
{"id":23870,"date":"2024-02-12T17:44:58","date_gmt":"2024-02-12T16:44:58","guid":{"rendered":"https:\/\/projects.grupomainjobs.com\/?page_id=23870"},"modified":"2025-11-11T18:21:42","modified_gmt":"2025-11-11T17:21:42","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/projects.grupomainjobs.com\/ca\/ciberseguridad\/","title":{"rendered":"Curs en l\u00ednia de Ciberseguretat a la ind\u00fastria 4.0"},"content":{"rendered":"<div class=\"gb-container gb-container-eb064240 alignfull\" id=\"Encabezado\">\n<div class=\"gb-container gb-container-16d71472\">\n\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"59\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1024x59.png\" alt=\"\" class=\"wp-image-23876\" style=\"width:942px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1024x59.png 1024w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-300x17.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-768x44.png 768w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1536x88.png 1536w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-2048x117.png 2048w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-18x1.png 18w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-500x29.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-800x46.png 800w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1280x73.png 1280w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1920x110.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-nk-awb nk-awb has-0-b-506-d-background-color has-background\"><div class=\"nk-awb-wrap\" style=\"background:#0b506d\" data-awb-type=\"video\" data-awb-video=\"mp4:https:\/\/sepebarcelona.projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Barcelona-video.mp4\" data-awb-video-mobile=\"true\"><div class=\"nk-awb-inner\" style=\"opacity: 0.15;\"><\/div><\/div><div class=\"nk-awb-wrap-content is-layout-constrained wp-block-nk-awb-is-layout-constrained\"><div class=\"gb-container gb-container-1aa9fcd0\">\n<div class=\"gb-container gb-container-024306a6\">\n\n<h1 class=\"gb-headline gb-headline-48d9fccc gb-headline-text colorBlanco\">Uneix-te a la comunitat de 4.000 professionals que far\u00e0 m\u00e9s segures les empreses de la ind\u00fastria 4.0<\/h1>\n\n\n<div class=\"gb-container gb-container-38adc1c4\">\n\n<h1 class=\"gb-headline gb-headline-bf6d9ed0 gb-headline-text colorBlanco\">Curs en l\u00ednia de Ciberseguretat a la ind\u00fastria 4.0<\/h1>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-8f0bf6e6 latido\">\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png\" alt=\"\" class=\"wp-image-23948\" style=\"width:207px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png\" alt=\"\" class=\"wp-image-28464\" style=\"width:207px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png 225w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-100x100.png 100w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png\" alt=\"\" class=\"wp-image-24536\" style=\"width:207px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<p class=\"gb-headline gb-headline-d4b0f6f4 gb-headline-text\" data-aos=\"fade-down\" data-aos-duration=\"1000\"><strong>Inclou aquestes certificacions al teu CV i perfil de LinkedIn.<\/strong><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f0739f6f\">\n\n<a class=\"gb-button gb-button-68527627 gb-button-text botonForm\" href=\"#form\">Aconsegueix la teva pla\u00e7a sense cost<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n\n\n\n<h2 class=\"gb-headline gb-headline-b69f383d gb-headline-text colorBlanco\"><strong>Places esgotades<\/strong>! <\/h2>\n\n\n\n\n\n\n<div class=\"gb-container gb-container-a9a52ae0 alignfull\" id=\"Presentaci\u00f3n\">\n<div class=\"gb-container gb-container-83126d3b\">\n<div class=\"gb-container gb-container-a7b48c2b\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-ca82d586\">\n<div class=\"gb-grid-column gb-grid-column-2c9626aa\"><div class=\"gb-container gb-container-2c9626aa caja\">\n\n<p class=\"gb-headline gb-headline-5c2a5195\"><span class=\"gb-icon\"><svg viewbox=\"0 0 24 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"SVGRepo_bgCarrier\" stroke-width=\"0\"><\/g><g id=\"SVGRepo_tracerCarrier\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/g><g id=\"SVGRepo_iconCarrier\"> <\/g><g id=\"style=bulk\"> <\/g><g id=\"check-circle\"> <path id=\"vector (Stroke)\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1.25 12C1.25 6.06294 6.06294 1.25 12 1.25C17.9371 1.25 22.75 6.06294 22.75 12C22.75 17.9371 17.9371 22.75 12 22.75C6.06294 22.75 1.25 17.9371 1.25 12Z\" fill=\"#e1e8ed\"><\/path> <path id=\"vector (Stroke)_2\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.5303 8.96967C16.8232 9.26256 16.8232 9.73744 16.5303 10.0303L11.9041 14.6566C11.2207 15.34 10.1126 15.34 9.42923 14.6566L7.46967 12.697C7.17678 12.4041 7.17678 11.9292 7.46967 11.6363C7.76256 11.3434 8.23744 11.3434 8.53033 11.6363L10.4899 13.5959C10.5875 13.6935 10.7458 13.6935 10.8434 13.5959L15.4697 8.96967C15.7626 8.67678 16.2374 8.67678 16.5303 8.96967Z\" fill=\"#0e1e3d\"><\/path> <\/g>  <\/svg><\/span><span class=\"gb-headline-text\">Formaci\u00f3 teoricopr\u00e0ctica amb sistema de simulaci\u00f3 de ciberatacs.&nbsp;<\/span><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-ed032fc5\"><div class=\"gb-container gb-container-ed032fc5 caja\">\n\n<p class=\"gb-headline gb-headline-92f4b785\"><span class=\"gb-icon\"><svg viewbox=\"0 0 24 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"SVGRepo_bgCarrier\" stroke-width=\"0\"><\/g><g id=\"SVGRepo_tracerCarrier\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/g><g id=\"SVGRepo_iconCarrier\"> <\/g><g id=\"style=bulk\"> <\/g><g id=\"check-circle\"> <path id=\"vector (Stroke)\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1.25 12C1.25 6.06294 6.06294 1.25 12 1.25C17.9371 1.25 22.75 6.06294 22.75 12C22.75 17.9371 17.9371 22.75 12 22.75C6.06294 22.75 1.25 17.9371 1.25 12Z\" fill=\"#e1e8ed\"><\/path> <path id=\"vector (Stroke)_2\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.5303 8.96967C16.8232 9.26256 16.8232 9.73744 16.5303 10.0303L11.9041 14.6566C11.2207 15.34 10.1126 15.34 9.42923 14.6566L7.46967 12.697C7.17678 12.4041 7.17678 11.9292 7.46967 11.6363C7.76256 11.3434 8.23744 11.3434 8.53033 11.6363L10.4899 13.5959C10.5875 13.6935 10.7458 13.6935 10.8434 13.5959L15.4697 8.96967C15.7626 8.67678 16.2374 8.67678 16.5303 8.96967Z\" fill=\"#0e1e3d\"><\/path> <\/g>  <\/svg><\/span><span class=\"gb-headline-text\">3 setmanes. Modalitat: teleformaci\u00f3.<\/span><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-d6e2ced9\"><div class=\"gb-container gb-container-d6e2ced9 caja\">\n\n<p class=\"gb-headline gb-headline-189760c7\"><span class=\"gb-icon\"><svg viewbox=\"0 0 24 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"SVGRepo_bgCarrier\" stroke-width=\"0\"><\/g><g id=\"SVGRepo_tracerCarrier\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/g><g id=\"SVGRepo_iconCarrier\"> <\/g><g id=\"style=bulk\"> <\/g><g id=\"check-circle\"> <path id=\"vector (Stroke)\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1.25 12C1.25 6.06294 6.06294 1.25 12 1.25C17.9371 1.25 22.75 6.06294 22.75 12C22.75 17.9371 17.9371 22.75 12 22.75C6.06294 22.75 1.25 17.9371 1.25 12Z\" fill=\"#e1e8ed\"><\/path> <path id=\"vector (Stroke)_2\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.5303 8.96967C16.8232 9.26256 16.8232 9.73744 16.5303 10.0303L11.9041 14.6566C11.2207 15.34 10.1126 15.34 9.42923 14.6566L7.46967 12.697C7.17678 12.4041 7.17678 11.9292 7.46967 11.6363C7.76256 11.3434 8.23744 11.3434 8.53033 11.6363L10.4899 13.5959C10.5875 13.6935 10.7458 13.6935 10.8434 13.5959L15.4697 8.96967C15.7626 8.67678 16.2374 8.67678 16.5303 8.96967Z\" fill=\"#0e1e3d\"><\/path> <\/g>  <\/svg><\/span><span class=\"gb-headline-text\">Totalment gratu\u00eft.