
{"id":23870,"date":"2024-02-12T17:44:58","date_gmt":"2024-02-12T16:44:58","guid":{"rendered":"https:\/\/projects.grupomainjobs.com\/?page_id=23870"},"modified":"2025-11-11T18:21:42","modified_gmt":"2025-11-11T17:21:42","slug":"ciberseguridad","status":"publish","type":"page","link":"https:\/\/projects.grupomainjobs.com\/eng\/ciberseguridad\/","title":{"rendered":"Cybersecurity online course in industry 4.0"},"content":{"rendered":"<div class=\"gb-container gb-container-eb064240 alignfull\" id=\"Encabezado\">\n<div class=\"gb-container gb-container-16d71472\">\n\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"59\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1024x59.png\" alt=\"\" class=\"wp-image-23876\" style=\"width:942px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1024x59.png 1024w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-300x17.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-768x44.png 768w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1536x88.png 1536w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-2048x117.png 2048w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-18x1.png 18w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-500x29.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-800x46.png 800w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1280x73.png 1280w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/logos-cat-y-mainjobs-svg-1920x110.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n<\/div>\n<\/div>\n\n\n<div class=\"wp-block-nk-awb nk-awb has-0-b-506-d-background-color has-background\"><div class=\"nk-awb-wrap\" style=\"background:#0b506d\" data-awb-type=\"video\" data-awb-video=\"mp4:https:\/\/sepebarcelona.projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Barcelona-video.mp4\" data-awb-video-mobile=\"true\"><div class=\"nk-awb-inner\" style=\"opacity: 0.15;\"><\/div><\/div><div class=\"nk-awb-wrap-content is-layout-constrained wp-block-nk-awb-is-layout-constrained\"><div class=\"gb-container gb-container-1aa9fcd0\">\n<div class=\"gb-container gb-container-024306a6\">\n\n<h1 class=\"gb-headline gb-headline-48d9fccc gb-headline-text colorBlanco\">Join the community of 4,000 professionals that will make industry 4.0 companies safer<\/h1>\n\n\n<div class=\"gb-container gb-container-38adc1c4\">\n\n<h1 class=\"gb-headline gb-headline-bf6d9ed0 gb-headline-text colorBlanco\">Cybersecurity online course in industry 4.0<\/h1>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-8f0bf6e6 latido\">\n\n<div class=\"wp-block-group is-nowrap is-layout-flex wp-container-core-group-is-layout-ad2f72ca wp-block-group-is-layout-flex\"><div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png\" alt=\"\" class=\"wp-image-23948\" style=\"width:207px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><img decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png\" alt=\"\" class=\"wp-image-28464\" style=\"width:207px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png 225w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-100x100.png 100w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure>\n<\/div>\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png\" alt=\"\" class=\"wp-image-24536\" style=\"width:207px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div><\/div>\n\n\n\n<p class=\"gb-headline gb-headline-d4b0f6f4 gb-headline-text\" data-aos=\"fade-down\" data-aos-duration=\"1000\"><strong>Include these certifications on your CV and LinkedIn profile.<\/strong><\/p>\n\n<\/div>\n\n<div class=\"gb-container gb-container-f0739f6f\">\n\n<a class=\"gb-button gb-button-68527627 gb-button-text botonForm\" href=\"#form\">Get your place at no cost<\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n\n\n\n<h2 class=\"gb-headline gb-headline-b69f383d gb-headline-text colorBlanco\"><strong>Sold out!<\/strong>! <\/h2>\n\n\n\n\n\n\n<div class=\"gb-container gb-container-a9a52ae0 alignfull\" id=\"Presentaci\u00f3n\">\n<div class=\"gb-container gb-container-83126d3b\">\n<div class=\"gb-container gb-container-a7b48c2b\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-ca82d586\">\n<div class=\"gb-grid-column gb-grid-column-2c9626aa\"><div class=\"gb-container gb-container-2c9626aa caja\">\n\n<p class=\"gb-headline gb-headline-5c2a5195\"><span class=\"gb-icon\"><svg viewbox=\"0 0 24 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"SVGRepo_bgCarrier\" stroke-width=\"0\"><\/g><g id=\"SVGRepo_tracerCarrier\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/g><g id=\"SVGRepo_iconCarrier\"> <\/g><g id=\"style=bulk\"> <\/g><g id=\"check-circle\"> <path id=\"vector (Stroke)\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1.25 12C1.25 6.06294 6.06294 1.25 12 1.25C17.9371 1.25 22.75 6.06294 22.75 12C22.75 17.9371 17.9371 22.75 12 22.75C6.06294 22.75 1.25 17.9371 1.25 12Z\" fill=\"#e1e8ed\"><\/path> <path id=\"vector (Stroke)_2\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.5303 8.96967C16.8232 9.26256 16.8232 9.73744 16.5303 10.0303L11.9041 14.6566C11.2207 15.34 10.1126 15.34 9.42923 14.6566L7.46967 12.697C7.17678 12.4041 7.17678 11.9292 7.46967 11.6363C7.76256 11.3434 8.23744 11.3434 8.53033 11.6363L10.4899 13.5959C10.5875 13.6935 10.7458 13.6935 10.8434 13.5959L15.4697 8.96967C15.7626 8.67678 16.2374 8.67678 16.5303 8.96967Z\" fill=\"#0e1e3d\"><\/path> <\/g>  <\/svg><\/span><span class=\"gb-headline-text\">Theoretical-practical training with a cyberattack simulation system.&nbsp;<\/span><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-ed032fc5\"><div class=\"gb-container gb-container-ed032fc5 caja\">\n\n<p class=\"gb-headline gb-headline-92f4b785\"><span class=\"gb-icon\"><svg viewbox=\"0 0 24 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"SVGRepo_bgCarrier\" stroke-width=\"0\"><\/g><g id=\"SVGRepo_tracerCarrier\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/g><g id=\"SVGRepo_iconCarrier\"> <\/g><g id=\"style=bulk\"> <\/g><g id=\"check-circle\"> <path id=\"vector (Stroke)\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1.25 12C1.25 6.06294 6.06294 1.25 12 1.25C17.9371 1.25 22.75 6.06294 22.75 12C22.75 17.9371 17.9371 22.75 12 22.75C6.06294 22.75 1.25 17.9371 1.25 12Z\" fill=\"#e1e8ed\"><\/path> <path id=\"vector (Stroke)_2\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.5303 8.96967C16.8232 9.26256 16.8232 9.73744 16.5303 10.0303L11.9041 14.6566C11.2207 15.34 10.1126 15.34 9.42923 14.6566L7.46967 12.697C7.17678 12.4041 7.17678 11.9292 7.46967 11.6363C7.76256 11.3434 8.23744 11.3434 8.53033 11.6363L10.4899 13.5959C10.5875 13.6935 10.7458 13.6935 10.8434 13.5959L15.4697 8.96967C15.7626 8.67678 16.2374 8.67678 16.5303 8.96967Z\" fill=\"#0e1e3d\"><\/path> <\/g>  <\/svg><\/span><span class=\"gb-headline-text\">3 weeks. Format: online learning.<\/span><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-d6e2ced9\"><div class=\"gb-container gb-container-d6e2ced9 caja\">\n\n<p class=\"gb-headline gb-headline-189760c7\"><span class=\"gb-icon\"><svg viewbox=\"0 0 24 24\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><g id=\"SVGRepo_bgCarrier\" stroke-width=\"0\"><\/g><g id=\"SVGRepo_tracerCarrier\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/g><g id=\"SVGRepo_iconCarrier\"> <\/g><g id=\"style=bulk\"> <\/g><g id=\"check-circle\"> <path id=\"vector (Stroke)\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M1.25 12C1.25 6.06294 6.06294 1.25 12 1.25C17.9371 1.25 22.75 6.06294 22.75 12C22.75 17.9371 17.9371 22.75 12 22.75C6.06294 22.75 1.25 17.9371 1.25 12Z\" fill=\"#e1e8ed\"><\/path> <path id=\"vector (Stroke)_2\" fill-rule=\"evenodd\" clip-rule=\"evenodd\" d=\"M16.5303 8.96967C16.8232 9.26256 16.8232 9.73744 16.5303 10.0303L11.9041 14.6566C11.2207 15.34 10.1126 15.34 9.42923 14.6566L7.46967 12.697C7.17678 12.4041 7.17678 11.9292 7.46967 11.6363C7.76256 11.3434 8.23744 11.3434 8.53033 11.6363L10.4899 13.5959C10.5875 13.6935 10.7458 13.6935 10.8434 13.5959L15.4697 8.96967C15.7626 8.67678 16.2374 8.67678 16.5303 8.96967Z\" fill=\"#0e1e3d\"><\/path> <\/g>  <\/svg><\/span><span class=\"gb-headline-text\">Totally free.