{"id":302,"date":"2021-01-13T19:34:49","date_gmt":"2021-01-13T19:34:49","guid":{"rendered":"http:\/\/www.isec-global.com\/icoaching\/?page_id=302"},"modified":"2023-08-11T15:14:34","modified_gmt":"2023-08-11T15:14:34","slug":"iwebcast","status":"publish","type":"page","link":"https:\/\/isec-infosecurity.com\/icoaching\/iwebcast\/","title":{"rendered":"iWebcast"},"content":{"rendered":"\n<p class=\"has-text-align-center has-white-color has-vivid-cyan-blue-background-color has-text-color has-background has-medium-font-size\"><strong>iWebcast: Ciberseguridad &#8211; Inhibidores de se\u00f1ales<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Reportaje de @telediariofederal sobre inhibidores de sistemas de alarmas\" src=\"https:\/\/player.vimeo.com\/video\/360272833?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<p class=\"has-text-align-center has-white-color has-vivid-cyan-blue-background-color has-text-color has-background has-medium-font-size\"><strong>iWebcast: An\u00e1lisis de Soluciones de Seguridad<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast SEARCHINFORM\" width=\"750\" height=\"422\" src=\"https:\/\/www.youtube.com\/embed\/u1bvKuQvMOk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SEARCHINFORM<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"#iWebcast \u2013 SITEPRO-HARDkey\" src=\"https:\/\/player.vimeo.com\/video\/441337704?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast &#8211; SITEPRO\/HARDKEY<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"El elemento humano en la detecci\u00f3n de amenazas\" src=\"https:\/\/player.vimeo.com\/video\/435205630?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast MALWAREBYTES &#8211; El elemento Humano en la detecci\u00ecn de amenazas<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Gesti\u00f3n segura del acceso de los proveedores remotos con CyberArk\" src=\"https:\/\/player.vimeo.com\/video\/411775952?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast CyberArk &#8211; Gesti\u00f3n segura del acceso de los proveedores remotos<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"2020-06-30 1300 iWebcast Veracode_ EL VIAJE HACIA EL DEVSECOPS\" src=\"https:\/\/player.vimeo.com\/video\/434358257?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast VERACODE &#8211;  El viaje hacia DevSecOps                                   <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"2020-06-30 1300 iWebcast Veracode_ EL VIAJE HACIA EL DEVSECOPS\" src=\"https:\/\/player.vimeo.com\/video\/434358257?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast VERACODE &#8211;  El viaje hacia DevSecOps                                   <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Inteligencia en el descubrimiento y gesti\u00f3n de amenazas en ambientes TI\" src=\"https:\/\/player.vimeo.com\/video\/415151937?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast HACKNOID &#8211; Vulnerability Management<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast SOTI_ Como eliminar la complejidad de su estrategia de MOVILIDAD\" src=\"https:\/\/player.vimeo.com\/video\/432584328?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SOTI &#8211; C\u00f3mo eliminar la complejidad de su estrategia de Movilidad<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast #Samsung - Seguridad y Productividad en tiempo de Contingencia\" src=\"https:\/\/player.vimeo.com\/video\/405847830?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SAMSUNG &#8211; Seguridad y Productividad en ttiempo de Contingencias<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast Malwarebytes\" src=\"https:\/\/player.vimeo.com\/video\/430851849?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast MALWAREBYTES &#8211; Detecci\u00f3n de amenazas<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"DLP_aaS_ESP\" src=\"https:\/\/player.vimeo.com\/video\/379759240?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SEARCHINFORM &#8211; DLP en la modalidad de servicio<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast Thales_ Asegurando sus entornos en la nube con cifrado y gesti\u00f3n de llaves\" src=\"https:\/\/player.vimeo.com\/video\/425488077?dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\"><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast THALES &#8211; Asegurando sus entornos en la nube<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-luminous-vivid-amber-color has-alpha-channel-opacity has-luminous-vivid-amber-background-color has-background is-style-wide\"\/>\n\n\n\n<pre class=\"wp-block-verse has-text-align-center\">Prohibida su distribuci\u00f3n - todos los derechos reservados \u00ae ISEC Global Inc.\n Cada una de las partes proteger\u00e1 la informaci\u00f3n obtenida durante el desarrollo del curso de la misma manera en que protege su propia informaci\u00f3n confidencial, haci\u00e9ndose responsable por cualquier da\u00f1o\/perjuicio que se pudiera ocasionar por el uso indebido de la informaci\u00f3n accedida. <strong>Nuestros documentos entregables y papeles de trabajo ser\u00e1n de acceso exclusivo para el alumno<\/strong>, quien podr\u00e1 disponer para su uso de todos los entregables, que no incluyen metodolog\u00eda ni software utilizado. <strong>PROHIBIDA SU REPRODUCCI\u00d3N PARCIAL O TOTAL DEL MATERIAL<\/strong><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>iWebcast: Ciberseguridad &#8211; Inhibidores de se\u00f1ales iWebcast: An\u00e1lisis de Soluciones de Seguridad<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-302","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/comments?post=302"}],"version-history":[{"count":2,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/302\/revisions"}],"predecessor-version":[{"id":1204,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/302\/revisions\/1204"}],"wp:attachment":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/media?parent=302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}