<\/span><\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-ff68117f alignfull\" id=\"Enlaces\">\n<div class=\"gb-container gb-container-1cc8977f\">\n<div class=\"gb-container gb-container-70ea91a0\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-b24f6c7f\">\n<div class=\"gb-grid-column gb-grid-column-edef1220\"><div class=\"gb-container gb-container-edef1220\"><div class=\"gb-inside-container\">\n<div class=\"gb-button-wrapper gb-button-wrapper-852e676e\">\n\n<a class=\"gb-button gb-button-6377cb9e\" href=\"#Contenidos\"><span class=\"gb-icon\">          <\/span><span class=\"gb-button-text\"><strong>Continguts<\/strong><\/span><\/a>\n\n\n\n<a class=\"gb-button gb-button-609ee599\" href=\"#Aplicaciones\"><span class=\"gb-icon\">    <\/span><span class=\"gb-button-text\"><strong>Aplicacions professionals<\/strong><\/span><\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-747cf42d\"><div class=\"gb-container gb-container-747cf42d\"><div class=\"gb-inside-container\">\n<div class=\"gb-button-wrapper gb-button-wrapper-8395a0a2\">\n\n<a class=\"gb-button gb-button-9c68ce5e\" href=\"#Titulaciones\"><span class=\"gb-icon\">       <\/span><span class=\"gb-button-text\"><strong>Titulacions<\/strong><\/span><\/a>\n\n\n\n<a class=\"gb-button gb-button-fc47f863\" href=\"#form\"><span class=\"gb-icon\">    <\/span><span class=\"gb-button-text\"><strong>Inscripci\u00f3<\/strong><\/span><\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-1cd35894 alignfull\" id=\"Aplicaciones\">\n<div class=\"gb-container gb-container-688e663e\">\n<div class=\"gb-container gb-container-a74f76d5\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-6efac0a3 gb-headline-text\"><strong>Aquesta formaci\u00f3 est\u00e0 adre\u00e7ada a:&nbsp;<\/strong><\/h2>\n\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-83706c54\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-e6adea89\">\n<div class=\"gb-grid-column gb-grid-column-bda2ced0\"><div class=\"gb-container gb-container-bda2ced0\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-17ffd244 gb-headline-text\"><strong>Enginyers\/es, graduats\/des en inform\u00e0tica<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-9eaedc49\"><div class=\"gb-container gb-container-9eaedc49\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-f49a78ae gb-headline-text\"><strong>Enginyers\/es industrials, teleco i electr\u00f2nics\/es<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-5f0730c1\"><div class=\"gb-container gb-container-5f0730c1\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-8375d41b gb-headline-text\"><strong>Estudiants universitaris de branques afins<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-7b20421c\"><div class=\"gb-container gb-container-7b20421c\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-a4a3e21b gb-headline-text\"><strong>Altres perfils amb Batxillerat completat<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"gb-container gb-container-46ddaf81 alignfull\" id=\"Contenidos\">\n<div class=\"gb-container gb-container-ccce4542\" id=\"Escritorio\">\n<div class=\"gb-container gb-container-9e8d60a7\"><div class=\"gb-inside-container\">\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"gb-container gb-container-d4c83953\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-95883f02 gb-headline-text\"><strong>Continguts:<\/strong><\/p>\n\n<\/div><\/div>\n<\/div><\/div>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-aaf90f7a\">\n<div class=\"gb-grid-column gb-grid-column-32db660a\"><div class=\"gb-container gb-container-32db660a\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-f3cb26d5 gb-headline-text alturaLinea\"><strong>M\u00f2dul 1<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-8ef92a9a gb-headline-text\"><strong>INTRODUCCI\u00d3 A LA CIBERSEGURETAT<\/strong> <span style=\"font-weight:400\">\u2013 36 H<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-e28c5741 gb-headline-text\"><strong>Qu\u00e8 aprendr\u00e0s en aquest m\u00f2dul?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">An\u00e0lisi i identificaci\u00f3 de riscos tecnol\u00f2gics que poden afectar l&#039;empresa\/organitzaci\u00f3.<\/li>\n\n\n\n<li style=\"font-size:15px\">Capacitat per millorar la resili\u00e8ncia dels sistemes digitals que donen suport a lempresa.<\/li>\n\n\n\n<li style=\"font-size:15px\">Obtenci\u00f3 de coneixements per al desenvolupament duna estrat\u00e8gia de securitzaci\u00f3 de la informaci\u00f3 i generaci\u00f3 de models digitals competitius.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238700\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTINGUTS<\/strong><\/h6><div id=\"ac-238700\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Coneixement dels fonaments de ciberseguretat<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Models organitzatius.<\/li>\n\n\n\n<li style=\"font-size:15px\">Conceptes b\u00e0sics i tecnol\u00f2gics.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Rol de les persones<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Identificaci\u00f3 d&#039;amenaces, atacs i vulnerabilitats dels sistemes.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Tipus d&#039;amenaces i actors rellevants al Cibercrim<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Realitzaci\u00f3 duna avaluaci\u00f3 de seguretat i gesti\u00f3 de riscos.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Metodologia Gesti\u00f3 Riscos<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Abast, Actius cr\u00edtics, Identificaci\u00f3 i valoraci\u00f3 riscos negoci<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Amenaces i salvaguardes.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Continu\u00eftat del Negoci<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Cicle gesti\u00f3 de riscos.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Models de Governan\u00e7a i Classificaci\u00f3 Informaci\u00f3<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Est\u00e0ndards i regulaci\u00f3<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Information Security Management: ISO 2700, 27001, 27002, 27005.<\/li>\n\n\n\n<li style=\"font-size:15px\">Risk Management: ISO 31000, 31010, COBIT 5, NIST 800-39.<\/li>\n\n\n\n<li style=\"font-size:15px\">Risk Assessment: NIST 800-30.<\/li>\n\n\n\n<li style=\"font-size:15px\">Security Controls: NIST 800-53.<\/li>\n\n\n\n<li style=\"font-size:15px\">Specific: GDPR (Data Protection), OWASP (Web Application Security), PCI-DSS (payment CAD), etc.<\/li>\n\n\n\n<li style=\"font-size:15px\">Risk Framework: NIST Framework.<\/li>\n\n\n\n<li style=\"font-size:15px\">Threats of ICS: NIST 800-82.<\/li>\n\n\n\n<li style=\"font-size:15px\">IACS standards: ISA\/IEC-62443.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Gesti\u00f3 d&#039;Incidents<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Coneixement de la seguretat dels sistemes.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Hardening: Programari, Maquinari i Xarxes<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Sistemes Operatius.<\/li>\n\n\n\n<li style=\"font-size:15px\">Aplicacions<\/li>\n\n\n\n<li style=\"font-size:15px\">Servidors, Llocs de Treball, Dispositius M\u00f2bils.<\/li>\n\n\n\n<li style=\"font-size:15px\">Bases de dades.<\/li>\n\n\n\n<li style=\"font-size:15px\">Dispositius de xarxa i sistemes industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Aproximaci\u00f3 als components de la seguretat a les xarxes.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Nivells OSI (Open System Interconnection Model)<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Model TCP\/IP: protocols DNS, FTP, IMAP, TCP, IPv4, IPv6, HTTP.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Encapsulat<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Components de Seguretat a Xarxes<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Firewall.<\/li>\n\n\n\n<li style=\"font-size:15px\">Sistemes de detecci\u00f3 d&#039;intrusos (IDS).<\/li>\n\n\n\n<li style=\"font-size:15px\">Sistema Prevenci\u00f3 Intrusions (IPS).<\/li>\n\n\n\n<li style=\"font-size:15px\">Sistema de Detecci\u00f3 i Prevenci\u00f3 d&#039;Intrusions Wireless (WIDPS).<\/li>\n\n\n\n<li style=\"font-size:15px\">Gesti\u00f3 d&#039;Amenaces Unificada (UTM).<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-a4cc923b\"><div class=\"gb-container gb-container-a4cc923b\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-0f9d1ceb gb-headline-text alturaLinea\"><strong>M\u00f2dul 2<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-84eb5fe4 gb-headline-text\"><strong>INTRODUCCI\u00d3 ALS FONAMENTS INDUSTRIALS DE LES TECNOLOGIES DE L&#039;OPERACI\u00d3<\/strong> <span style=\"font-weight:400\">\u2013 36 H<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-175f9e36 gb-headline-text\"><strong>Qu\u00e8 aprendr\u00e0s en aquest m\u00f2dul?