<\/span><\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-ff68117f alignfull\" id=\"Enlaces\">\n<div class=\"gb-container gb-container-1cc8977f\">\n<div class=\"gb-container gb-container-70ea91a0\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-b24f6c7f\">\n<div class=\"gb-grid-column gb-grid-column-edef1220\"><div class=\"gb-container gb-container-edef1220\"><div class=\"gb-inside-container\">\n<div class=\"gb-button-wrapper gb-button-wrapper-852e676e\">\n\n<a class=\"gb-button gb-button-6377cb9e\" href=\"#Contenidos\"><span class=\"gb-icon\">          <\/span><span class=\"gb-button-text\"><strong>Contents<\/strong><\/span><\/a>\n\n\n\n<a class=\"gb-button gb-button-609ee599\" href=\"#Aplicaciones\"><span class=\"gb-icon\">    <\/span><span class=\"gb-button-text\"><strong>Professional applications<\/strong><\/span><\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-747cf42d\"><div class=\"gb-container gb-container-747cf42d\"><div class=\"gb-inside-container\">\n<div class=\"gb-button-wrapper gb-button-wrapper-8395a0a2\">\n\n<a class=\"gb-button gb-button-9c68ce5e\" href=\"#Titulaciones\"><span class=\"gb-icon\">       <\/span><span class=\"gb-button-text\"><strong>Qualifications<\/strong><\/span><\/a>\n\n\n\n<a class=\"gb-button gb-button-fc47f863\" href=\"#form\"><span class=\"gb-icon\">    <\/span><span class=\"gb-button-text\"><strong>Inscription<\/strong><\/span><\/a>\n\n<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-1cd35894 alignfull\" id=\"Aplicaciones\">\n<div class=\"gb-container gb-container-688e663e\">\n<div class=\"gb-container gb-container-a74f76d5\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-6efac0a3 gb-headline-text\"><strong>This training is aimed at:&nbsp;<\/strong><\/h2>\n\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-83706c54\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-e6adea89\">\n<div class=\"gb-grid-column gb-grid-column-bda2ced0\"><div class=\"gb-container gb-container-bda2ced0\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-17ffd244 gb-headline-text\"><strong>Engineers, computer science graduates<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-9eaedc49\"><div class=\"gb-container gb-container-9eaedc49\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-f49a78ae gb-headline-text\"><strong>Industrial, telecom and electronic engineers<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-5f0730c1\"><div class=\"gb-container gb-container-5f0730c1\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-8375d41b gb-headline-text\"><strong>University students from related branches<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-7b20421c\"><div class=\"gb-container gb-container-7b20421c\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-a4a3e21b gb-headline-text\"><strong>Other profiles with completed Baccalaureate<\/strong>.<\/p>\n\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"gb-container gb-container-46ddaf81 alignfull\" id=\"Contenidos\">\n<div class=\"gb-container gb-container-ccce4542\" id=\"Escritorio\">\n<div class=\"gb-container gb-container-9e8d60a7\"><div class=\"gb-inside-container\">\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"gb-container gb-container-d4c83953\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-95883f02 gb-headline-text\"><strong>Contents:<\/strong><\/p>\n\n<\/div><\/div>\n<\/div><\/div>\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-aaf90f7a\">\n<div class=\"gb-grid-column gb-grid-column-32db660a\"><div class=\"gb-container gb-container-32db660a\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-f3cb26d5 gb-headline-text alturaLinea\"><strong>Module 1<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-8ef92a9a gb-headline-text\"><strong>INTRODUCTION TO CYBERSECURITY<\/strong> <span style=\"font-weight:400\">\u2013 36 hours<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-e28c5741 gb-headline-text\"><strong>What are you going to learn in this module?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Analysis and identification of technological risks that may affect the company\/organization.<\/li>\n\n\n\n<li style=\"font-size:15px\">Ability to improve the resilience of the digital systems that support the company.<\/li>\n\n\n\n<li style=\"font-size:15px\">Obtaining knowledge for the development of an information security strategy and generation of competitive digital models.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238700\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTENTS<\/strong><\/h6><div id=\"ac-238700\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Knowledge of cybersecurity fundamentals<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Organizational Models.<\/li>\n\n\n\n<li style=\"font-size:15px\">Basic and technological concepts.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Role of people<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Identification of threats, attacks and system vulnerabilities.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Type of threats and relevant actors in Cybercrime<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Conducting a security and risk management assessment.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Risk Management Methodology<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Scope, Critical assets, Identification and assessment of business risks<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Threats and safeguards.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Business Continuity<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Risk management cycle.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Governance Models and Information Classification<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Standards and regulation<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Information Security Management: ISO 2700, 27001, 27002, 27005.<\/li>\n\n\n\n<li style=\"font-size:15px\">Risk Management: ISO 31000, 31010, COBIT 5, NIST 800-39.<\/li>\n\n\n\n<li style=\"font-size:15px\">Risk Assessment: NIST 800-30.<\/li>\n\n\n\n<li style=\"font-size:15px\">Security Controls: NIST 800-53.<\/li>\n\n\n\n<li style=\"font-size:15px\">Specific: GDPR (Data Protection), OWASP (Web Application Security), PCI-DSS (payment cads), etc.<\/li>\n\n\n\n<li style=\"font-size:15px\">Risk Framework: NIST Framework.<\/li>\n\n\n\n<li style=\"font-size:15px\">Threats of ICS: NIST 800-82.<\/li>\n\n\n\n<li style=\"font-size:15px\">IACS standards: ISA\/IEC-62443.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Incident Management<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Knowledge of systems security.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Hardening: Software, Hardware and Networks<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Operating systems.<\/li>\n\n\n\n<li style=\"font-size:15px\">Applications<\/li>\n\n\n\n<li style=\"font-size:15px\">Servers, Workstations, Mobile Devices.<\/li>\n\n\n\n<li style=\"font-size:15px\">Databases.<\/li>\n\n\n\n<li style=\"font-size:15px\">Network Devices and Industrial Systems.<\/li>\n\n\n\n<li style=\"font-size:15px\">Approach to the components of network security.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>OSI levels (Open System Interconnection Model)<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>TCP\/IP model: DNS, FTP, IMAP, TCP, IPv4, IPv6, HTTP protocols.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Encapsulated<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Network Security Components<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Firewall.<\/li>\n\n\n\n<li style=\"font-size:15px\">Intrusion Detection Systems (IDS).<\/li>\n\n\n\n<li style=\"font-size:15px\">Intrusion Prevention System (IPS).<\/li>\n\n\n\n<li style=\"font-size:15px\">Wireless Intrusion Detection and Prevention System (WIDPS).<\/li>\n\n\n\n<li style=\"font-size:15px\">Unified Threat Management (UTM).<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-a4cc923b\"><div class=\"gb-container gb-container-a4cc923b\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-0f9d1ceb gb-headline-text alturaLinea\"><strong>Module 2<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-84eb5fe4 gb-headline-text\"><strong>INTRODUCTION TO THE INDUSTRIAL FUNDAMENTALS OF OPERATION TECHNOLOGIES<\/strong> <span style=\"font-weight:400\">\u2013 36 hours<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-175f9e36 gb-headline-text\"><strong>What are you going to learn in this module?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Knowledge of Industrial Networks and the protocols that support devices and their connectivity.