{"id":2317,"date":"2023-05-11T22:53:40","date_gmt":"2023-05-11T22:53:40","guid":{"rendered":"https:\/\/ceu16.edu.mx\/educon\/?post_type=product&#038;p=2317"},"modified":"2023-11-28T22:28:52","modified_gmt":"2023-11-28T22:28:52","slug":"introduccion-ciberseguridad","status":"publish","type":"product","link":"https:\/\/ceu16.edu.mx\/educon\/producto\/introduccion-ciberseguridad\/","title":{"rendered":"Introducci\u00f3n a la Ciberseguridad"},"content":{"rendered":"<div class=\"et-l et-l--post\">\n\t\t\t<div class=\"et_builder_inner_content et_pb_gutters3\">\n\t\t<p><b>TEMARIO:<\/b><\/p>\n<p><b>M\u00d3DULO 1: CIBERSEGURIDAD Y LA DELINCUENCIA<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Procedimientos de ciberseguridad<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Amenazas de seguridad comunes<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ingenieri\u0301a Social<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">El mundo de los malwares<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tipos de ataques<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><b>M\u00d3DULO 2: ATACANTES Y APTS<\/b><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tipos de atacantes y motivacio\u0301n<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Amenazas persistentes avanzadas<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cadena de ciberataque<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Web Hacking y OWASP 10<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hacking e\u0301tico<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Me\u0301todo de autenticacio\u0301n <\/span><\/li>\n<\/ul>\n<p><b>M\u00d3DULO 3: MITIGAR EL RIESGO Y TOMAR EL CONTROL<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Productos de seguridad<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forense digital y de red<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Wireshark<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gestio\u0301n de riesgos<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Investigacio\u0301n de ataques<\/span><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trayectorias profesionales en ciberseguridad<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Preparacio\u0301n para el examen final <\/span>&nbsp;<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n\n\t\t<\/div><!-- .et_builder_inner_content -->\n\t<\/div><!-- .et-l -->\n\t","protected":false},"excerpt":{"rendered":"<p><b>INICIA: <\/b><span style=\"font-weight: 400;\">Martes 6 de Junio<\/span><\/p>\n<p><b>MODALIDAD<\/b><span style=\"font-weight: 400;\">: ONLINE (100% EN L\u00cdNEA)<\/span><\/p>\n<p><b>IMPARTIDO POR:\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">THRIVE XD<\/span><\/p>\n","protected":false},"featured_media":2318,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","spay_email":""},"_links":{"self":[{"href":"https:\/\/ceu16.edu.mx\/educon\/wp-json\/wp\/v2\/product\/2317"}],"collection":[{"href":"https:\/\/ceu16.edu.mx\/educon\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/ceu16.edu.mx\/educon\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/ceu16.edu.mx\/educon\/wp-json\/wp\/v2\/comments?post=2317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ceu16.edu.mx\/educon\/wp-json\/wp\/v2\/media\/2318"}],"wp:attachment":[{"href":"https:\/\/ceu16.edu.mx\/educon\/wp-json\/wp\/v2\/media?parent=2317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}