{"id":2745,"date":"2023-11-27T10:35:52","date_gmt":"2023-11-27T10:35:52","guid":{"rendered":"https:\/\/cyberrange.at\/uncategorized-en\/wins-schulungskurs-uber-cybersicherheit-fur-kerntechnische-anlagen\/"},"modified":"2026-03-09T12:25:24","modified_gmt":"2026-03-09T12:25:24","slug":"wins-schulungskurs-uber-cybersicherheit-fur-kerntechnische-anlagen","status":"publish","type":"post","link":"https:\/\/cyberrange.at\/de\/unkategorisiert\/wins-schulungskurs-uber-cybersicherheit-fur-kerntechnische-anlagen\/","title":{"rendered":"WINS-Schulungskurs \u00fcber Cybersicherheit f\u00fcr kerntechnische Anlagen"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2745\" class=\"elementor elementor-2745 elementor-1724\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6c4c54e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6c4c54e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-819ac28\" data-id=\"819ac28\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d9b6066 elementor-widget elementor-widget-image\" data-id=\"d9b6066\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1000\" height=\"667\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2023\/12\/198_HUS_9584_selected_Web.jpg\" class=\"attachment-full size-full wp-image-2748\" alt=\"\" srcset=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2023\/12\/198_HUS_9584_selected_Web.jpg 1000w, https:\/\/cyberrange.at\/wp-content\/uploads\/2023\/12\/198_HUS_9584_selected_Web-300x200.jpg 300w, https:\/\/cyberrange.at\/wp-content\/uploads\/2023\/12\/198_HUS_9584_selected_Web-768x512.jpg 768w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\">(c) AIT \/ Christian Husar<\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86799bb elementor-widget elementor-widget-html\" data-id=\"86799bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"49.595\" height=\"33.705\" viewbox=\"0 0 49.595 33.705\"><path d=\"M136.2,70.58l33.7-33.705h-15.89l-33.7,33.705Z\" transform=\"translate(-120.307 -36.874)\" fill=\"#5d6c73\"><\/path><\/svg>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-74ee505 elementor-widget elementor-widget-heading\" data-id=\"74ee505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Am 27.11.2023 f\u00fchrten das World Institute of Nuclear Security (WINS) und das AIT Austrian Institute of Technology den vierten einer Reihe von 5-t\u00e4gigen Schulungskursen durch, die darauf abzielen, das Bewusstsein und die organisatorischen Kapazit\u00e4ten f\u00fcr die Abwehr von Cyberangriffen auf kerntechnische Anlagen zu st\u00e4rken. Dieser Kurs wurde speziell f\u00fcr Teilnehmer aus dem britischen zivilen Nuklearsektor zugeschnitten. <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b396468 elementor-section-full_width elementor-inner-section-15 elementor-section-height-default elementor-section-height-default\" data-id=\"b396468\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-custom\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-a3c7fac\" data-id=\"a3c7fac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a7c627 elementor-widget elementor-widget-text-editor\" data-id=\"2a7c627\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Training in einer hochmodernen IT-Simulationsumgebung<\/strong><\/p><p>Auf der AIT Cyber Range werden IT-Infrastrukturen und Kommunikationsprozesse realistisch simuliert, so dass die Teilnehmer lernen k\u00f6nnen, wie sie eine Vielzahl unterschiedlicher Angriffsformen erkennen und abwehren k\u00f6nnen. Sie k\u00f6nnen die Bew\u00e4ltigung von Cyber-Angriffen und Extremsituationen auch in hochkritischen Infrastrukturen \u00fcben, was in der realen Welt aus Sicherheits- oder Kostengr\u00fcnden nicht m\u00f6glich w\u00e4re. So k\u00f6nnen Strukturen und Prozesse analysiert und Fehlerquellen identifiziert werden, so dass die Wechselwirkung zwischen Konsequenzen und Aktionen sowie Reaktionen sicher und transparent nachvollzogen werden k\u00f6nnen.  <\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-0811130\" data-id=\"0811130\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-efc98b9 elementor-widget elementor-widget-image\" data-id=\"efc98b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/www.wins.org\" target=\"_blank\" rel=\"nofollow noopener\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"76\" src=\"https:\/\/cyberrange.at\/wp-content\/uploads\/2023\/12\/WINS_Logo_Colour-e1687161488976.png\" class=\"attachment-large size-large wp-image-2749\" alt=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-18b0ad4 elementor-widget elementor-widget-heading\" data-id=\"18b0ad4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Kontakt<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ed18394 elementor-widget elementor-widget-text-editor\" data-id=\"ed18394\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"text-decoration: underline;\">Michael W. M\u00fcrling<\/span><br>Marketing und Kommunikation<br>AIT Austrian Institute of Technology<br>Center for Digital Safety &amp; Security<br>T +43 (0)664 235 17 47<br><a href=\"mailto:michael.muerling@ait.ac.at\">michael.muerling@ait.ac.at<\/a><br><a href=\"http:\/\/www.ait.ac.at\" target=\"_blank\" rel=\"noopener\">www.ait.ac.at<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Am 27.11.2023 f\u00fchrten das World Institute of Nuclear Security (WINS) und das AIT Austrian Institute of Technology den vierten einer Reihe von 5-t\u00e4gigen Schulungskursen durch, die darauf abzielen, das Bewusstsein und die organisatorischen Kapazit\u00e4ten f\u00fcr die Abwehr von Cyberangriffen auf kerntechnische Anlagen zu st\u00e4rken. Dieser Kurs wurde speziell f\u00fcr Teilnehmer aus dem britischen zivilen Nuklearsektor zugeschnitten. <\/p>\n","protected":false},"author":7,"featured_media":2748,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"rank_math_title":"","rank_math_description":"","rank_math_focus_keyword":"","rank_math_seo_score":"","footnotes":""},"categories":[45,8],"tags":[],"class_list":["post-2745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nachrichten","category-uncategorized-en"],"_links":{"self":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/posts\/2745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/comments?post=2745"}],"version-history":[{"count":2,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/posts\/2745\/revisions"}],"predecessor-version":[{"id":2755,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/posts\/2745\/revisions\/2755"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/media\/2748"}],"wp:attachment":[{"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/media?parent=2745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/categories?post=2745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberrange.at\/de\/wp-json\/wp\/v2\/tags?post=2745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}