<\/li>\n\n\n\n<li style=\"font-size:15px\">Obtaining skills to understand the digitalization of the Industry and the technologies and components that support these transformation processes.<\/li>\n\n\n\n<li style=\"font-size:15px\">Raising awareness about the importance of teamwork, collaborating with experts from other areas and in different contexts to increase the security of facilities against computer attacks.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238701\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTENTS<\/strong><\/h6><div id=\"ac-238701\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Introduction to the essential aspects of the industry.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Industrial Manufacturing: common systems.<\/li>\n\n\n\n<li style=\"font-size:15px\">The Industrial Revolutions.<\/li>\n\n\n\n<li style=\"font-size:15px\">Industry 4.0: digitalization.<\/li>\n\n\n\n<li style=\"font-size:15px\">Smart and connected Industry.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Recognition of the fundamentals of industrial process control<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Types of industrial processes.<\/li>\n\n\n\n<li style=\"font-size:15px\">The Industrial Revolutions.<\/li>\n\n\n\n<li style=\"font-size:15px\">Fundamentals and types of Control Systems.<\/li>\n\n\n\n<li style=\"font-size:15px\">ICS: Industrial Control Systems.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>P.I.D.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>RTU<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>HMI<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>PLC<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>SCADA<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>DCS<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Implementation of industrial instrumentation<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Sensors.<\/li>\n\n\n\n<li style=\"font-size:15px\">Converters.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Identification of industrial communications systems.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>ETHERCAT<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Integrated production systems.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Industrial automation.<\/li>\n\n\n\n<li style=\"font-size:15px\">Material management and identification systems.<\/li>\n\n\n\n<li style=\"font-size:15px\">Industrial Robotization.<\/li>\n\n\n\n<li style=\"font-size:15px\">RFID and other identification protocols.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Implementation of advanced manufacturing systems<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Industrial machinery classification.<\/li>\n\n\n\n<li style=\"font-size:15px\">Assisted manufacturing MES systems.<\/li>\n\n\n\n<li style=\"font-size:15px\">Digitalized Industrial Operations: tools, evolution and implementation.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Approach to Industry X.0.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Introduction to Industry 4.0 and subsequent versions.<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-634086af\"><div class=\"gb-container gb-container-634086af\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-ed87a65c gb-headline-text alturaLinea\"><strong>Module 3<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-36bc4cde gb-headline-text\"><strong>INTRODUCTION TO ADVANCED INDUSTRIAL CYBERSECURITY<\/strong> <span style=\"font-weight:400\">\u2013 24 hours<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c2fc506f gb-headline-text\"><strong>What are you going to learn in this module?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Compliance with occupational health and safety standards, as well as technical installation instructions.<\/li>\n\n\n\n<li style=\"font-size:15px\">Appropriation of interest in information security and technology applied to industrial processes.<\/li>\n\n\n\n<li style=\"font-size:15px\">Rigor in the knowledge of safety concepts and their associated risks in industrial plants.<\/li>\n\n\n\n<li style=\"font-size:15px\">Skill in implementing industrial network security and its associated controls.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238702\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTENTS<\/strong><\/h6><div id=\"ac-238702\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Identification of ICS\/SCADA components.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Differences between IT and OT Cybersecurity.<\/li>\n\n\n\n<li style=\"font-size:15px\">ICS components.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Description of industrial networks and protocols<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">ICS Architectures and Protocols.<\/li>\n\n\n\n<li style=\"font-size:15px\">Industrial Network Threats.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Recognition of industrial threats and vulnerabilities.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">ISA 95: Purdue classification model.<\/li>\n\n\n\n<li style=\"font-size:15px\">Industrial Risk Scenario.<\/li>\n\n\n\n<li style=\"font-size:15px\">Introduction to Shodan.<\/li>\n\n\n\n<li style=\"font-size:15px\">Protocols and attack surface.<\/li>\n\n\n\n<li style=\"font-size:15px\">History of attacks on industrial networks: models.<\/li>\n\n\n\n<li style=\"font-size:15px\">Industrial Hacking.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Definition of standards and knowledge of best industrial cybersecurity practices<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">NIST SP 800-82 Securing Industrial Control Systems.<\/li>\n\n\n\n<li style=\"font-size:15px\">NIST SP 800-53 Risk Management Strategy.<\/li>\n\n\n\n<li style=\"font-size:15px\">IEC 62443 Processes, People and Technology.<\/li>\n\n\n\n<li style=\"font-size:15px\">NERC CIP: Critical Energy Infrastructures (USA).<\/li>\n<\/ul>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-b6363f7d\"><div class=\"gb-container gb-container-b6363f7d\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-f980cc2d gb-headline-text alturaLinea\"><strong>Module 4<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-21341774 gb-headline-text\"><strong>BASIC AND ADVANCED CYBER EXERCISES OF INDUSTRIAL CYBERSECURITY<\/strong> <span style=\"font-weight:400\">\u2013 24 hours<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-219eaf1b gb-headline-text\"><strong>What are you going to learn in this module?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Teamwork in virtual scenarios of technological networks and industrial infrastructures in situations of attacks and vulnerabilities applicable to real environments in real time.<\/li>\n\n\n\n<li style=\"font-size:15px\">Development of anticipation and leadership capabilities in risk situations in industrial facilities.<\/li>\n\n\n\n<li style=\"font-size:15px\">Appropriation of Industrial Cybersecurity culture for immediate application in digitalization processes in operational environments.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238703\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTENTS<\/strong><\/h6><div id=\"ac-238703\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>Identification of ICS vulnerabilities.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Detection and prevention of them.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Simulation of attacks on OT Industrial Networks through Cyber Range<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Identification and implementation of DDOS Attacks.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Origin.<\/li>\n\n\n\n<li style=\"font-size:15px\">Detection.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>Evaluation of OT\/IT Ransonware scenarios<\/strong>.<\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Secure design of industrial networks with digital twin.<\/strong><\/p>\n\n\n\n<p style=\"font-size:15px\"><strong>Application of industrial network security tools<\/strong>.