{"id":11684,"date":"2025-01-23T12:15:46","date_gmt":"2025-01-23T18:15:46","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/validacion-de-constancia-ia-para-docentes-1era-generacion\/"},"modified":"2025-03-08T01:44:17","modified_gmt":"2025-03-08T07:44:17","slug":"validacion-de-constancia-ia-para-docentes-1era-generacion","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/validacion-de-constancia-ia-para-docentes-1era-generacion\/","title":{"rendered":"Validaci\u00f3n de constancia IA para Docentes (1era Generaci\u00f3n)"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"11684\" class=\"elementor elementor-11684\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-14565d8f e-flex e-con-boxed wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no e-con e-parent\" data-id=\"14565d8f\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6d96fa64 elementor-widget elementor-widget-text-editor\" data-id=\"6d96fa64\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<img width=\"\\\"1024\\\"\" height=\"\\\"src =\"\\\" https:>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe63711 elementor-widget elementor-widget-image\" data-id=\"fe63711\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"1024\" src=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-1024x1024.png\" class=\"attachment-large size-large wp-image-11687\" alt=\"\" srcset=\"https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-1024x1024.png 1024w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-300x300.png 300w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-150x150.png 150w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-768x768.png 768w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-12x12.png 12w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-600x600.png 600w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2-100x100.png 100w, https:\/\/redporlaciberseguridad.org\/wp-content\/uploads\/2025\/01\/IA-PARA-DOCENTES-VALIDACION2.png 1080w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[114],"tags":[],"class_list":["post-11684","post","type-post","status-publish","format-standard","hentry","category-validacion-de-constancia"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/11684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=11684"}],"version-history":[{"count":3,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/11684\/revisions"}],"predecessor-version":[{"id":12649,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/11684\/revisions\/12649"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=11684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=11684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=11684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}