{"id":7818,"date":"2024-06-28T18:00:48","date_gmt":"2024-06-29T00:00:48","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?page_id=7818"},"modified":"2024-06-28T18:07:37","modified_gmt":"2024-06-29T00:07:37","slug":"validacion-de-constancia-del-curso-ia-generativa-para-docentes","status":"publish","type":"page","link":"https:\/\/redporlaciberseguridad.org\/en\/validacion-de-constancia-del-curso-ia-generativa-para-docentes\/","title":{"rendered":"Validaci\u00f3n de constancia del curso: IA Generativa para Docentes"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"7818\" class=\"elementor elementor-7818\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5fafff1 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"5fafff1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-fb0ad98\" data-id=\"fb0ad98\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f7d8064 elementor-widget elementor-widget-heading\" data-id=\"f7d8064\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Validaci\u00f3n de constancia curso: IA Generativa para Docentes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-46177c9 elementor-widget elementor-widget-image\" data-id=\"46177c9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-1024x1024.jpg\" class=\"attachment-large size-large wp-image-7820\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-1024x1024.jpg 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-300x300.jpg 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-150x150.jpg 150w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-768x768.jpg 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-12x12.jpg 12w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-600x600.jpg 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1-100x100.jpg 100w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2024\/06\/validacion-de-constancia-red-3-1.jpg 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Validaci\u00f3n de constancia curso: IA Generativa para Docentes<\/p>","protected":false},"author":3,"featured_media":7820,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-7818","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages\/7818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=7818"}],"version-history":[{"count":5,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages\/7818\/revisions"}],"predecessor-version":[{"id":7824,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/pages\/7818\/revisions\/7824"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media\/7820"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=7818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}