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-817a5ea2\"><div class=\"gb-container gb-container-817a5ea2\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-a5d3024b gb-headline-text alturaLinea\"><strong>Module 5<\/strong><span style=\"font-size:15px\"> (optional)<\/span><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-3f54090e gb-headline-text\"><strong>CISCO CERTIFIED SUPPORT TECHNICIAN (CCST) CYBERSECURITY<\/strong> <span style=\"font-weight:400\">\u2013 120 Hrs<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-007804b6 gb-headline-text\"><strong>What are you going to learn in this module?<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Vital skills like threat intelligence, network security and risk management to protect yourself and organizations against cyber attacks.<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238704\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>CONTENTS<\/strong><\/h6><div id=\"ac-238704\" class=\"c-accordion__content\">\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238705\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>1. Essential Security Principles<\/strong>.<\/h6><div id=\"ac-238705\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.1. Define essential security principles.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Vulnerabilities, threats, exploits and risks; attack vectors; hardening; defense in depth; confidentiality, integrity and availability (CIA); types of attackers; reasons for attacks; code of ethics.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.2. Explain common threats and vulnerabilities.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Malware, ransomware, denial of service, botnets, social engineering attacks (sneaking, spear phishing, phishing, vishing, smishing, etc.), physical attacks, man in the middle, IoT vulnerabilities, insider threats, Advanced Persistent Threat (APT) ).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.3. Explain the principles of access management.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Authentication, Authorization and Accounting (AAA); RADIUS; multi-factor authentication (MFA); password policies.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 1.4. Explain encryption methods and applications<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Types of encryption, hashing, certificates, public key infrastructure (PKI); Strong vs. Strong Encryption Algorithms weak; data states and appropriate encryption (data in transit, data at rest, data in use); protocols that use encryption.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238706\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>2. Basic Concepts of Network Security.<\/strong><\/h6><div id=\"ac-238706\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\">   <strong>2.1. Describe vulnerabilities in the TCP\/IP protocol<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">TCP, UDP, HTTP, ARP, ICMP, DHCP, DNS.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 2.2. Explain how network addresses affect network security<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">IPv4 and IPv6 addresses, MAC addresses, network segmentation, CIDR notation, NAT, public networks vs. private.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 23. Describe network infrastructure and technologies<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Network security architecture, DMZ, virtualization, cloud, honeypot, proxy server, IDS, IPS.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 2.4. Set up a secure wireless SoHo network.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">MAC address filtering, encryption standards and protocols, SSID.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 2.5. Implement secure access technologies<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">ACL, firewall, VPN, NAC.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238707\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>3. Endpoint Security Concepts.<\/strong><\/h6><div id=\"ac-238707\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.1. Describe operating system security concepts.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Windows, macOS and Linux; security features, including Windows Defender and host-based firewalls; CLI and PowerShell; file and directory permissions; escalation of privileges.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.2. Demonstrate familiarity with appropriate endpoint tools that collect security assessment information<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Netstat, nslookup, tcpdump,<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.3. Verify that endpoint systems comply with security policies and standards<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Hardware inventory (asset management), software inventory, program deployment, data backups, regulatory compliance (PCI DSS, HIPAA, GDPR), BYOD (device management, data encryption, application distribution, device management setting).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.4. Implement software and hardware updates.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Windows updates, application updates, device drivers, firmware, patches.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.5. Interpret system logs<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Event viewer, audit logs, system and application logs, syslog, anomaly identification.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 3.6. Demonstrate familiarity with malware removal.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">System scanning, scan log review, malware remediation.<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238708\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong>4. Vulnerability Assessment and Risk Management.<\/strong><\/h6><div id=\"ac-238708\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.1. Explain vulnerability management<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Identification, management and mitigation of vulnerabilities; active and passive recognition; testing (port scanning, automation).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.2. Use threat intelligence techniques to identify potential network vulnerabilities.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Uses and limitations of vulnerability databases; industry standard tools used to assess vulnerabilities and make recommendations, policies and reports; Common Vulnerabilities and Exposures (CVE), cybersecurity reports, cybersecurity news, subscription services and collective intelligence; ad hoc and automated threat intelligence; the importance of proactively updating documentation and other forms of communication before, during and after cybersecurity incidents; how to secure, share and update documentation.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.3. Explain risk management<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Vulnerability vs. risk, risk classification, approaches to risk management, risk mitigation strategies, risk levels (low, medium, high, extremely high), risks associated with specific types of data and data classifications, system security assessments IT (information security, change management, computer operations, information assurance).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 4.4. Explain the importance of disaster recovery and business continuity planning.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Natural and human-caused disasters, characteristics of disaster recovery plans (DRP) and business continuity plans (BCP), backups, disaster recovery controls (detective, preventive and corrective).<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><h6 id=\"at-238709\" class=\"c-accordion__title js-accordion-controller\" role=\"button\"><strong><\/strong><strong>5. Incident Management.&nbsp;<\/strong><\/h6><div id=\"ac-238709\" class=\"c-accordion__content\">\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.1. Monitor security events and know when escalation is necessary<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Role of SIEM and SOAR, monitoring network data to identify security incidents (packet captures, various log file entries, etc.), identifying suspicious events as they occur.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.2. Explain computer forensics processes and attack attribution.