security-Professional-Course_website-square-3f30d98bbf7bfb7f968a66fbf01d6dca-.png\" alt=\"Swiss Cyber Institute Certified Security Professional Course_website\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"Swiss Cyber Institute Certified Security Professional Course_website\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified Security Professional\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" content=\"KI-Prompt-Engineering\" \/><meta itemprop=\"datePublished\" content=\"2024-05-25\" \/><meta itemprop=\"dateModified\" content=\"2025-06-11\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI.png\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-prompt-engineering\/\" title=\"KI-Prompt-Engineering\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-square-9977bd83db536ba946483a07d406130a-.png\" alt=\"AI Prompt Engineering\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"AI\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Prompt-Engineering\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy\/\" content=\"KI-Grundlagen\" \/><meta itemprop=\"datePublished\" content=\"2024-05-23\" \/><meta itemprop=\"dateModified\" content=\"2025-04-17\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2024\/05\/AI-Literacy-Main-Visual.png\" \/><meta itemprop=\"width\" content=\"1414\" \/><meta itemprop=\"height\" content=\"2000\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ai-literacy-training\/\" title=\"KI-Grundlagen\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/AI-Literacy-Main-Visual-square-49a4a1c25a663cbe520dde57c67eda96-.png\" alt=\"AI Literacy Main Visual\" itemprop=\"image\" data-no-lazy=\"1\" height=\"2000\" width=\"1414\" title=\"AI Literacy Main Visual\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tKI-Grundlagen\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" content=\"Certified in Cybersecurity\" \/><meta itemprop=\"datePublished\" content=\"2023-08-24\" \/><meta itemprop=\"dateModified\" content=\"2025-06-05\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/anastasiia-vollmar\/\" \/><meta itemprop=\"name\" content=\"Anastasiia\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/08\/CC.png\" \/><meta itemprop=\"width\" content=\"1460\" \/><meta itemprop=\"height\" content=\"974\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/certified-in-cybersecurity-training\/\" title=\"Certified in Cybersecurity\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/CC-square-a3de474585a112db06a1c8be10357ead-.png\" alt=\"CC\" itemprop=\"image\" data-no-lazy=\"1\" height=\"974\" width=\"1460\" title=\"CC\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCertified in Cybersecurity\t\t\t\t\t\t\t<\/h3>\n\t<meta itemscope itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/WebPage\" itemid=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" content=\"Cyber Security Specialist mit eidg. Fachausweis\" \/><meta itemprop=\"datePublished\" content=\"2021-09-28\" \/><meta itemprop=\"dateModified\" content=\"2025-05-16\" \/><meta itemprop=\"name\" content=\"Swiss Cyber Institute\"\/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/blog\/author\/harit\/\" \/><meta itemprop=\"name\" content=\"Harit Raval\" \/><meta itemprop=\"url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2023\/07\/iStock-184313912-scaled-e1689433132557.jpg\" \/><meta itemprop=\"width\" content=\"1440\" \/><meta itemprop=\"height\" content=\"1708\" \/><meta itemprop=\"interactionType\" content=\"https:\/\/schema.org\/CommentAction\" \/><meta itemprop=\"userInteractionCount\" content=\"0\" \/>\t\n\t\t\t<a href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/cyber-security-specialist\/\" title=\"Cyber Security Specialist mit eidg. Fachausweis\"><\/a>\n\t\t\t\t<img decoding=\"async\" src=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/bb-plugin\/cache\/iStock-184313912-scaled-e1689433132557-square-62f38e3c5cc0786d8c5841d76f3fed09-.jpg\" alt=\"Businessman examining cube at desk in office\" itemprop=\"image\" data-no-lazy=\"1\" height=\"1708\" width=\"1440\" title=\"Businessman examining cube at desk in office\" onerror=\"this.style.display='none'\" loading='lazy' \/>\n\t\t\t\t\t<h3 itemprop=\"headline\">\n\t\t\t\t\t\t\t\t\t\tCyber Security Specialist mit eidg. Fachausweis\t\t\t\t\t\t\t<\/h3>\n\t\t<!-- .pp-content-posts -->\n\t<a href=\"https:\/\/campus.swisscyberinstitute.com\/collections\/courses\">\n    DISCOVER NOW\n<\/a>\n<h2>\n\t\t\tSubscribe for updates\t<\/h2>\n\t<p>We share the most important cyber security news. Stay informed for free and stay cyber secure.<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>KI-Agenten-Schulung Dieser Kurs vermittelt nicht-technischen Fachleuten das praktische Know-how, um fortschrittliche KI-Agenten zu entwerfen, zu erstellen und einzusetzen. Beherrschen Sie&#8230;<\/p>\n","protected":false},"author":189,"featured_media":27789,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"content-type":"","inline_featured_image":false,"footnotes":""},"class_list":["post-27977","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>KI-Agenten - Swiss Cyber Institute<\/title>\n<meta name=\"description\" content=\"Lernen Sie in diesem praktischen Kurs, wie Sie KI-Agenten mithilfe von No-Code-Tools wie Zapier, Landbot und n8n entwickeln.