{"id":11084,"date":"2025-02-05T12:29:08","date_gmt":"2025-02-05T18:29:08","guid":{"rendered":"https:\/\/34.214.12.90\/?page_id=11084"},"modified":"2025-08-12T21:06:23","modified_gmt":"2025-08-13T03:06:23","slug":"cursos","status":"publish","type":"page","link":"https:\/\/redporlaciberseguridad.org\/en\/cursos\/","title":{"rendered":"Cursos"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"11084\" class=\"elementor elementor-11084\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3cb39b3 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"3cb39b3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-8e69d4d elementor-widget elementor-widget-image-box\" data-id=\"8e69d4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h1 class=\"elementor-image-box-title\">Cursos<\/h1><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-53d53a5 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"53d53a5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-9803870 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"9803870\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-10e2e4d elementor-widget elementor-widget-heading\" data-id=\"10e2e4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Descubre una extensa gama de temas y perfecciona tus competencias en ciberseguridad con la ayuda de nuestros especialistas<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f864f30 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"f864f30\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a21eca elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"2a21eca\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInRight&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e1e080e elementor-widget elementor-widget-heading\" data-id=\"e1e080e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">Cada curso est\u00e1 elaborado para ofrecerte conocimientos pr\u00e1cticos y actualizados que podr\u00e1s implementar de forma inmediata.<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94658a9 elementor-widget-divider--view-line elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"94658a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d902052 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"d902052\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8482e21 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"8482e21\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-dc5f3f4 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"dc5f3f4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9936f17 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"9936f17\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/Academia-qllvairirlgs62kyry19whnyzum0fedexswlp2x7bw.png\" title=\"Academy\" alt=\"Academia\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\">Academy<\/h5><p class=\"elementor-image-box-description\"> <p>Alojamos una plataforma en l\u00ednea con capacitaciones en ciberseguridad (nivel de entrada) para profesionales y estudiantes de TI.\nOfrecemos recursos educativos y formativos en ciberseguridad, incluyendo cursos y talleres para mejorar habilidades, para aplicar conocimientos en proyectos reales, y materiales accesibles para todos los niveles de experiencia. <\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f0faf16 elementor-widget elementor-widget-button\" data-id=\"f0faf16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/academia.redporlaciberseguridad.org\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Conocer m\u00e1s<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8c4f2f7 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"8c4f2f7\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-01b7a2d e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"01b7a2d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2a345b4 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2a345b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/operacionaleph-r0enbuzpbgd6pxwtpsx1jfgyyxz4xcffn4loq9cv30.png\" title=\"operacionaleph\" alt=\"operacionaleph\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\">Operaci\u00f3n Aleph<\/h5><p class=\"elementor-image-box-description\"> <p>Fomentamos el aprendizaje pr\u00e1ctico y la aplicaci\u00f3n de conocimientos en proyectos reales. Este proyecto pretende contribuir al 2030 con el 15% del total se necesitan profesionales en ciberseguridad en M\u00e9xico. Esto es lo mas importante esfuerzo de desarrollo de capacidades en ciberseguridad en M\u00e9xico. Durante 2022 y 2023, m\u00e1s de 22.000 participaron en educaci\u00f3n b\u00e1sica y capacitaciones especializadas.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4b5306c elementor-widget elementor-widget-button\" data-id=\"4b5306c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/redporlaciberseguridad.org\/en\/operacion-aleph\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Conocer m\u00e1s<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-042e6ed e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"042e6ed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t<div class=\"elementor-element elementor-element-12edfb6 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"12edfb6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fea819d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"fea819d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><img decoding=\"async\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/BANNER-HOME-1-qtl4upl1wwvsb7lfiirxycdyfs2x9rfrwur9bdnfx8.png\" title=\"BANNER HOME (1)\" alt=\"BANNER HOME (1)\" loading=\"lazy\" \/><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\">Revolucion IA<\/h5><p class=\"elementor-image-box-description\"> <p>Promovemos la adopci\u00f3n y uso responsable de la inteligencia artificial (IA) mediante la educaci\u00f3n para docentes y alumnos, la capacitaci\u00f3n a empresas, la colaboraci\u00f3n con gobiernos y otras entidades, y el impulso de la transformaci\u00f3n digital. Adem\u00e1s, destacamos la importancia de la regulaci\u00f3n adecuada y el uso responsable de la IA para aumentar la  la transparencia en el uso de datos.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f63b763 elementor-widget elementor-widget-button\" data-id=\"f63b763\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/redporlaciberseguridad.org\/en\/revolucion-ia\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-long-arrow-alt-right\"><\/i>\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Conocer m\u00e1s<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cd5d313 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"cd5d313\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f38ee19 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"f38ee19\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b46bf16 elementor-widget elementor-widget-image\" data-id=\"b46bf16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/446898592_435749582548682_5332890103326744122_n-qqj3pf0l0th9ij5stj0mey865bj58dquecqvh5v0pk.jpg\" title=\"446898592_435749582548682_5332890103326744122_n\" alt=\"446898592_435749582548682_5332890103326744122_n\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-de5140d e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"de5140d\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f124315 elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"f124315\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;image_spacing_custom&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:7,&quot;sizes&quot;:[]},&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500,&quot;image_spacing_custom_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;image_spacing_custom_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carrusel de Im\u00e1genes\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/about1-r0ek2004pqov6aino3896a279gp1pwfn3enemtoqzk.jpg\" alt=\"about1\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/WhatsApp-Image-2025-01-22-at-5.46.59-PM-r0el8cmcn0ny9t02de94ilbusfyeiyk9l0sz1mw6n4.jpeg\" alt=\"WhatsApp Image 2025-01-22 at 5.46.59 PM\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/376812994_694388216053603_5805459484091619261_n-qptfugb93n4529u6moudqobfv0pe6tb6p13t06zgdc.jpg\" alt=\"376812994_694388216053603_5805459484091619261_n\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/GLkysVOaQAICBAZ-qoy98x6c081bxcqx9pvhsw0onpuwlye3omd33sj44g.jpeg\" alt=\"GLkysVOaQAICBAZ\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/Multimedia-10-qvnph7uheebysgk3iql0y1j72rjphh9zwad4b4hktc.jpeg\" alt=\"Multimedia (10)\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"6 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/376704981_694388119386946_4066126819932817659_n-qptcq3nq7jbbc719omiq7iyzq0gz58a6wxxgyjki3k.jpg\" alt=\"376704981_694388119386946_4066126819932817659_n\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"7 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/WhatsApp-Image-2024-09-04-at-11.11.08-AM-qtmf5v1tvwr6l5dd8w0t592q1ap8hutj44it5pbpnk.jpeg\" alt=\"WhatsApp Image 2024-09-04 at 11.11.08 AM\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"8 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/Cenaltec-qtksrm2eq4xmdd07woi128wp6qf67u19qyfic0cnts.png\" alt=\"Cenaltec\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"9 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/448853224_799390702292857_7310485609887448422_n-qq6ryjfl9dq5rpqkpbxualgysrn47wxq1betg5p3mo.jpg\" alt=\"448853224_799390702292857_7310485609887448422_n\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"10 de 10\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/elementor\/thumbs\/376709217_694388376053587_5687250916685821863_n-qptf75v7rf8de3o2mmf5yjw9zbhzgsum5r6oxdimjk.jpg\" alt=\"376709217_694388376053587_5687250916685821863_n\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-left\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-right\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d10a0e e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"4d10a0e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ba7ad58 elementor-widget elementor-widget-heading\" data-id=\"ba7ad58\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Con apoyo de:<\/h4>\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-38170d4 e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"38170d4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3dafdfc e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"3dafdfc\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-435310fe elementor-widget elementor-widget-image\" data-id=\"435310fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"666\" height=\"375\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/ANIEI-PNG.png\" class=\"attachment-large size-large wp-image-6773\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/ANIEI-PNG.png 666w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/ANIEI-PNG-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/ANIEI-PNG-18x10.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/ANIEI-PNG-600x338.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6be29b29 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"6be29b29\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bd14815 elementor-widget elementor-widget-image\" data-id=\"3bd14815\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"666\" height=\"375\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/AWS-PNG-copy.png\" class=\"attachment-large size-large wp-image-6785\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/AWS-PNG-copy.png 666w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/AWS-PNG-copy-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/AWS-PNG-copy-18x10.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/AWS-PNG-copy-600x338.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f7d9aed e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"1f7d9aed\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35451dd4 elementor-widget elementor-widget-image\" data-id=\"35451dd4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"666\" height=\"375\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/logo.835a2f88e5f5-1.png\" class=\"attachment-large size-large wp-image-6760\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/logo.835a2f88e5f5-1.png 666w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/logo.835a2f88e5f5-1-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/logo.835a2f88e5f5-1-18x10.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/logo.835a2f88e5f5-1-600x338.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-21f92254 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"21f92254\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4769824e elementor-widget elementor-widget-image\" data-id=\"4769824e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"375\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/Ciecas-PNG.png\" class=\"attachment-large size-large wp-image-6767\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/Ciecas-PNG.png 666w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/Ciecas-PNG-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/Ciecas-PNG-18x10.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/Ciecas-PNG-600x338.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-681fd21e e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"681fd21e\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46c0a460 elementor-widget elementor-widget-image\" data-id=\"46c0a460\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"375\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/CORE-PNG.png\" class=\"attachment-large size-large wp-image-6780\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/CORE-PNG.png 666w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/CORE-PNG-300x169-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/CORE-PNG-18x10.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/CORE-PNG-600x338.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/CORE-PNG-200x113-200x113.png 200w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6ddab0de e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"6ddab0de\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-54480076 elementor-widget elementor-widget-image\" data-id=\"54480076\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"375\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/INADET-PNG.png\" class=\"attachment-large size-large wp-image-6772\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/INADET-PNG.png 666w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/INADET-PNG-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/INADET-PNG-18x10.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/INADET-PNG-600x338.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a9add31 e-con-full e-flex wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-child\" data-id=\"4a9add31\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-35398312 elementor-widget elementor-widget-image\" data-id=\"35398312\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"666\" height=\"375\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/UACJ-PNG-copy.png\" class=\"attachment-large size-large wp-image-6789\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/UACJ-PNG-copy.png 666w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/UACJ-PNG-copy-300x169.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/UACJ-PNG-copy-18x10.png 18w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/05\/UACJ-PNG-copy-600x338.png 600w\" sizes=\"(max-width: 666px) 100vw, 666px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cursos Descubre una extensa gama de temas y perfecciona tus competencias en ciberseguridad con la ayuda de nuestros especialistas Cada curso est\u00e1 elaborado para ofrecerte conocimientos pr\u00e1cticos y actualizados que podr\u00e1s implementar de forma inmediata. Academia Alojamos una plataforma en l\u00ednea con capacitaciones en ciberseguridad (nivel de entrada) para profesionales y estudiantes de TI. Ofrecemos<\/p>","protected":false},"author":7,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"disabled","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-11084","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages\/11084","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=11084"}],"version-history":[{"count":25,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages\/11084\/revisions"}],"predecessor-version":[{"id":14843,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages\/11084\/revisions\/14843"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=11084"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}