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Coneixement de les xarxes industrials i dels protocols que donen suport als dispositius i la seva connectivitat.<\/li>\n\n\n\n<li style=\"font-size:15px\">Obtenci\u00f3 d&#039;habilitats per a l&#039;enteniment de la digitalitzaci\u00f3 de la ind\u00fastria i les tecnologies i components que donen suport a aquests processos de transformaci\u00f3.<\/li>\n\n\n\n<li style=\"font-size:15px\">Sensibilitzaci\u00f3 sobre la import\u00e0ncia del treball en equip col\u00b7laborant amb experts d&#039;altres \u00e0rees i en diferents contextos per aconseguir augmentar la seguretat de les instal\u00b7lacions davant d&#039;atac inform\u00e0tics.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238701\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTINGUTS<\/strong><\/h6><div id=\"ac-238701\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Introducci\u00f3 als aspectes essencials de la ind\u00fastria.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Fabricaci\u00f3 Industrial: sistemes comuns.<\/li>\n\n\n\n<li style=\"font-size:15px\">Les revolucions industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Ind\u00fastria 4.0: digitalitzaci\u00f3.<\/li>\n\n\n\n<li style=\"font-size:15px\">Ind\u00fastria Intel\u00b7ligent i connectada.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Reconeixement dels fonaments del control de processos industrials<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Tipus de processos industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Les revolucions industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Fonaments i tipus de sistemes de control.<\/li>\n\n\n\n<li style=\"font-size:15px\">ICS: Sistemes de Control Industrial.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>PID<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>RTU<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>HMI<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>PLC<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>SCADA<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>DCS<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Implementaci\u00f3 d&#039;instrumentaci\u00f3 industrial<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Sensors.<\/li>\n\n\n\n<li style=\"font-size:15px\">Conversors.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Identificaci\u00f3 de sistemes de comunicacions industrials.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>ETHERCAT<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Sistemes de producci\u00f3 integrats.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Automatitzaci\u00f3 industrial.<\/li>\n\n\n\n<li style=\"font-size:15px\">Gesti\u00f3 materials i sistemes didentificaci\u00f3.<\/li>\n\n\n\n<li style=\"font-size:15px\">Robotitzaci\u00f3 industrial.<\/li>\n\n\n\n<li style=\"font-size:15px\">RFID i altres protocols didentificaci\u00f3.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Implementaci\u00f3 de sistemes avan\u00e7ats de fabricaci\u00f3<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Classificaci\u00f3 maquin\u00e0ria industrial.<\/li>\n\n\n\n<li style=\"font-size:15px\">Sistemes MES de fabricaci\u00f3 assistida.<\/li>\n\n\n\n<li style=\"font-size:15px\">Operacions industrials digitalitzades: eines, evoluci\u00f3 i implementaci\u00f3.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Aproximaci\u00f3 a la ind\u00fastria X.0.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Introducci\u00f3 a la Ind\u00fastria 4.0 i seg\u00fcents versions.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-634086af\"><div class=\"gb-container gb-container-634086af\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-ed87a65c gb-headline-text alturaLinea\"><strong>M\u00f2dul 3<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-36bc4cde gb-headline-text\"><strong>INTRODUCCI\u00d3 A LA CIBERSEGURETAT INDUSTRIAL AVAN\u00c7ADA<\/strong> <span style=\"font-weight:400\">\u2013 24 H<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c2fc506f gb-headline-text\"><strong>Qu\u00e8 aprendr\u00e0s en aquest m\u00f2dul?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Compliment de les normes de seguretat i salut laboral, aix\u00ed com de les instruccions t\u00e8cniques dinstal\u00b7 laci\u00f3.<\/li>\n\n\n\n<li style=\"font-size:15px\">Apropiaci\u00f3 de linter\u00e8s per la seguretat de la informaci\u00f3 i la tecnologia aplicada a processos industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Rigorositat en el coneixement dels conceptes de seguretat i els seus riscos associats a plantes industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Habilitat en la implementaci\u00f3 de seguretat de xarxes industrials i els controls associats.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238702\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTINGUTS<\/strong><\/h6><div id=\"ac-238702\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Identificaci\u00f3 dels components ICS\/SCADA.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Difer\u00e8ncies entre la Ciberseguretat IT i OT.<\/li>\n\n\n\n<li style=\"font-size:15px\">Components ICS.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Descripci\u00f3 de xarxes i protocols industrials<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Arquitectures i Protocols ICS.<\/li>\n\n\n\n<li style=\"font-size:15px\">Amenaces Xarxes Industrials.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Reconeixement de les amenaces i les vulnerabilitats industrials.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">ISA 95: Model Purdue classificaci\u00f3.<\/li>\n\n\n\n<li style=\"font-size:15px\">Escenari Riscos Industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Introducci\u00f3 a Shodan.<\/li>\n\n\n\n<li style=\"font-size:15px\">Protocols i superf\u00edcie datac.<\/li>\n\n\n\n<li style=\"font-size:15px\">Hist\u00f2ria dels atacs a xarxes industrials: models.<\/li>\n\n\n\n<li style=\"font-size:15px\">Hacking Industrial.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Definici\u00f3 dels est\u00e0ndards i coneixement de les millors pr\u00e0ctiques de ciberseguretat industrial<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">NIST SP 800-82 Securitzaci\u00f3 Sistemes Control Industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">NIST SP 800-53 Estrat\u00e8gia Gesti\u00f3 Riscos.<\/li>\n\n\n\n<li style=\"font-size:15px\">IEC 62443 Processos, persones i tecnologia.<\/li>\n\n\n\n<li style=\"font-size:15px\">NERC CIP: Infraestructures Cr\u00edtiques Energia (USA).<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-b6363f7d\"><div class=\"gb-container gb-container-b6363f7d\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-f980cc2d gb-headline-text alturaLinea\"><strong>M\u00f2dul 4<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-21341774 gb-headline-text\"><strong>CIBEREXERCICIS B\u00c0SICS I AVAN\u00c7ATS DE CIBERSEGURETAT INDUSTRIAL<\/strong> <span style=\"font-weight:400\">\u2013 24 H<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-219eaf1b gb-headline-text\"><strong>Qu\u00e8 aprendr\u00e0s en aquest m\u00f2dul?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Treball en equip a escenaris virtuals de xarxes tecnol\u00f2giques i infraestructures industrials en situaci\u00f3 d&#039;atacs i vulnerabilitats aplicables a entorns reals en temps real.<\/li>\n\n\n\n<li style=\"font-size:15px\">Desenvolupament de les capacitats d&#039;anticipaci\u00f3 i de lideratge en situacions de risc en instal\u00b7lacions industrials.<\/li>\n\n\n\n<li style=\"font-size:15px\">Apropiaci\u00f3 de cultura de Ciberseguretat Industrial daplicaci\u00f3 immediata en processos de digitalitzaci\u00f3 en entorns operacionals.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238703\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTINGUTS<\/strong><\/h6><div id=\"ac-238703\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Identificaci\u00f3 de les vulnerabilitats ICS.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Detecci\u00f3 i prevenci\u00f3 de les mateixes.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Simulaci\u00f3 d&#039;atacs a Xarxes Industrials OT a trav\u00e9s de Cyber Range<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Identificaci\u00f3 i implementaci\u00f3 d&#039;atacs DDOS.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Origen.<\/li>\n\n\n\n<li style=\"font-size:15px\">Detecci\u00f3.