{"id":9700,"date":"2024-10-10T12:52:57","date_gmt":"2024-10-10T18:52:57","guid":{"rendered":"https:\/\/redporlaciberseguridad.org\/?p=9700"},"modified":"2024-10-16T13:42:24","modified_gmt":"2024-10-16T19:42:24","slug":"morras-tics-impulsa-la-ciberseguridad-personal-entre-estudiantes-con-capacitacion-presencial","status":"publish","type":"post","link":"https:\/\/redporlaciberseguridad.org\/en\/morras-tics-impulsa-la-ciberseguridad-personal-entre-estudiantes-con-capacitacion-presencial\/","title":{"rendered":"Morras TICS impulsa la ciberseguridad personal entre estudiantes con capacitaci\u00f3n presencial"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"9700\" class=\"elementor elementor-9700\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-450f605 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"450f605\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1765383\" data-id=\"1765383\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a52e38d elementor-widget elementor-widget-text-editor\" data-id=\"a52e38d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p>El pasado 10 de octubre, <strong>Morras TICS<\/strong>, un club conformado por estudiantes de la <strong>FES Acatl\u00e1n en <\/strong>coordinaci\u00f3n con<strong> Red por la Ciberseguridad<\/strong>, realiz\u00f3 con \u00e9xito una capacitaci\u00f3n presencial dirigida a la comunidad estudiantil, centrada en el tema <strong>Ciberseguridad Personal<\/strong>. Este evento reuni\u00f3 a las y los j\u00f3venes comprometidos con la protecci\u00f3n de su informaci\u00f3n en un entorno digital cada vez m\u00e1s complejo.<\/p><p>\u00a0<\/p><p>Durante la capacitaci\u00f3n, los estudiantes tuvieron la oportunidad de aprender sobre:<\/p><p>\u00a0<\/p><ul><li><strong>Protecci\u00f3n de datos personales:<\/strong> Estrategias para crear y gestionar contrase\u00f1as seguras, as\u00ed como t\u00e9cnicas para evitar el robo de informaci\u00f3n.<\/li><li><strong>Identificaci\u00f3n de amenazas cibern\u00e9ticas:<\/strong> C\u00f3mo reconocer correos electr\u00f3nicos fraudulentos y sitios web maliciosos.<\/li><li><strong>Privacidad en redes sociales:<\/strong> Consejos sobre c\u00f3mo proteger la identidad y gestionar adecuadamente la configuraci\u00f3n de privacidad en plataformas populares.<\/li><\/ul><p>El enfoque pr\u00e1ctico y din\u00e1mico de la sesi\u00f3n permiti\u00f3 que los asistentes no solo comprendieran los riesgos presentes en el \u00e1mbito digital, sino que tambi\u00e9n adquirieran herramientas para protegerse de manera proactiva.<\/p><p>\u00a0<\/p><p><strong>Morras TICS<\/strong>, integrado por\u00a0 las j\u00f3venes apasionadas de la tecnolog\u00eda, reafirma su misi\u00f3n de empoderar a la comunidad estudiantil de la <strong>FES Acatl\u00e1n<\/strong> y m\u00e1s all\u00e1, brind\u00e1ndoles los conocimientos necesarios para enfrentar los desaf\u00edos de la ciberseguridad. La excelente respuesta de los asistentes destac\u00f3 la urgencia de seguir formando a los estudiantes en temas de seguridad digital.<\/p><p>\u00a0<\/p><p>Este evento marca el inicio de una serie de actividades que <strong>Morras TICS<\/strong> tiene programadas para seguir fortaleciendo la educaci\u00f3n en tecnolog\u00eda y seguridad digital entre los j\u00f3venes.<\/p><p>\u00a0<\/p><p>\u00a1No pierdan de vista las pr\u00f3ximas capacitaciones y eventos!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>El pasado 10 de octubre, Morras TICS, un club conformado por estudiantes de la FES Acatl\u00e1n en coordinaci\u00f3n con Red por la Ciberseguridad, realiz\u00f3 con \u00e9xito una capacitaci\u00f3n presencial dirigida a la comunidad estudiantil, centrada en el tema Ciberseguridad Personal. Este evento reuni\u00f3 a las y los j\u00f3venes comprometidos con la protecci\u00f3n de su informaci\u00f3n<\/p>","protected":false},"author":3,"featured_media":9714,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[88,22],"tags":[],"class_list":["post-9700","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-noticias"],"_links":{"self":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/9700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/comments?post=9700"}],"version-history":[{"count":16,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/9700\/revisions"}],"predecessor-version":[{"id":9717,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/posts\/9700\/revisions\/9717"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media\/9714"}],"wp:attachment":[{"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/media?parent=9700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/categories?post=9700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/redporlaciberseguridad.org\/en\/wp-json\/wp\/v2\/tags?post=9700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}