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Cyber Attack Chain, MITER ATT&amp;CK Matrix and Diamond Model; Tactics, Techniques and Procedures (TTP); sources of evidence (artifacts); evidence manipulation (preservation of digital evidence, chain of custody).<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.3. Explain the impact of compliance frameworks on security incident handling<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Compliance frameworks (GDPR, HIPAA, PCI DSS, FERPA, FISMA), reporting and notification requirements.<\/li>\n<\/ul>\n\n\n\n<p style=\"font-size:15px\"><strong>&nbsp;&nbsp; 5.4. Describe the elements of cybersecurity incident response<\/strong>.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li style=\"font-size:15px\">Elements of policies, plans and procedures; stages of the incident response life cycle (NIST Special Publication 800-61 sections 2.3, 3.1-3.4).<\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-58ba4186\"><div class=\"gb-container gb-container-58ba4186\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-ed07e4ff gb-headline-text alturaLinea\"><strong>Earn these professional badges\/certifications issued by Cisco.<\/strong><\/h2>\n\n\n\n<p class=\"gb-headline gb-headline-ea267901 gb-headline-text\">Once you complete the training, you will achieve certifications that will set you apart from other professionals and prove that you have the crucial practical skills to assess and manage risks, implement security measures in systems and networks, and respond effectively to security incidents.&nbsp;<\/p>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-82300d6b\">\n<div class=\"gb-grid-column gb-grid-column-73cc5a92\"><div class=\"gb-container gb-container-73cc5a92\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png\" alt=\"\" class=\"wp-image-23948\" style=\"width:216px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Cisco-Insignia-Ciberseguridad-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-cd62d9b9 gb-headline-text\"><strong>Badge issued by Cisco \u2013 Introduction to Cybersecurity\u201d<\/strong><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-56985060\"><div class=\"gb-container gb-container-56985060\">\n<div class=\"wp-block-image is-style-rounded\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"225\" height=\"225\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png\" alt=\"\" class=\"wp-image-28464\" style=\"width:216px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1.png 225w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/10\/it-specialist-1-100x100.png 100w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-0ce07209 gb-headline-text\"><strong>Information Technology Specialist Cybersecurity Certification.<\/strong><\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-4f166549\"><div class=\"gb-container gb-container-4f166549\">\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png\" alt=\"\" class=\"wp-image-24536\" style=\"width:216px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST.png 600w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-300x300.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-150x150.png 150w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-12x12.png 12w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-500x500.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/02\/Insignia-CCST-100x100.png 100w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-4804fa34 gb-headline-text\"><strong>Cisco Certified Support Technician (CCST) Professional Certification<\/strong><\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-b6523983\" id=\"Titulaciones\"><div class=\"gb-inside-container\">\n<div class=\"gb-container gb-container-deb630b2\" id=\"Certificaciones\"><div class=\"gb-inside-container\">\n<div class=\"gb-container gb-container-3bbc27ea\"><div class=\"gb-inside-container\">\n\n<p class=\"gb-headline gb-headline-47fe7bc8 gb-headline-text\"><strong>Qualifications<\/strong><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-c7f3e5c2 gb-headline-text\">Complete this training and get 4 accreditations!<\/p>\n\n<\/div><\/div>\n\n<div class=\"gb-container gb-container-370f17b3\"><div class=\"gb-inside-container\">\n<div class=\"gb-grid-wrapper gb-grid-wrapper-9fd71857\">\n<div class=\"gb-grid-column gb-grid-column-5bde972a\"><div class=\"gb-container gb-container-5bde972a\">\n\n<p class=\"gb-headline gb-headline-6d015d3a\"><span class=\"gb-icon\"><svg aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill=\"currentColor\" d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\">CISCO Badge: \u201c<strong>Introduction to Cybersecurity<\/strong>\u201d<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-47178458\"><span class=\"gb-icon\"><svg aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill=\"currentColor\" d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\">Qualification \u201cAdvanced cybersecurity in operational technology environments\u201d, corresponding to the training specialty IFCT0050.<\/span><\/p>\n\n\n\n<p class=\"gb-headline gb-headline-21f03310\"><span class=\"gb-icon\"><svg aria-hidden=\"true\" role=\"img\" height=\"1em\" width=\"1em\" viewbox=\"0 0 512 512\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path fill=\"currentColor\" d=\"M173.898 439.404l-166.4-166.4c-9.997-9.997-9.997-26.206 0-36.204l36.203-36.204c9.997-9.998 26.207-9.998 36.204 0L192 312.69 432.095 72.596c9.997-9.997 26.207-9.997 36.204 0l36.203 36.204c9.997 9.997 9.997 26.206 0 36.204l-294.4 294.401c-9.998 9.997-26.207 9.997-36.204-.001z\"><\/path><\/svg><\/span><span class=\"gb-headline-text\">Two professional certifications, Information Technology Specialist Cybersecurity Certification and <strong>Cisco Certified Support Technician Cybersecurity (CCST)<\/strong>, for passing module 5, which is optional.<\/span><\/p>\n\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-b95e5366\" id=\"Preguntas\">\n<div class=\"gb-container gb-container-f80eb399\">\n<div class=\"gb-container gb-container-b0d16039\"><div class=\"gb-inside-container\">\n\n<h2 class=\"gb-headline gb-headline-366de5c7\"><span class=\"gb-icon\"><svg fill=\"#000000\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 16 16\"><g stroke-width=\"0\" id=\"SVGRepo_bgCarrier\"><\/g><g stroke-linejoin=\"round\" stroke-linecap=\"round\" id=\"SVGRepo_tracerCarrier\"><\/g><g id=\"SVGRepo_iconCarrier\"><path fill=\"#ccd8e0\" d=\"M2 5C.892 5 0 5.892 0 7v7c0 1.108.892 2 2 2h9c1.108 0 2-.892 2-2v-3.8L16 7h-3c0-1.108-.892-2-2-2zm4.438 2C7.75 6.926 8.926 7.936 9 9.25c0 1.121-.308 1.544-1.281 2.281a1.68 1.68 0 00-.281.25c-.04.05-.032.033-.032.031.006.423-.39.782-.812.782a.79.79 0 01-.781-.782c0-.401.179-.754.375-1a3.14 3.14 0 01.562-.562 3.85 3.85 0 00.563-.531c.074-.09.097-.24.093-.344v-.031a.785.785 0 00-.843-.75c-.451.025-.813.362-.851.758a.697.697 0 01-.718.648.816.816 0 01-.781-.594 1.725 1.725 0 01.01-.533c.005-.014.006-.03.012-.043.202-1.024 1.09-1.768 2.203-1.83zm.156 6.406a.82.82 0 01.812.813c0 .442-.37.781-.812.781a.768.768 0 01-.781-.781c0-.442.339-.813.78-.813zM2 1C.892 1 0 1.892 0 3v.568A3.918 3.918 0 012 3h9c1.376 0 2.55.763 3.268 1.848L16 3h-3c0-1.108-.892-2-2-2z\"><\/path><\/g><\/svg><\/span><span class=\"gb-headline-text\">Questions <strong style=\"background-image: linear-gradient(195deg,#e5ebf0,#e5e6e8);background-repeat: no-repeat;background-position: 9px bottom;background-size: 100% 17px;border-radius: 110px;\">frequent<\/strong><\/span><\/h2>\n\n\n<div class=\"gb-grid-wrapper gb-grid-wrapper-5b986796\">\n<div class=\"gb-grid-column gb-grid-column-013120d8\"><div class=\"gb-container gb-container-013120d8\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387010\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong><\/strong><strong>When does it start?<\/strong><\/button><div id=\"ac-2387010\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-0da6209b gb-headline-text\">The training begins in the next 15 days and lasts for 3 weeks.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-782db725\"><div class=\"gb-container gb-container-782db725\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387011\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong><\/strong><strong><\/strong><strong><\/strong><strong>Does it have any cost?<\/strong><\/button><div id=\"ac-2387011\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-3483b57e gb-headline-text\">No, neither the training nor the issuance of the title, badge or certification have any type of cost for the students.