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Avaluaci\u00f3 escenaris de Ransonware OT\/IT<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Disseny segur de xarxes industrials amb bess\u00f3 digital.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Aplicaci\u00f3 de ferramentes de securitzaci\u00f3 de xarxes industrials<\/strong>.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-817a5ea2\"><div class=\"gb-container gb-container-817a5ea2\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-a5d3024b gb-headline-text alturaLinea\"><strong>M\u00f2dul 5<\/strong><span style=\"font-size:15px\"> (opcional)<\/span><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-3f54090e gb-headline-text\"><strong>T\u00c8CNIC DE SUPORT CERTIFICAT DE CISCO (CCST) CIBERSEGURETAT<\/strong> <span style=\"font-weight:400\">\u2013 120 H<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-007804b6 gb-headline-text\"><strong>Qu\u00e8 aprendr\u00e0s en aquest m\u00f2dul?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Habilitats vitals com a intel\u00b7lig\u00e8ncia d&#039;amenaces, seguretat de xarxes i gesti\u00f3 de riscos per protegir-te a tu mateix ia les organitzacions contra els atacs cibern\u00e8tics.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238704\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTINGUTS<\/strong><\/h6><div id=\"ac-238704\" class=\"c-accordion__content\">\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238705\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>1. Principis Essencials de Seguretat<\/strong>.<\/h6><div id=\"ac-238705\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.1. Definir els principis essencials de seguretat.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Vulnerabilitats, amenaces, exploits i riscos; vectors datac; enduriment; defensa en profunditat; confidencialitat, integritat i disponibilitat (CIA); tipus d&#039;atacants; raons per als atacs; codi d\u00e8tica.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.2. Explicar amenaces i vulnerabilitats comunes.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Malware, ransomware, denegaci\u00f3 de servei, botnets, atacs d&#039;enginyeria social (colat, spear phishing, phishing, vishing, smishing, etc.), atacs f\u00edsics, home al medi, vulnerabilitats d&#039;IoT, amenaces internes, Amena\u00e7a Persistent Avan\u00e7ada (APT).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.3. Explicar els principis de gesti\u00f3 dacc\u00e9s.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Autenticaci\u00f3, autoritzaci\u00f3 i comptabilitat (AAA); RADIUS; autenticaci\u00f3 multifactor (MFA); pol\u00edtiques de contrasenyes.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.4. Explicar m\u00e8todes i aplicacions de xifratge<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Tipus de xifratge, hash, certificats, infraestructura de clau p\u00fablica (PKI); algorismes de xifrat forts vs. febles; estats de dades i xifratge apropiat (dades en tr\u00e0nsit, dades en rep\u00f2s, dades en \u00fas); protocols que utilitzen xifratge.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238706\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>2. Conceptes b\u00e0sics de seguretat de xarxa.<\/strong><\/h6><div id=\"ac-238706\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\">   <strong>2.1. Descriure vulnerabilitats del protocol TCP\/IP<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 2.2. Explicar com les adreces de xarxa afecten la seguretat de la xarxa<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Adreces IPv4 i IPv6, adreces MAC, segmentaci\u00f3 de xarxa, notaci\u00f3 CIDR, NAT, xarxes p\u00fabliques vs. privades.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 2.3. Descriure la infraestructura i tecnologies de xarxa<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Arquitectura de seguretat de xarxa, DMZ, virtualitzaci\u00f3, n\u00favol, honeypot, servidor intermediari, IDS, IPS.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 2.4. Configurar una xarxa SoHo sense fil segura.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Filtratge d&#039;adreces MAC, est\u00e0ndards i protocols de xifratge, SSID.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 2.5. Implementar tecnologies d&#039;acc\u00e9s segur<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">ACL, tallafocs, VPN, NAC.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238707\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>3. Conceptes de seguretat de punts finals.<\/strong><\/h6><div id=\"ac-238707\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.1. Descriure conceptes de seguretat del sistema operatiu.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Windows, macOS i Linux; caracter\u00edstiques de seguretat, incloent Windows Defender i tallafocs basats en el host; CLI i PowerShell; permisos de fitxers i directoris; escalada de privilegis.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.2. Demostrar familiaritat amb eines de punts finals apropiades que recopilen informaci\u00f3 davaluaci\u00f3 de seguretat<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Netstat, nslookup, tcpdump,<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.3. Verificar que els sistemes de punts finals compleixin les pol\u00edtiques i els est\u00e0ndards de seguretat<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Inventari de maquinari (gesti\u00f3 d&#039;actius), inventari de programari, implementaci\u00f3 de programes, c\u00f2pies de seguretat de dades, compliment normatiu (PCI DSS, HIPAA, GDPR), BYOD (gesti\u00f3 de dispositius, xifratge de dades, distribuci\u00f3 d&#039;aplicacions, gesti\u00f3 de configuraci\u00f3).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.4. Implementar actualitzacions de programari i maquinari.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Actualitzacions de Windows, actualitzacions d&#039;aplicacions, controladors de dispositius, microprogramari, pegats.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.5. Interpretar registres del sistema<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Visor d&#039;esdeveniments, registres d&#039;auditoria, registres del sistema i aplicacions, syslog, identificaci\u00f3 d&#039;anomalies.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.6. Demostrar familiaritat amb l&#039;eliminaci\u00f3 de codi malici\u00f3s (malware).<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Escaneig de sistemes, revisi\u00f3 de registres d&#039;escaneig, remediaci\u00f3 de codi malici\u00f3s (malware).<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238708\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>4. Avaluaci\u00f3 de Vulnerabilitats i Gesti\u00f3 de Riscos.<\/strong><\/h6><div id=\"ac-238708\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.1. Explicar la gesti\u00f3 de vulnerabilitats<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Identificaci\u00f3, gesti\u00f3 i mitigaci\u00f3 de vulnerabilitats; reconeixement actiu i passiu; proves (exploraci\u00f3 de ports, automatitzaci\u00f3).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.2. Utilitzar t\u00e8cniques d&#039;intel\u00b7lig\u00e8ncia d&#039;amenaces per identificar les possibles vulnerabilitats de xarxa.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Usos i limitacions de bases de dades de vulnerabilitats; eines est\u00e0ndard de la ind\u00fastria utilitzades per avaluar vulnerabilitats i fer recomanacions, pol\u00edtiques i informes; Common Vulnerabilities and Exposures (CVE), informes de ciberseguretat, not\u00edcies de ciberseguretat, serveis de subscripci\u00f3 i intel\u00b7lig\u00e8ncia col\u00b7lectiva; intel\u00b7lig\u00e8ncia d&#039;amenaces ad hoc i automatitzada; la import\u00e0ncia d&#039;actualitzar la documentaci\u00f3 i d&#039;altres formes de comunicaci\u00f3 de manera proactiva abans, durant i despr\u00e9s d&#039;incidents de ciberseguretat; com assegurar, compartir i actualitzar la documentaci\u00f3.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.3. Explicar la gesti\u00f3 de riscos<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Vulnerabilitat vs. risc, classificaci\u00f3 de riscos, enfocaments per a la gesti\u00f3 de riscos, estrat\u00e8gies de mitigaci\u00f3 de riscos, nivells de risc (baix, mitj\u00e0, alt, extremadament alt), riscos associats amb tipus espec\u00edfics de dades i classificacions de dades, avaluacions de seguretat de sistemes de TI (seguretat de la informaci\u00f3, gesti\u00f3 del canvi, operacions d&#039;ordinadors, garantia d&#039;informaci\u00f3).