{"id":306,"date":"2022-10-25T01:36:04","date_gmt":"2022-10-25T01:36:04","guid":{"rendered":"https:\/\/lymas.cl\/academia\/?post_type=product&#038;p=306"},"modified":"2022-11-08T20:42:57","modified_gmt":"2022-11-08T20:42:57","slug":"cybersecurity-essentials","status":"publish","type":"product","link":"https:\/\/lymas.cl\/academia\/product\/cybersecurity-essentials\/","title":{"rendered":"Cybersecurity Essentials (GRATUITO)"},"content":{"rendered":"<div class=\"page\" title=\"Page 7\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 8\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 10\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 13\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 14\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 39\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 40\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 41\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 42\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 43\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong>Descripcio\u0301n del curso<\/strong><\/p>\n<p>Este curso abarca los conocimientos esenciales sobre todos los dominios de la ciberseguridad, incluidas la seguridad de la informacio\u0301n, la seguridad de sistemas, la seguridad de la red, la e\u0301tica y las leyes, y las te\u0301cnicas de defensa y mitigacio\u0301n utilizadas en la proteccio\u0301n de los negocios.<\/p>\n<p>&nbsp;<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<div class=\"page\" title=\"Page 9\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 10\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 13\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 14\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 39\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 40\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 41\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 42\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<div class=\"page\" title=\"Page 43\">\n<div class=\"section\">\n<div class=\"layoutArea\">\n<div class=\"column\">\n<p><strong>Beneficios<\/strong><\/p>\n<p>La demanda de profesionales de seguridad sigue creciendo. Conozca ma\u0301s sobre la ciberdelincuencia, los principios de seguridad, las tecnologi\u0301as y los procedimientos empleados para proteger las redes.<\/p>\n<p><strong>Preparacio\u0301n para las carreras profesionales<\/strong><\/p>\n<ul>\n<li>\u00a0 Construya una base de ciberseguridad.<\/li>\n<li>\u00a0 De\u0301 el siguiente paso para explorar las variadas posibilidades profesionales en ciberseguridad.<\/li>\n<li>\u00a0Vea si desea buscar puestos de trabajo en redes o ciberseguridad.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"featured_media":493,"comment_status":"open","ping_status":"closed","template":"","meta":{"nf_dc_page":""},"product_brand":[],"product_cat":[22,49],"product_tag":[],"class_list":{"0":"post-306","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-ciberseguridad","7":"product_cat-gratis","9":"first","10":"instock","11":"shipping-taxable","12":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/product\/306","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":4,"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/product\/306\/revisions"}],"predecessor-version":[{"id":954,"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/product\/306\/revisions\/954"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/media\/493"}],"wp:attachment":[{"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/media?parent=306"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/product_brand?post=306"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/product_cat?post=306"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/lymas.cl\/academia\/wp-json\/wp\/v2\/product_tag?post=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}