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-ff1280e6\"><div class=\"gb-container gb-container-ff1280e6\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387012\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong><\/strong><strong><\/strong><strong>How many hours a day do I have to dedicate to the course? Can I connect whenever I want?<\/strong><\/button><div id=\"ac-2387012\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-dc46bca0 gb-headline-text\">Approximately 17 a week with flexible hours, you decide when to complete the content on the platform. Additionally, masterclasses will be given and group tutorials will be held, which you can attend live or view the recording. There will be a learning control at the end of each module.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-55ee6ff5\"><div class=\"gb-container gb-container-55ee6ff5\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387013\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong>What requirements do I have to meet to be admitted to the course?<\/strong><\/button><div id=\"ac-2387013\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-db2277b1 gb-headline-text\">\u2013 Be employed, self-employed, civil servant or be a job seeker.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-8edef9c9 gb-headline-text\">\u2013 Have a high school academic level or higher.<\/p>\n\n\n\n<p class=\"gb-headline gb-headline-7582fbda gb-headline-text\">\u2013 Commitment to dedicate enough time to get the most out of the training.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n\n<div class=\"gb-grid-column gb-grid-column-49703dee\"><div class=\"gb-container gb-container-49703dee\"><div class=\"gb-inside-container\">\n\n<div class=\"wp-block-pb-accordion-item c-accordion__item js-accordion-item no-js acordeon\" data-initially-open=\"false\" data-click-to-close=\"true\" data-auto-close=\"true\" data-scroll=\"false\" data-scroll-offset=\"0\"><button id=\"at-2387014\" class=\"c-accordion__title js-accordion-controller c-accordion__title--button\" role=\"button\"><strong>Do you get the 4 accreditations for completing the training?&nbsp;<\/strong><\/button><div id=\"ac-2387014\" class=\"c-accordion__content\">\n<p class=\"gb-headline gb-headline-c7c76d77 gb-headline-text\">Yes. When you complete the first 4 modules you will receive the CISCO &#039;Introduction to Cybersecurity&#039; credential and the &#039;Advanced Cybersecurity in Operational Technology Environments&#039; qualification. Subsequently, if you wish to obtain the CISCO CCST certification and the IT Specialist Cybersecurity certification, you will have an additional 2 months to complete module 5.<\/p>\n<\/div><\/div>\n\n<\/div><\/div><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-8a324a98 alignfull\" id=\"form\">\n<div class=\"gb-container gb-container-81c2cbc7\">\n\n<h2 class=\"gb-headline gb-headline-042e0e92 gb-headline-text colorBlanco\">Registrations closed!<\/h2>\n\n\n\n<h2 class=\"gb-headline gb-headline-9b5ed2d6 gb-headline-text\">Course registration <strong style=\"background-image: linear-gradient(195deg,#e5ebf0,#e5e6e8);background-repeat: no-repeat;background-position: 9px bottom;background-size: 100% 17px;border-radius: 110px;\">Advanced cybersecurity in operation technology environments&nbsp;<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-alpha-channel-opacity has-background is-style-default\" style=\"background-color:#dadadd;color:#dadadd\"\/>\n\n\n\n<p class=\"has-text-align-left\" style=\"font-size:15px\">If you need support to complete your registration, please write to <strong><a href=\"https:\/\/wa.me\/657096465\" rel=\"noopener\">WhatsApp to +34657096465<\/a><\/strong><\/p>\n\n\n\n\n\n\n\n<script>\ndocument.addEventListener('DOMContentLoaded', function() {\n    var dniInput = document.getElementById('wpforms-24333-field_53');\n    var submitButton = document.getElementById('wpforms-submit24333'); \/\/ Obtener el bot\u00f3n de env\u00edo\n    var validityText = document.createElement('span');\n    validityText.style.display = 'block';\n    validityText.style.fontSize = '12px';\n    dniInput.parentNode.insertBefore(validityText, dniInput.nextSibling);\n\n    dniInput.addEventListener('blur', function() {\n        var dniValue = dniInput.value.trim();\n        var isValid = validateDNIorNIE(dniValue);\n\n        if (!isValid) {\n            dniInput.style.color = 'red';\n            validityText.innerHTML = '<strong>N\u00famero de documento no reconocido (DNI o NIE)<\/strong>';\n            validityText.style.color = 'red';\n            submitButton.classList.add('noapto'); \/\/ A\u00f1adir clase noapto\n        } else {\n            dniInput.style.color = 'green';\n            validityText.textContent = 'Documento v\u00e1lido (DNI O NIE)';\n            validityText.style.color = 'black';\n            submitButton.classList.remove('noapto'); \/\/ Remover clase noapto\n        }\n    });\n});\n\nfunction validateDNIorNIE(dni) {\n    var regularExpression = \/^[XYZ]?\\d{7,8}[A-Z]$\/;\n    dni = dni.toUpperCase();\n\n    if (regularExpression.test(dni)) {\n        var numero = dni.substr(0, dni.length - 1);\n        numero = numero.replace('X', 0);\n        numero = numero.replace('Y', 1);\n        numero = numero.replace('Z', 2);\n\n        var letra = dni.substr(dni.length - 1, 1);\n        numero = parseInt(numero) % 23;\n\n        var letrasValidas = 'TRWAGMYFPDXBNJZSQVHLCKE';\n        var letraCalculada = letrasValidas.charAt(numero);\n\n        return letra === letraCalculada;\n    } else {\n        return false;\n    }\n}\n<\/script>\n\n<\/div>\n<\/div>\n\n<div class=\"gb-container gb-container-0c65008e alignfull\" id=\"Footer\">\n<div class=\"gb-container gb-container-eb0e37e8\">\n\n<p class=\"gb-headline gb-headline-c8446db7 gb-headline-text\">Training program designed and taught by:<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"59\" src=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1024x59.png\" alt=\"\" class=\"wp-image-35529\" style=\"width:788px;height:auto\" srcset=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1024x59.png 1024w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-300x17.png 300w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-768x44.png 768w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1536x88.png 1536w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-2048x117.png 2048w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-18x1.png 18w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-500x29.png 500w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-800x46.png 800w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1280x73.png 1280w, https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2025\/06\/ddlogos-cat-y-mainjobs-svg-2-1920x110.png 1920w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n<\/div>\n\n<div class=\"gb-container gb-container-37be2a33\">\n\n<a class=\"gb-button gb-button-d04c774a gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/aviso-legal-2\/\">Legal warning<\/a>\n\n\n\n<a class=\"gb-button gb-button-a70fffe9 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/politica-de-cookies\/\">Cookies policy<\/a>\n\n\n\n<a class=\"gb-button gb-button-0005add3 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/ciberseguridad\/ciberseguridad-politica-de-privacidad\/\">Privacy Policy<\/a>\n\n\n\n<a class=\"gb-button gb-button-9b3d0d1b gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Politica-del-Sistema-de-Gestion-de-Servicios-TI-01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">SGSTI Policy<\/a>\n\n\n\n<a class=\"gb-button gb-button-6b8132bc gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Politica-del-Sistema-Integrado-02.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Integrated System Policy<\/a>\n\n\n\n<a class=\"gb-button gb-button-4afd23b1 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2024\/01\/Politica-del-Sistema-de-Gestion-de-Accesibilidad-01.