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.4. Explicar la import\u00e0ncia de la recuperaci\u00f3 davant de desastres i la planificaci\u00f3 de continu\u00eftat del negoci.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Desastres naturals i provocats per humans, caracter\u00edstiques dels plans de recuperaci\u00f3 davant de desastres (DRP) i plans de continu\u00eftat del negoci (BCP), c\u00f2pies de seguretat, controls de recuperaci\u00f3 davant de desastres (detectius, preventius i correctius).<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238709\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong><\/strong><strong>5. Maneig d&#039;incidents.&nbsp;<\/strong><\/h6><div id=\"ac-238709\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.1. Monitoritzar esdeveniments de seguretat i saber quan cal escalar<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Rol de SIEM i SOAR, monitoritzaci\u00f3 de dades de xarxa per identificar incidents de seguretat (captures de paquets, diverses entrades de fitxers de registre, etc.), identificaci\u00f3 d&#039;esdeveniments sospitosos a mesura que ocorren.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.2. Explicar processos d&#039;inform\u00e0tica forense i d&#039;atribuci\u00f3 d&#039;atacs.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Cadena de Ciberatac, Matriz MITRE ATT&amp;CK i Model Diamond; T\u00e0ctiques, T\u00e8cniques i Procediments (TTP); fonts d&#039;evid\u00e8ncia (artefactes); manipulaci\u00f3 d\u201fevid\u00e8ncia (preservaci\u00f3 d\u201fevid\u00e8ncia digital, cadena de cust\u00f2dia).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.3. Explicar l&#039;impacte dels marcs de compliment en el maneig d&#039;incidents de seguretat<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Marcs de compliment (GDPR, HIPAA, PCI DSS, FERPA, FISMA), requisits d&#039;informes i notificacions.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.4. Descriure els elements de la resposta a incidents de ciberseguretat<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Elements de pol\u00edtiques, plans i procediments; etapes del cicle de vida de la resposta a incidents (NIST Publicaci\u00f3 Especial 800-61 seccions 2.3, 3.1-3.4).<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-58ba4186\"><div class=\"gb-container gb-container-58ba4186\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-ed07e4ff gb-headline-text alturaLinea\"><strong>Aconsegueix aquestes ins\u00edgnies\/certificacions professionals emeses per Cisco.<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-ea267901 gb-headline-text\">Un cop completada la formaci\u00f3 aconseguir\u00e0s certificacions amb qu\u00e8 destacar\u00e0s d&#039;altres professionals i acreditar\u00e0s que posseeixes les habilitats pr\u00e0ctiques crucials per avaluar i gestionar riscos, implementar mesures de seguretat en sistemes i xarxes i respondre efica\u00e7ment a incidents de seguretat.&nbsp;<\/p>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-82300d6b\">\n<div class=\"gb-grid-column gb-grid-column-73cc5a92\"><div class=\"gb-container gb-container-73cc5a92\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png\" alt=\"\" class=\"wp-image-23948\" style=\"width:216px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-cd62d9b9 gb-headline-text\"><strong>Ins\u00edgnia emesa per Cisco \u2013 Introducci\u00f3 a la ciberseguretat\u201d<\/strong><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-56985060\"><div class=\"gb-container gb-container-56985060\">\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png\" alt=\"\" class=\"wp-image-28464\" style=\"width:216px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png 225w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-100x100.png 100w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-0ce07209 gb-headline-text\"><strong>Certificaci\u00f3 Information Technology Specialist Cybersecurity.<\/strong><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-4f166549\"><div class=\"gb-container gb-container-4f166549\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png\" alt=\"\" class=\"wp-image-24536\" style=\"width:216px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-4804fa34 gb-headline-text\"><strong>Certificaci\u00f3 professional Cisco Certified Support Technician (CCST)<\/strong><\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-b6523983\" id=\"Titulaciones\"><div class=\"gb-inside-container\">\n<div class=\"gb-container gb-container-deb630b2\" id=\"Certificaciones\"><div class=\"gb-inside-container\">\n<div class=\"gb-container gb-container-3bbc27ea\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-47fe7bc8 gb-headline-text\"><strong>Titulacions<\/strong><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c7f3e5c2 gb-headline-text\">Completa aquesta formaci\u00f3 i aconsegueix 4 acreditacions!<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-370f17b3\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-9fd71857\">\n<div class=\"gb-grid-column gb-grid-column-5bde972a\"><div class=\"gb-container gb-container-5bde972a\">\n\n<p class=\"gb-headline gb-headline-6d015d3a\"><span class=\"gb-icon\"><svg aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill=\"currentColor\" d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\">Ins\u00edgnia CISCO: \u201c<strong>Introduction to Cybersecurity<\/strong>\u201d<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-47178458\"><span class=\"gb-icon\"><svg aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill=\"currentColor\" d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\">Titulaci\u00f3 Ciberseguretat avan\u00e7ada en entorns de les tecnologies de l&#039;operaci\u00f3, corresponent a l&#039;especialitat formativa IFCT0050.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-21f03310\"><span class=\"gb-icon\"><svg aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill=\"currentColor\" d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\">Dues certificacions professionals, Certificaci\u00f3 Information Technology Specialist Cybersecurity i <strong>Cisco Certified Support Technician Cybersecurity (CCST)<\/strong>, per superar el m\u00f2dul 5, que \u00e9s optatiu.<\/span><\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-b95e5366\" id=\"Preguntas\">\n<div class=\"gb-container gb-container-f80eb399\">\n<div class=\"gb-container gb-container-b0d16039\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-366de5c7\"><span class=\"gb-icon\"><svg fill=\"#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 16 16\"><g stroke-width=\"0\" id=\"SVGRepo_bgCarrier\"><\/g><g stroke-linejoin=\"round\" stroke-linecap=\"round\" id=\"SVGRepo_tracerCarrier\"><\/g><g id=\"SVGRepo_iconCarrier\"><path fill=\"#ccd8e0\" d=\"M2 5C.892 5 0 5.892 0 7v7c0 1.108.892 2 2 2h9c1.108 0 2-.892 2-2v-3.8L16 7h-3c0-1.108-.892-2-2-2zm4.438 2C7.75 6.926 8.926 7.936 9 9.25c0 1.121-.308 1.544-1.281 2.281a1.68 1.68 0 00-.281.25c-.04.05-.032.033-.032.031.006.423-.39.782-.812.782a.79.79 0 01-.781-.782c0-.401.179-.754.375-1a3.14 3.14 0 01.562-.562 3.85 3.85 0 00.563-.531c.074-.09.097-.24.093-.344v-.031a.785.785 0 00-.843-.75c-.451.025-.813.362-.851.758a.697.697 0 01-.718.648.816.816 0 01-.781-.594 1.725 1.725 0 01.01-.533c.005-.014.006-.03.012-.043.202-1.024 1.09-1.768 2.203-1.83zm.156 6.406a.82.82 0 01.812.813c0 .442-.37.781-.812.781a.768.768 0 01-.781-.781c0-.442.339-.813.78-.813zM2 1C.892 1 0 1.892 0 3v.568A3.918 3.918 0 012 3h9c1.376 0 2.55.763 3.268 1.848L16 3h-3c0-1.108-.892-2-2-2z\"><\/path><\/g><\/svg><\/span><span class=\"gb-headline-text\">Preguntes <strong style=\"background-image: linear-gradient(195deg,#e5ebf0,#e5e6e8);background-repeat: no-repeat;background-position: 9px bottom;background-size: 100% 17px;border-radius: 110px;\">freq\u00fcents<\/strong><\/span><\/h2>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-5b986796\">\n<div class=\"gb-grid-column gb-grid-column-013120d8\"><div class=\"gb-container gb-container-013120d8\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387010\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong><\/strong><strong>Quan comen\u00e7a?