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"KI-Agenten\" \/>\n<meta property=\"og:description\" content=\"Lernen Sie in diesem praktischen Kurs, wie Sie KI-Agenten mithilfe von No-Code-Tools wie Zapier, Landbot und n8n entwickeln.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/\" \/>\n<meta property=\"og:site_name\" content=\"Swiss Cyber Institute\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/swisscyberinstitute\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-07T14:16:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1414\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@swisscyberinst\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/\",\"name\":\"KI-Agenten - Swiss Cyber Institute\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AI-Agents-Training.png\",\"datePublished\":\"2025-05-30T12:55:33+00:00\",\"dateModified\":\"2025-07-07T14:16:35+00:00\",\"description\":\"Lernen Sie in diesem praktischen Kurs, wie Sie KI-Agenten mithilfe von No-Code-Tools wie Zapier, Landbot und n8n entwickeln.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/#primaryimage\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AI-Agents-Training.png\",\"contentUrl\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/AI-Agents-Training.png\",\"width\":1414,\"height\":2000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/ki-agenten\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"KI-Agenten\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/\",\"name\":\"Swiss Cyber Institute\",\"description\":\"Cybersecurity and AI education center\",\"publisher\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#organization\",\"name\":\"Swiss Cyber Institute\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Favicon-PNG.png\",\"contentUrl\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/wp-content\\\/uploads\\\/2020\\\/01\\\/Favicon-PNG.png\",\"width\":500,\"height\":500,\"caption\":\"Swiss Cyber Institute\"},\"image\":{\"@id\":\"https:\\\/\\\/scf-5-sci-2025.hipdev.pro\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/swisscyberinstitute\\\/\",\"https:\\\/\\\/x.com\\\/swisscyberinst\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"KI-Agenten - Swiss Cyber Institute","description":"Lernen Sie in diesem praktischen Kurs, wie Sie KI-Agenten mithilfe von No-Code-Tools wie Zapier, Landbot und n8n entwickeln.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/","og_locale":"de_DE","og_type":"article","og_title":"KI-Agenten","og_description":"Lernen Sie in diesem praktischen Kurs, wie Sie KI-Agenten mithilfe von No-Code-Tools wie Zapier, Landbot und n8n entwickeln.","og_url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/","og_site_name":"Swiss Cyber Institute","article_publisher":"https:\/\/www.facebook.com\/swisscyberinstitute\/","article_modified_time":"2025-07-07T14:16:35+00:00","og_image":[{"width":1414,"height":2000,"url":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@swisscyberinst","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/","name":"KI-Agenten - Swiss Cyber Institute","isPartOf":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/#primaryimage"},"image":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/#primaryimage"},"thumbnailUrl":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png","datePublished":"2025-05-30T12:55:33+00:00","dateModified":"2025-07-07T14:16:35+00:00","description":"Lernen Sie in diesem praktischen Kurs, wie Sie KI-Agenten mithilfe von No-Code-Tools wie Zapier, Landbot und n8n entwickeln.","breadcrumb":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/#primaryimage","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png","contentUrl":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2025\/05\/AI-Agents-Training.png","width":1414,"height":2000},{"@type":"BreadcrumbList","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/ki-agenten\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/"},{"@type":"ListItem","position":2,"name":"KI-Agenten"}]},{"@type":"WebSite","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#website","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/","name":"Swiss Cyber Institute","description":"Cybersecurity and AI education center","publisher":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#organization","name":"Swiss Cyber Institute","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#\/schema\/logo\/image\/","url":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2020\/01\/Favicon-PNG.png","contentUrl":"https:\/\/scf-5-sci-2025.hipdev.pro\/wp-content\/uploads\/2020\/01\/Favicon-PNG.png","width":500,"height":500,"caption":"Swiss Cyber Institute"},"image":{"@id":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/swisscyberinstitute\/","https:\/\/x.com\/swisscyberinst"]}]}},"_links":{"self":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/pages\/27977","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/users\/189"}],"replies":[{"embeddable":true,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/comments?post=27977"}],"version-history":[{"count":0,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/pages\/27977\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/media\/27789"}],"wp:attachment":[{"href":"https:\/\/scf-5-sci-2025.hipdev.pro\/de\/wp-json\/wp\/v2\/media?parent=27977"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}