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Accessibility Management System Policy<\/a>\n\n\n\n<a class=\"gb-button gb-button-644dc55b gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/calidad-igualdad-y-conciliacion\/\">Quality, equality and conciliation<\/a>\n\n\n\n<a class=\"gb-button gb-button-19d22760 gb-button-text\" href=\"https:\/\/projects.grupomainjobs.com\/canal-de-denuncias\/\">Complaint channel<\/a>\n\n<\/div>\n\n\n<p class=\"gb-headline gb-headline-b95d2c8b gb-headline-text\">\u00a9 Mainjobs | International educational and technological | 2025<\/p>\n\n<\/div>\n<\/div>\n\n\n\n\n\n\n<script>\n\/\/ Funci\u00f3n para verificar y reemplazar el texto\nfunction verificarYReemplazar() {\n    var elemento = document.getElementById(\"wpforms-confirmation-24333\");\n    if (elemento) {\n        var texto = elemento.innerHTML; \/\/ Obtener el contenido HTML\n        if (texto.includes(\"{nombre de archivo}\")) {\n            texto = texto.replace(\"{nombre de archivo}\", \"Descargar copia PDF cumplimentado\");\n            elemento.innerHTML = texto; \/\/ Aplicar el texto modificado\n\n            \/\/ Restaurar el enlace original si estaba presente\n            var enlaceOriginal = elemento.querySelector('a');\n            if (enlaceOriginal) {\n                elemento.appendChild(enlaceOriginal); \/\/ Reinsertar el enlace original\n            }\n        }\n    }\n}\n\n\/\/ Observador de mutaciones para detectar cambios en el DOM\nvar observer = new MutationObserver(function(mutations) {\n    mutations.forEach(function(mutation) {\n        if (mutation.type === \"childList\") {\n            verificarYReemplazar();\n        }\n    });\n});\n\n\/\/ Configuraci\u00f3n del observador de mutaciones\nvar config = { childList: true, subtree: true };\n\n\/\/ Observar cambios en el DOM\nobserver.observe(document.body, config);\n\n\/\/ Llamar a la funci\u00f3n de verificaci\u00f3n y reemplazo inicialmente\nverificarYReemplazar();\n<\/script>\n\n\n\n<script>\njQuery(document).ready(function() {\n  \/\/ Obtener la URL actual\n  var url = new URL(window.location.href);\n  var urlParams = url.searchParams;\n\n  \/\/ Obtener todos los par\u00e1metros de la URL\n  var params = {};\n  for (var pair of urlParams.entries()) {\n    params[pair[0]] = pair[1];\n  }\n\n  \/\/ Seleccionar todos los enlaces de la p\u00e1gina\n  var allLinks = jQuery('a');\n\n  \/\/ Iterar a trav\u00e9s de todos los enlaces\n  allLinks.each(function(index, element) {\n    var currentHref = jQuery(element).attr('href');\n\n    \/\/ Verificar si el enlace actual existe y no es una ancla\n    if (currentHref && !currentHref.startsWith('#')) {\n      \/\/ Convertir rutas relativas a URLs absolutas\n      var updatedHref = isAbsoluteURL(currentHref) ? currentHref : new URL(currentHref, window.location.origin).href;\n\n      \/\/ Combinar par\u00e1metros existentes con par\u00e1metros de la URL actual\n      var updatedParams = new URL(updatedHref);\n      for (var param in params) {\n        if (params.hasOwnProperty(param) && !updatedParams.searchParams.has(param)) {\n          updatedParams.searchParams.set(param, params[param]);\n        }\n      }\n\n      \/\/ Actualizar el atributo href del enlace con los par\u00e1metros combinados\n      jQuery(element).attr('href', updatedParams.href);\n    }\n  });\n});\n\n\/\/ Funci\u00f3n para verificar si una URL es absoluta\nfunction isAbsoluteURL(url) {\n  return \/^https?:\\\/\\\/\/i.test(url);\n}\n\n<\/script>\n<style class=\"advgb-styles-renderer\">\n\n\n.gb-container-465d6c75 {\n    display: none;\n}\n\nfooter{\ndisplay:none;\n}\n\nblockquote ul li, .tab-pane ul li, .container-general ul li {\n    list-style: disc;\n    margin-left: 25px;\n}\n\n@import url('https:\/\/fonts.googleapis.com\/css2?family=Inter:wght@100;200;300;400;500;600;700;800&display=swap');\n\nbody, button, input, select, textarea {\n    font-family: 'Inter', sans-serif!important;\n}\n\nh1,h2,h3,h4,h5,h6{\n\t\tfont-family: 'Inter', sans-serif!important;\n}\n\nh6{\nfont-size:15px;\n}\n@media (max-width: 991px){\n.contentPrincipal {\n    margin-top: 0px;\n}}\n\n\/* Ancho completo sin caja *\/\n\n#caja{\nwidth:100%;\n}\n\n#caja .col-xs-12 {\n    padding-right: 0;\n    padding-left: 0;\n}\n\n.container-general {\n    padding: 0px 0;\nbackground-color: #ffffff;\n\n}\n\n.logotipo img {\n    margin-left: 15px;\n    OBJECT-FIT: contain;\n    max-width: 200px;\n\t  object-position: center center;\n    max-height:50px;\n}\n\n.site-logo-container img {\n    width: auto;\n    max-width: 100%;\n    object-fit: contain;\n\t  max-height:50px;\n}\n\n.banner{\n\t  width: 530px;\n    height: auto;\n    object-fit: contain;\n}\n\n@media only screen and (max-width: 768px) {\n  .logotipo img {\n    margin-left: 15px;\n    OBJECT-FIT: contain;\n    max-width: 200px;\n\t  object-position: center center;\n    max-height:30px;\n}\n}\n\n\nimg {\n  \/* Ocultar el atributo 'title' *\/\n  pointer-events: none; \/* Evitar que se muestre la informaci\u00f3n emergente *\/\n}\n\n.site-logo-container {\n    height: auto;\n}\n\np {\n    margin-bottom: 5px;\n}\n\na {\n\ttext-decoration:none;\n}\n\n.hero-section .ct-container-narrow {\n    max-width: 100%;\n}\n\n.hero-section .ct-container-narrow {\n    width: 100%;\n}\n\n.sticky-container  {\n    position: sticky;\n    position: -webkit-sticky;\n    top: -1px;\n    z-index:99999;\n}\n\n#main li {\n    margin-bottom: 1.5em;\n}\n\n.sinEnlace{\n\tpointer-events: none;\n  cursor: default;\n}\n\n.sticky-container a {\n   text-decoration:none;\n}\n\n.sticky-container {\n    z-index: 2;\n}\n\n.logotipo img{\n\tmargin-left:15px;\n}\n.entry-content>* {\n    margin-bottom: 0;\n}\n\n.ct-featured-image {\n    padding-bottom: 15px!IMPORTANT;\n}\n\n\/* Estilo acorde\u00f3n *\/\n\n\n.c-accordion__title {\n    cursor: pointer;\n    padding-right: 2rem;\n    position: relative;\n    background-color: whitesmoke;\n    padding: 15px 35px 15px 15px;\n    border-radius: 5px;\n}\n\n.c-accordion__title:after {\n    font-weight: 600;\n    right: 10px;\n}\n\n.c-accordion__content {\n    padding: 0 15px;\n}\n\n.search-form{\n\tdisplay:none;\n}\n\n#cmplz-document, .editor-styles-wrapper .cmplz-unlinked-mode {\n    max-width: 1200px;\n}\n\n.wpforms-container .wpforms-field {\n    padding: 5px 0;\n    position: relative;\n}\n\n\n\/* Curso *\/\n\n.acordeon {\n  background-color: white;\n  box-shadow: 1px 0px 20px 0px #adadad36;\n  padding: 10px 20px;\n  border-radius: 15px;\n  margin-bottom: 15px;\n}\n\n.sinContenido{\n\tpointer-events: none;\n  cursor: default;\n\tpadding: 0px 20px;\n}\n\n.sinContenido .c-accordion__title::after{\n\tdisplay:none;\n}\n\n.c-accordion__title {\n  margin: 0;\n}\n\n.c-accordion__title::after {\n    color: #115e91;\n    font-weight: 600;\n}\n\n.c-accordion__title {\n    background-color: white;\n    padding: 15px 35px 15px 15px;\n}\n.entry-content h6{\nmargin-bottom:0!important;\n}\n.gutentor-module-tabs-item {\n  background-color: #0e1e3d;\n  color: #f1c430;\nborder-radius: 5px;\n}\n\n.gutentor-tabs-nav-active {\n  background-color: #f3cb3d;\n  color: #0e1e3d;\nborder-radius: 5px;\n}\n\n.wp-embed-responsive .wp-has-aspect-ratio iframe {\n    border-radius: 10px;\n}\n\n.gutentor-slick-arrows {\n    left: 46%!important;\n}\n\n.gutentor-module.gutentor-module-carousel .slick-arrow {\n    height: 35px;\n    background-color: #f1c433;\n    border-radius: 5px;\n}\n\n.gutentor-module-carousel .gutentor-slick-arrows, .gutentor-post-module .gutentor-slick-arrows, .gutentor-term-module .gutentor-slick-arrows {\n    display: -ms-flexbox;\n    display: flex;\n    justify-content: center;\n}\n\n.slick-track {\n    display: flex;\n    align-items: center;\n    justify-content: center;\n}\n\n.exp_logo{\n    max-height: 60px;\n    width: auto;\n    max-width: 150px;\n}\n\n.expertoImg{\npointer-events: none;\n}\n\n#caja-expert .gb-grid-column:first-child .gb-container{\n    background-color: #0e1e3d!important;\n    color: white!important;\n}\n\n#caja-expert .gb-grid-column:first-child h2 a {\n    color: #ffffff!important;\n}\n\n.latido{\nanimation: zoom-in-zoom-out 2s ease infinite;\n}\n\n@keyframes zoom-in-zoom-out {\n  0% {\n    transform: scale(1, 1);\n  }\n  50% {\n    transform: scale(1.05, 1.05);\n  }\n  100% {\n    transform: scale(1, 1);\n  }\n}\n\n.degradado2 {\nbackground: linear-gradient(90deg, rgba(11,6,89,0) 0%, #0e6387 35%, rgb(29 125 165) 50%, #0e6387 68%, rgba(16,32,68,0) 100%);\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n}\n\n\/* Chrome, Safari, Opera *\/\n@-webkit-keyframes test {\n    50% {letter-spacing: 1px;}\n}\n\/* Standard syntax *\/\n@keyframes test {\n    50% {letter-spacing: 1px;}\n}\n\n.sombra{\n\t    box-shadow: 1px 0px 20px 0px #adadad36;\n\tborder-radius:15px;\n}\n\n.ct-image-container{\n\t-webkit-transition: all .2s ease;\n\t-moz-transition: all .2s ease;\n\t-o-transition: all .2s ;\n\t-ms-transition: all .2s ease;\n}\n\narticle .ct-image-container img {\n\t-webkit-transition: all .2s ease;\n\t-moz-transition: all .2s ease;\n\t-o-transition: all .2s ease-in;\n\t-ms-transition: all .2s ease;\n\ttransform: scale(1.01);\n\timage-rendering: -moz-crisp-edges;         \/* Firefox *\/\n  image-rendering:   -o-crisp-edges;         \/* Opera *\/\n  image-rendering: -webkit-optimize-contrast;\/* Webkit (non-standard naming) *\/\n  image-rendering: crisp-edges;\n  -ms-interpolation-mode: nearest-neighbor;  \/* IE (non-standard property) *\/\n}\n\n\narticle:hover .ct-image-container{\n\tfilter: brightness(0.9);\n\n}\n\narticle:hover .ct-image-container img{\ntransform: scale(1.05) perspective(1000px);\n}\n\n.entries article h2 a{\n\toverflow: hidden;\n    display: -webkit-box;\n    -webkit-line-clamp: 2;\n    -webkit-box-orient: vertical;\n\tmin-height:40px;\n}\n\n[data-archive=default][data-layout*=grid] .entry-card>*:not(:last-child).entry-meta, [data-archive=default][data-layout=classic] .entry-card>*:not(:last-child).entry-meta, [data-archive=default][data-layout=simple] .card-content>*:not(:last-child).entry-meta {\n    margin-bottom: 0;\n}\n\n\n.entry-meta [data-type=pill] a {\n    background: #156b9000;\n    --linkInitialColor: #3a4f66;\n    --linkHoverColor: #156b90;\n}\n\n.entry-meta [data-type=pill] a:hover {\n    background: #156b9000;\n    --linkInitialColor: #156b90;\n    --linkHoverColor: #156b90;\n}\n\n\/* Formulario Valorian *\/\n\n.valorian{\n\tdisplay:none;\n}\n\n.test{\n\tdisplay:none;\n}\n\n#main li {\n    margin-bottom: 0.5em;\n}\n\n.hide{\n\tdisplay:none!important;\n}\n\n.entry-button {\n    font-weight: 800;\n}\n\n.nodeco a{\n\ttext-decoration:none;\n}\n\n.sombra{\n\tbox-shadow: 0px 4px 20px 0px #cacacac7;\n}\n\n\n\n.maso-card{\n\ttransition:0.5s;\n}\n\n.maso-card:hover{\n\ttransform: translateY(-10px);\n}\n\n.ct-header-cta [data-size=medium] {\n    --theme-button-min-height: 35px;\n    --theme-button-padding: 3px 20px;\n}\n\n.ct-header .ct-button:hover {\n    background-color:white;\n\t  color:#158bbd;\n\t  border:2px solid #158bbd;\n}\n\n.ct-header .ct-button{\n\t  border:2px solid #158bbd;\n}\n\n\n\n.footerEnlace{\n\tborder-bottom:1px solid transparent;\n}\n\n.footerEnlace:hover{\n\tborder-bottom: 1px solid #e3e3e3;\n}\n\n.bi-box-arrow-in-right{\n\tmargin-right:5px;\n}\n\n.campusCont{\n    border-left: 2px solid #1b7aa1;\n    border-right: 2px solid #1c7ca4;\n    padding: 0px 10px 0px 5px;\n    display: inline-flex;\n}\n\n.degradado {\n    background-color: var(--amarillo-eip);\n    background-image: linear-gradient(195deg, #0b506d, #1d7ca4);\n    color: #ffffff!important;\n    transition: 0.4s;\n}\n\n.degradado:hover {\n    background-image: linear-gradient(195deg, #f2f5f7, #e1e8ed);\n    color: #0b506d!important;\n}\n\n.degradado2 {\n background: linear-gradient(90deg, rgba(11,6,89,0) 0%, #0e6387 35%, rgb(29 125 165) 50%, #0e6387 68%, rgba(16,32,68,0) 100%);\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n    -webkit-animation: test 4s infinite;\n    animation: test 4s infinite;\n}\n\n:where(.is-layout-flex) {\n    gap: 0.5em;\n}\n\n.animado{\n\ttransition: all 0.5s ease;\n}\n\n.animado:hover {\n\tbox-shadow: 0 0 10px 0 rgba(0,0,0,0.1);\n    transform: translate3d(0,-10px,0);\n}\n\n.ct-menu-link:not(:empty) {\n    padding: 0;\n}\n\n.latido {\n    animation: zoom-in-zoom-out 2s ease infinite;\n}\n\n.boton .wp-block-button__link {\n    background-image: linear-gradient(195deg, #f2f5f7, #e1e8ed);\n    font-weight: 600;\n    font-size: 19px;\n    padding: 10px 20px;\n    border-radius: 10px;\n}\n\n.caja{\n\tbox-shadow: 0 1px 5px 0 #d8d8d8;\n}\n\n#main li {\n    margin-bottom: 0;\n}\n\n.wp-block-table {\n    margin: 0 0 1em;\n}\n\n.sombraProfesorado{\n\tbox-shadow: 0 0 14px 0 rgba(0,0,0,0.1);\n}\n\n\n.boton2{\n\ttransition: all 0.5s ease;\n}\n\n.boton2:hover{\n    transform: translate3d(0px,-5px,0);\n}\n\n.wp-block-video video {\n    vertical-align: middle;\n    width: 100%;\n    border-radius: 10px;\n}\n\n.post-edit-link{\n\tdisplay:none;\n}\n\n.wp-block-table.is-style-stripes tbody tr:nth-child(odd) {\n    background-color: #fcfcfc;\n}\n\n.wp-block-table table:not(.has-border-color) thead, .wp-block-table table:not(.has-border-color) tfoot, .wp-block-table table:not(.has-border-color) td, .wp-block-table table:not(.has-border-color) th {\n    border-color: #f4f3f3;\n}\n\n.site-branding{\n\tpointer-events:none;\n}\n\n.botonForm:hover{\n\t    background-image: linear-gradient(195deg, #e1e8ed, #f2f5f7);\n}\n\n.acordeonMovil .c-accordion__title {\n    background-color: #ffffffd9;\n    padding: 5px 15px 5px 15px;\n    margin: 0 20px;\n\t  margin-bottom:15px;\n\tborder-radius:15px;\n}\n\n.acordeonMovil .acordeon { \n    padding: 10px 0px; \n}\n\n.hide{display:none!important;}\n\n.mensajeOculto {display:none;}\n\n\n.noapto{\n\tfilter: blur(1px);\n  pointer-events: none;\n}\n\ninput, textarea, select {\n    border: 1px solid #bdbbbb!important;\nborder-radius:2px;\n}\n\ndiv.wpforms-container-full .wpforms-form input[type=submit], div.wpforms-container-full .wpforms-form button[type=submit], div.wpforms-container-full .wpforms-form .wpforms-page-button {\n    background-color: #216f9f;\n    border: 1px solid #396b8b;\n    color: #fff;\n    font-size: 1em;\n    font-family: inherit;\n    padding: 10px 15px;\n    text-transform: uppercase;\n    font-weight: 600;\n}\n\ndiv.wpforms-container-full .wpforms-form button[type=submit]:hover {\n    background-color: #ddd;\n    border: 1px solid #d5d5d5;\n    cursor: pointer;\n    color: black;\n}\n\ninput:active, input:focus {\n    border-bottom: 1px solid #216f9f!important;\n}\n\n.dashicons-download:before {\n    font-size: 20px;\n    color: red;\n}\n\ndiv.wpforms-container-full .wpforms-form .wpforms-field-label {\n    font-size: 14px; \n}\n\ndiv.wpforms-container-full .wpforms-form ul li {\n    margin-bottom: 0;\n}\n\ndiv.wpforms-container-full .wpforms-form .wpforms-field-label-inline {\n    font-size: 14px;\n}\n\ndiv.wpforms-container-full .wpforms-form .wpforms-field {\n    padding: 5px 0;\n}\n<\/style>","protected":false},"excerpt":{"rendered":"<p>\u00a1Plazas agotadas! Esta formaci\u00f3n est\u00e1 dirigida a:&nbsp; Claustro docente: Contenidos: Titulaciones Completa esta formaci\u00f3n y \u00a1consigue 4 acreditaciones! Preguntas frecuentes \u00a1Inscripciones cerradas! Inscripci\u00f3n al curso Ciberseguridad avanzada en entornos de [&hellip;]<\/p>","protected":false},"author":9192287,"featured_media":21575,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"inline_featured_image":false,"advgb_blocks_editor_width":"","advgb_blocks_columns_visual_guide":"","_joinchat":[],"footnotes":""},"class_list":["post-23870","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"coauthors":[],"author_meta":{"author_link":"https:\/\/projects.grupomainjobs.com\/eng\/author\/jajimenez\/","display_name":"jajimenez"},"relative_dates":{"created":"Posted 2 years ago","modified":"Updated 5 months ago"},"absolute_dates":{"created":"Posted on February 12, 2024","modified":"Updated on November 11, 2025"},"absolute_dates_time":{"created":"Posted on February 12, 2024 17:44","modified":"Updated on November 11, 2025 18:21"},"featured_img_caption":"","featured_img":"https:\/\/projects.grupomainjobs.com\/wp-content\/uploads\/2023\/11\/Software-Ciberseguridad.jpg","series_order":"","_links":{"self":[{"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/pages\/23870","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/users\/9192287"}],"replies":[{"embeddable":true,"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/comments?post=23870"}],"version-history":[{"count":176,"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/pages\/23870\/revisions"}],"predecessor-version":[{"id":42022,"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/pages\/23870\/revisions\/42022"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/media\/21575"}],"wp:attachment":[{"href":"https:\/\/projects.grupomainjobs.com\/eng\/wp-json\/wp\/v2\/media?parent=23870"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}