<\/strong><\/button><div id=\"ac-2387010\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-0da6209b gb-headline-text\">La formaci\u00f3 comen\u00e7a en els propers 15 dies i t\u00e9 una durada de 3 setmanes.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-782db725\"><div class=\"gb-container gb-container-782db725\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387011\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong><\/strong><strong><\/strong><strong><\/strong><strong>T\u00e9 cap cost?<\/strong><\/button><div id=\"ac-2387011\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-3483b57e gb-headline-text\">No, ni la formaci\u00f3 ni l&#039;emissi\u00f3 del t\u00edtol, la ins\u00edgnia ni la certificaci\u00f3 tenen cap tipus de cost per a l&#039;alumnat.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-ff1280e6\"><div class=\"gb-container gb-container-ff1280e6\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387012\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong><\/strong><strong><\/strong><strong>Quantes hores al dia he de dedicar al curs? Puc connectar-me quan vulgui?<\/strong><\/button><div id=\"ac-2387012\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-dc46bca0 gb-headline-text\">Aproximadament, 17 a la setmana en horari flexible, tu decideixes quan completar els continguts de la plataforma. Addicionalment s&#039;impartiran masterclass i convocaran tutories grupals a qu\u00e8 podr\u00e0s assistir en directe o visualitzar l&#039;enregistrament. Hi haur\u00e0 un control daprenentatge en finalitzar cada m\u00f2dul.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-55ee6ff5\"><div class=\"gb-container gb-container-55ee6ff5\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387013\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong>Quins requisits he de complir perqu\u00e8 se m&#039;admeti al curs?<\/strong><\/button><div id=\"ac-2387013\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-db2277b1 gb-headline-text\">\u2013 Estar treballant per compte d&#039;altri, aut\u00f2nom, funcionari o ser demandant de feina.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-8edef9c9 gb-headline-text\">\u2013 Tenir nivell acad\u00e8mic Batxillerat o superior.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7582fbda gb-headline-text\">\u2013 Comprom\u00eds per dedicar prou temps per treure partit de la formaci\u00f3.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-49703dee\"><div class=\"gb-container gb-container-49703dee\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387014\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong>Per fer la formaci\u00f3 s&#039;obtenen les 4 acreditacions?&nbsp;<\/strong><\/button><div id=\"ac-2387014\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-c7c76d77 gb-headline-text\">S\u00ed. Quan completis els 4 primers m\u00f2duls rebr\u00e0s la credencial CISCO &#039;Introduction to Cybersecurity&#039; i la titulaci\u00f3 &#039;Ciberseguretat avan\u00e7ada en entorns de les tecnologies de l&#039;operaci\u00f3&#039;. Posteriorment, si vols obtenir la certificaci\u00f3 CCST de CISCO i la certificaci\u00f3 IT Specialist Cybersecurity, tindr\u00e0s un termini addicional de 2 mesos per completar el m\u00f2dul 5.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-8a324a98 alignfull\" id=\"form\">\n<div class=\"gb-container gb-container-81c2cbc7\">\n\n<h2 class=\"gb-headline gb-headline-042e0e92 gb-headline-text colorBlanco\">Inscripcions tancades!<\/h2>\n\n\n\n<h2 class=\"gb-headline gb-headline-9b5ed2d6 gb-headline-text\">Inscripci\u00f3 al curs <strong style=\"background-image: linear-gradient(195deg,#e5ebf0,#e5e6e8);background-repeat: no-repeat;background-position: 9px bottom;background-size: 100% 17px;border-radius: 110px;\">Ciberseguretat avan\u00e7ada en entorns de les tecnologies de l&#039;operaci\u00f3&nbsp;<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-default\" style=\"background-color:#dadadd;color:#dadadd\"\/>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:15px\">Si necessites suport per completar la teva inscripci\u00f3 escriu per <strong><a href=\"https:\/\/wa.me\/657096465\" rel=\"noopener\">WhatsApp al +34657096465<\/a><\/strong><\/p>\n\n\n\n\n\n\n\n<script>\ndocument.addEventListener('DOMContentLoaded', function() {\n    var dniInput = document.getElementById('wpforms-24333-field_53');\n    var submitButton = document.getElementById('wpforms-submit24333'); \/\/ Obtener el bot\u00f3n de env\u00edo\n    var validityText = document.createElement('span');\n    validityText.style.display = 'block';\n    validityText.style.fontSize = '12px';\n    dniInput.parentNode.insertBefore(validityText, dniInput.nextSibling);\n\n    dniInput.addEventListener('blur', function() {\n        var dniValue = dniInput.value.trim();\n        var isValid = validateDNIorNIE(dniValue);\n\n        if (!isValid) {\n            dniInput.style.color = 'red';\n            validityText.innerHTML = '<strong>N\u00famero de documento no reconocido (DNI o NIE)<\/strong>';\n            validityText.style.color = 'red';\n            submitButton.classList.add('noapto'); \/\/ A\u00f1adir clase noapto\n        } else {\n            dniInput.style.color = 'green';\n            validityText.textContent = 'Documento v\u00e1lido (DNI O NIE)';\n            validityText.style.color = 'black';\n            submitButton.classList.remove('noapto'); \/\/ Remover clase noapto\n        }\n    });\n});\n\nfunction validateDNIorNIE(dni) {\n    var regularExpression = \/^[XYZ]?\\d{7,8}[A-Z]$\/;\n    dni = dni.toUpperCase();\n\n    if (regularExpression.test(dni)) {\n        var numero = dni.substr(0, dni.length - 1);\n        numero = numero.replace('X', 0);\n        numero = numero.replace('Y', 1);\n        numero = numero.replace('Z', 2);\n\n        var letra = dni.substr(dni.length - 1, 1);\n        numero = parseInt(numero) % 23;\n\n        var letrasValidas = 'TRWAGMYFPDXBNJZSQVHLCKE';\n        var letraCalculada = letrasValidas.charAt(numero);\n\n        return letra === letraCalculada;\n    } else {\n        return false;\n    }\n}\n<\/script>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0c65008e alignfull\" id=\"Footer\">\n<div class=\"gb-container gb-container-eb0e37e8\">\n\n<p class=\"gb-headline gb-headline-c8446db7 gb-headline-text\">Programa formatiu dissenyat i impartit per:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"59\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1024x59.png\" alt=\"\" class=\"wp-image-35529\" style=\"width:788px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1024x59.png 1024w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-300x17.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-768x44.png 768w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1536x88.png 1536w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-2048x117.png 2048w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-18x1.png 18w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-500x29.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-800x46.png 800w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1280x73.png 1280w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1920x110.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"gb-container gb-container-37be2a33\">\n\n<a class=\"gb-button gb-button-d04c774a gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/aviso-legal-2\/\">Av\u00eds legal<\/a>\n\n\n\n<a class=\"gb-button gb-button-a70fffe9 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/politica-de-cookies\/\">Pol\u00edtica de cookies<\/a>\n\n\n\n<a class=\"gb-button gb-button-0005add3 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/ciberseguridad\/ciberseguridad-politica-de-privacidad\/\">Pol\u00edtica de privadesa<\/a>\n\n\n\n<a class=\"gb-button gb-button-9b3d0d1b gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Politica-del-Sistema-de-Gestion-de-Servicios-TI-01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pol\u00edtica del SGSTI<\/a>\n\n\n\n<a class=\"gb-button gb-button-6b8132bc gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Politica-del-Sistema-Integrado-02.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pol\u00edtica del sistema integrat<\/a>\n\n\n\n<a class=\"gb-button gb-button-4afd23b1 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Politica-del-Sistema-de-Gestion-de-Accesibilidad-01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Pol\u00edtica del sistema de gesti\u00f3 d&#039;accessibilitat<\/a>\n\n\n\n<a class=\"gb-button gb-button-644dc55b gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/calidad-igualdad-y-conciliacion\/\">Qualitat, igualtat i conciliaci\u00f3<\/a>\n\n\n\n<a class=\"gb-button gb-button-19d22760 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/canal-de-denuncias\/\">Canal de den\u00fancies<\/a>\n\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-b95d2c8b gb-headline-text\">\u00a9 Mainjobs | Internacional educativa i tecnol\u00f2gica | 2025<\/p>\n\n<\/div>\n<\/div>\n\n\n\n\n\n\n<script>\n\/\/ Funci\u00f3n para verificar y reemplazar el texto\nfunction verificarYReemplazar() {\n    var elemento = document.getElementById(\"wpforms-confirmation-24333\");\n    if (elemento) {\n        var texto = elemento.innerHTML; \/\/ Obtener el contenido HTML\n        if (texto.includes(\"{nombre de archivo}\")) {\n            texto = texto.replace(\"{nombre de archivo}\", \"Descargar copia PDF cumplimentado\");\n            elemento.innerHTML = texto; \/\/ Aplicar el texto modificado\n\n            \/\/ Restaurar el enlace original si estaba presente\n            var enlaceOriginal = elemento.querySelector('a');\n            if (enlaceOriginal) {\n                elemento.appendChild(enlaceOriginal); \/\/ Reinsertar el enlace original\n            }\n        }\n    }\n}\n\n\/\/ Observador de mutaciones para detectar cambios en el DOM\nvar observer = new MutationObserver(function(mutations) {\n    mutations.forEach(function(mutation) {\n        if (mutation.type === \"childList\") {\n            verificarYReemplazar();\n        }\n    });\n});\n\n\/\/ Configuraci\u00f3n del observador de mutaciones\nvar config = { childList: true, subtree: true };\n\n\/\/ Observar cambios en el DOM\nobserver.observe(document.body, config);\n\n\/\/ Llamar a la funci\u00f3n de verificaci\u00f3n y reemplazo inicialmente\nverificarYReemplazar();\n<\/script>\n\n\n\n<script>\njQuery(document).ready(function() {\n  \/\/ Obtener la URL actual\n  var url = new URL(window.location.href);\n  var urlParams = url.searchParams;\n\n  \/\/ Obtener todos los par\u00e1metros de la URL\n  var params = {};\n  for (var pair of urlParams.entries()) {\n    params[pair[0]] = pair[1];\n  }\n\n  \/\/ Seleccionar todos los enlaces de la p\u00e1gina\n  var allLinks = jQuery('a');\n\n  \/\/ Iterar a trav\u00e9s de todos los enlaces\n  allLinks.each(function(index, element) {\n    var currentHref = jQuery(element).attr('href');\n\n    \/\/ Verificar si el enlace actual existe y no es una ancla\n    if (currentHref && !currentHref.startsWith('#')) {\n      \/\/ Convertir rutas relativas a URLs absolutas\n      var updatedHref = isAbsoluteURL(currentHref) ? currentHref : new URL(currentHref, window.location.origin).href;\n\n      \/\/ Combinar par\u00e1metros existentes con par\u00e1metros de la URL actual\n      var updatedParams = new URL(updatedHref);\n      for (var param in params) {\n        if (params.hasOwnProperty(param) && !updatedParams.searchParams.has(param)) {\n          updatedParams.searchParams.set(param, params[param]);\n        }\n      }\n\n      \/\/ Actualizar el atributo href del enlace con los par\u00e1metros combinados\n      jQuery(element).attr('href', updatedParams.href);\n    }\n  });\n});\n\n\/\/ Funci\u00f3n para verificar si una URL es absoluta\nfunction isAbsoluteURL(url) {\n  return \/^https?:\\\/\\\/\/i.test(url);\n}\n\n<\/script>\n<style class=\"advgb-styles-renderer\">\n\n\n.gb-container-465d6c75 {\n    display: none;\n}\n\nfooter{\ndisplay:none;\n}\n\nblockquote ul li, .tab-pane ul li, .container-general ul li {\n    list-style: disc;\n    margin-left: 25px;\n}\n\n@import url('https:\/\/fonts.googleapis.com\/css2?family=Inter:wght@100;200;300;400;500;600;700;800&display=swap');\n\nbody, button, input, select, textarea {\n    font-family: 'Inter', sans-serif!important;\n}\n\nh1,h2,h3,h4,h5,h6{\n\t\tfont-family: 'Inter', sans-serif!important;\n}\n\nh6{\nfont-size:15px;\n}\n@media (max-width: 991px){\n.contentPrincipal {\n    margin-top: 0px;\n}}\n\n\/* Ancho completo sin caja *\/\n\n#caja{\nwidth:100%;\n}\n\n#caja .col-xs-12 {\n    padding-right: 0;\n    padding-left: 0;\n}\n\n.container-general {\n    padding: 0px 0;\nbackground-color: #ffffff;\n\n}\n\n.logotipo img {\n    margin-left: 15px;\n    OBJECT-FIT: contain;\n    max-width: 200px;\n\t  object-position: center center;\n    max-height:50px;\n}\n\n.site-logo-container img {\n    width: auto;\n    max-width: 100%;\n    object-fit: contain;\n\t  max-height:50px;\n}\n\n.banner{\n\t  width: 530px;\n    height: auto;\n    object-fit: contain;\n}\n\n@media only screen and (max-width: 768px) {\n  .logotipo img {\n    margin-left: 15px;\n    OBJECT-FIT: contain;\n    max-width: 200px;\n\t  object-position: center center;\n    max-height:30px;\n}\n}\n\n\nimg {\n  \/* Ocultar el atributo 'title' *\/\n  pointer-events: none; \/* Evitar que se muestre la informaci\u00f3n emergente *\/\n}\n\n.site-logo-container {\n    height: auto;\n}\n\np {\n    margin-bottom: 5px;\n}\n\na {\n\ttext-decoration:none;\n}\n\n.hero-section .ct-container-narrow {\n    max-width: 100%;\n}\n\n.hero-section .ct-container-narrow {\n    width: 100%;\n}\n\n.sticky-container  {\n    position: sticky;\n    position: -webkit-sticky;\n    top: -1px;\n    z-index:99999;\n}\n\n#main li {\n    margin-bottom: 1.5em;\n}\n\n.sinEnlace{\n\tpointer-events: none;\n  cursor: default;\n}\n\n.sticky-container a {\n   text-decoration:none;\n}\n\n.sticky-container {\n    z-index: 2;\n}\n\n.logotipo img{\n\tmargin-left:15px;\n}\n.entry-content>* {\n    margin-bottom: 0;\n}\n\n.ct-featured-image {\n    padding-bottom: 15px!IMPORTANT;\n}\n\n\/* Estilo acorde\u00f3n *\/\n\n\n.c-accordion__title {\n    cursor: pointer;\n    padding-right: 2rem;\n    position: relative;\n    background-color: whitesmoke;\n    padding: 15px 35px 15px 15px;\n    border-radius: 5px;\n}\n\n.c-accordion__title:after {\n    font-weight: 600;\n    right: 10px;\n}\n\n.c-accordion__content {\n    padding: 0 15px;\n}\n\n.search-form{\n\tdisplay:none;\n}\n\n#cmplz-document, .editor-styles-wrapper .cmplz-unlinked-mode {\n    max-width: 1200px;\n}\n\n.wpforms-container .wpforms-field {\n    padding: 5px 0;\n    position: relative;\n}\n\n\n\/* Curso *\/\n\n.acordeon {\n  background-color: white;\n  box-shadow: 1px 0px 20px 0px #adadad36;\n  padding: 10px 20px;\n  border-radius: 15px;\n  margin-bottom: 15px;\n}\n\n.sinContenido{\n\tpointer-events: none;\n  cursor: default;\n\tpadding: 0px 20px;\n}\n\n.sinContenido .c-accordion__title::after{\n\tdisplay:none;\n}\n\n.c-accordion__title {\n  margin: 0;\n}\n\n.c-accordion__title::after {\n    color: #115e91;\n    font-weight: 600;\n}\n\n.c-accordion__title {\n    background-color: white;\n    padding: 15px 35px 15px 15px;\n}\n.entry-content h6{\nmargin-bottom:0!important;\n}\n.gutentor-module-tabs-item {\n  background-color: #0e1e3d;\n  color: #f1c430;\nborder-radius: 5px;\n}\n\n.gutentor-tabs-nav-active {\n  background-color: #f3cb3d;\n  color: #0e1e3d;\nborder-radius: 5px;\n}\n\n.wp-embed-responsive .wp-has-aspect-ratio iframe {\n    border-radius: 10px;\n}\n\n.gutentor-slick-arrows {\n    left: 46%!important;\n}\n\n.gutentor-module.gutentor-module-carousel .slick-arrow {\n    height: 35px;\n    background-color: #f1c433;\n    border-radius: 5px;\n}\n\n.gutentor-module-carousel .gutentor-slick-arrows, .gutentor-post-module .gutentor-slick-arrows, .gutentor-term-module .gutentor-slick-arrows {\n    display: -ms-flexbox;\n    display: flex;\n    justify-content: center;\n}\n\n.slick-track {\n    display: flex;\n    align-items: center;\n    justify-content: center;\n}\n\n.exp_logo{\n    max-height: 60px;\n    width: auto;\n    max-width: 150px;\n}\n\n.expertoImg{\npointer-events: none;\n}\n\n#caja-expert .gb-grid-column:first-child .gb-container{\n    background-color: #0e1e3d!important;\n    color: white!important;\n}\n\n#caja-expert .gb-grid-column:first-child h2 a {\n    color: #ffffff!important;\n}\n\n.latido{\nanimation: zoom-in-zoom-out 2s ease infinite;\n}\n\n@keyframes zoom-in-zoom-out {\n  0% {\n    transform: scale(1, 1);\n  }\n  50% {\n    transform: scale(1.05, 1.05);\n  }\n  100% {\n    transform: scale(1, 1);\n  }\n}\n\n.degradado2 {\nbackground: linear-gradient(90deg, rgba(11,6,89,0) 0%, #0e6387 35%, rgb(29 125 165) 50%, #0e6387 68%, rgba(16,32,68,0) 100%);\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n}\n\n\/* Chrome, Safari, Opera *\/\n@-webkit-keyframes test {\n    50% {letter-spacing: 1px;}\n}\n\/* Standard syntax *\/\n@keyframes test {\n    50% {letter-spacing: 1px;}\n}\n\n.sombra{\n\t    box-shadow: 1px 0px 20px 0px #adadad36;\n\tborder-radius:15px;\n}\n\n.ct-image-container{\n\t-webkit-transition: all .2s ease;\n\t-moz-transition: all .2s ease;\n\t-o-transition: all .2s ;\n\t-ms-transition: all .2s ease;\n}\n\narticle .ct-image-container img {\n\t-webkit-transition: all .2s ease;\n\t-moz-transition: all .2s ease;\n\t-o-transition: all .2s ease-in;\n\t-ms-transition: all .2s ease;\n\ttransform: scale(1.01);\n\timage-rendering: -moz-crisp-edges;         \/* Firefox *\/\n  image-rendering:   -o-crisp-edges;         \/* Opera *\/\n  image-rendering: -webkit-optimize-contrast;\/* Webkit (non-standard naming) *\/\n  image-rendering: crisp-edges;\n  -ms-interpolation-mode: nearest-neighbor;  \/* IE (non-standard property) *\/\n}\n\n\narticle:hover .ct-image-container{\n\tfilter: brightness(0.9);\n\n}\n\narticle:hover .ct-image-container img{\ntransform: scale(1.05) perspective(1000px);\n}\n\n.entries article h2 a{\n\toverflow: hidden;\n    display: -webkit-box;\n    -webkit-line-clamp: 2;\n    -webkit-box-orient: vertical;\n\tmin-height:40px;\n}\n\n[data-archive=default][data-layout*=grid] .entry-card>*:not(:last-child).entry-meta, [data-archive=default][data-layout=classic] .entry-card>*:not(:last-child).entry-meta, [data-archive=default][data-layout=simple] .card-content>*:not(:last-child).entry-meta {\n    margin-bottom: 0;\n}\n\n\n.entry-meta [data-type=pill] a {\n    background: #156b9000;\n    --linkInitialColor: #3a4f66;\n    --linkHoverColor: #156b90;\n}\n\n.entry-meta [data-type=pill] a:hover {\n    background: #156b9000;\n    --linkInitialColor: #156b90;\n    --linkHoverColor: #156b90;\n}\n\n\/* Formulario Valorian *\/\n\n.valorian{\n\tdisplay:none;\n}\n\n.test{\n\tdisplay:none;\n}\n\n#main li {\n    margin-bottom: 0.5em;\n}\n\n.hide{\n\tdisplay:none!important;\n}\n\n.entry-button {\n    font-weight: 800;\n}\n\n.nodeco a{\n\ttext-decoration:none;\n}\n\n.sombra{\n\tbox-shadow: 0px 4px 20px 0px #cacacac7;\n}\n\n\n\n.maso-card{\n\ttransition:0.5s;\n}\n\n.maso-card:hover{\n\ttransform: translateY(-10px);\n}\n\n.ct-header-cta [data-size=medium] {\n    --theme-button-min-height: 35px;\n    --theme-button-padding: 3px 20px;\n}\n\n.ct-header .ct-button:hover {\n    background-color:white;\n\t  color:#158bbd;\n\t  border:2px solid #158bbd;\n}\n\n.ct-header .ct-button{\n\t  border:2px solid #158bbd;\n}\n\n\n\n.footerEnlace{\n\tborder-bottom:1px solid transparent;\n}\n\n.footerEnlace:hover{\n\tborder-bottom: 1px solid #e3e3e3;\n}\n\n.bi-box-arrow-in-right{\n\tmargin-right:5px;\n}\n\n.campusCont{\n    border-left: 2px solid #1b7aa1;\n    border-right: 2px solid #1c7ca4;\n    padding: 0px 10px 0px 5px;\n    display: inline-flex;\n}\n\n.degradado {\n    background-color: var(--amarillo-eip);\n    background-image: linear-gradient(195deg, #0b506d, #1d7ca4);\n    color: #ffffff!important;\n    transition: 0.4s;\n}\n\n.degradado:hover {\n    background-image: linear-gradient(195deg, #f2f5f7, #e1e8ed);\n    color: #0b506d!important;\n}\n\n.degradado2 {\n background: linear-gradient(90deg, rgba(11,6,89,0) 0%, #0e6387 35%, rgb(29 125 165) 50%, #0e6387 68%, rgba(16,32,68,0) 100%);\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n}\n\n:where(.is-layout-flex) {\n    gap: 0.5em;\n}\n\n.animado{\n\ttransition: all 0.5s ease;\n}\n\n.animado:hover {\n\tbox-shadow: 0 0 10px 0 rgba(0,0,0,0.1);\n    transform: translate3d(0,-10px,0);\n}\n\n.ct-menu-link:not(:empty) {\n    padding: 0;\n}\n\n.latido {\n    animation: zoom-in-zoom-out 2s ease infinite;\n}\n\n.boton .wp-block-button__link {\n    background-image: linear-gradient(195deg, #f2f5f7, #e1e8ed);\n    font-weight: 600;\n    font-size: 19px;\n    padding: 10px 20px;\n    border-radius: 10px;\n}\n\n.caja{\n\tbox-shadow: 0 1px 5px 0 #d8d8d8;\n}\n\n#main li {\n    margin-bottom: 0;\n}\n\n.wp-block-table {\n    margin: 0 0 1em;\n}\n\n.sombraProfesorado{\n\tbox-shadow: 0 0 14px 0 rgba(0,0,0,0.1);\n}\n\n\n.boton2{\n\ttransition: all 0.5s ease;\n}\n\n.boton2:hover{\n    transform: translate3d(0px,-5px,0);\n}\n\n.wp-block-video video {\n    vertical-align: middle;\n    width: 100%;\n    border-radius: 10px;\n}\n\n.post-edit-link{\n\tdisplay:none;\n}\n\n.wp-block-table.is-style-stripes tbody tr:nth-child(odd) {\n    background-color: #fcfcfc;\n}\n\n.wp-block-table table:not(.has-border-color) thead, .wp-block-table table:not(.has-border-color) tfoot, .wp-block-table table:not(.has-border-color) td, .wp-block-table table:not(.has-border-color) th {\n    border-color: #f4f3f3;\n}\n\n.site-branding{\n\tpointer-events:none;\n}\n\n.botonForm:hover{\n\t    background-image: linear-gradient(195deg, #e1e8ed, #f2f5f7);\n}\n\n.acordeonMovil .c-accordion__title {\n    background-color: #ffffffd9;\n    padding: 5px 15px 5px 15px;\n    margin: 0 20px;\n\t  margin-bottom:15px;\n\tborder-radius:15px;\n}\n\n.acordeonMovil .acordeon { \n    padding: 10px 0px; \n}\n\n.hide{display:none!important;}\n\n.mensajeOculto {display:none;}\n\n\n.noapto{\n\tfilter: blur(1px);\n  pointer-events: none;\n}\n\ninput, textarea, select {\n    border: 1px solid #bdbbbb!important;\nborder-radius:2px;\n}\n\ndiv.wpforms-container-full .wpforms-form input[type=submit], div.wpforms-container-full .wpforms-form button[type=submit], div.wpforms-container-full .wpforms-form .wpforms-page-button {\n    background-color: #216f9f;\n    border: 1px solid #396b8b;\n    color: #fff;\n    font-size: 1em;\n    font-family: inherit;\n    padding: 10px 15px;\n    text-transform: uppercase;\n    font-weight: 600;\n}\n\ndiv.wpforms-container-full .wpforms-form button[type=submit]:hover {\n    background-color: #ddd;\n    border: 1px solid #d5d5d5;\n    cursor: pointer;\n    color: black;\n}\n\ninput:active, input:focus {\n    border-bottom: 1px solid #216f9f!important;\n}\n\n.dashicons-download:before {\n    font-size: 20px;\n    color: red;\n}\n\ndiv.wpforms-container-full .wpforms-form .wpforms-field-label {\n    font-size: 14px; \n}\n\ndiv.wpforms-container-full .wpforms-form ul li {\n    margin-bottom: 0;\n}\n\ndiv.wpforms-container-full .wpforms-form .wpforms-field-label-inline {\n    font-size: 14px;\n}\n\ndiv.wpforms-container-full .wpforms-form .wpforms-field {\n    padding: 5px 0;\n}\n<\/style>","protected":false},"excerpt":{"rendered":"<p>\u00a1Plazas agotadas! Esta formaci\u00f3n est\u00e1 dirigida a:&nbsp; Claustro docente: Contenidos: Titulaciones Completa esta formaci\u00f3n y \u00a1consigue 4 acreditaciones! Preguntas frecuentes \u00a1Inscripciones cerradas! Inscripci\u00f3n al curso Ciberseguridad avanzada en entornos de [&hellip;]<\/p>","protected":false},"author":9192287,"featured_media":21575,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","_joinchat":[],"footnotes":""},"class_list":["post-23870","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/projects.grupomainjobs.com\/ca\/author\/jajimenez\/","display_name":"jajimenez"},"relative_dates":{"created":"Posted 2 anys ago","modified":"Updated 5 mesos ago"},"absolute_dates":{"created":"Posted on febrer 12, 2024","modified":"Updated on novembre 11, 2025"},"absolute_dates_time":{"created":"Posted on febrer 12, 2024 17:44","modified":"Updated on novembre 11, 2025 18:21"},"featured_img_caption":"","featured_img":"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2023\/11\/Software-Ciberseguridad.jpg","series_order":"","_links":{"self":[{"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/pages\/23870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/users\/9192287"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/comments?post=23870"}],"version-history":[{"count":176,"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/pages\/23870\/revisions"}],"predecessor-version":[{"id":42022,"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/pages\/23870\/revisions\/42022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/media\/21575"}],"wp:attachment":[{"href":"https:\/\/projects.grupomainjobs.com\/ca\/wp-json\/wp\/v2\/media?parent=23870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}