{"id":530,"date":"2021-01-05T23:55:15","date_gmt":"2021-01-05T23:55:15","guid":{"rendered":"http:\/\/www.isec-global.com\/icoaching\/?page_id=2"},"modified":"2024-09-04T23:43:44","modified_gmt":"2024-09-04T23:43:44","slug":"central","status":"publish","type":"page","link":"https:\/\/isec-infosecurity.com\/icoaching\/","title":{"rendered":"Inicio"},"content":{"rendered":"\n<p class=\"has-text-align-center has-black-color has-luminous-vivid-amber-background-color has-text-color has-background has-medium-font-size\"><strong>iWebcast: An\u00e1lisis de Soluciones de Seguridad<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast SEARCHINFORM\" width=\"750\" height=\"422\" src=\"https:\/\/www.youtube.com\/embed\/u1bvKuQvMOk?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SEARCHINFORM<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"El elemento humano en la detecci&amp;oacute;n de amenazas\" src=\"https:\/\/player.vimeo.com\/video\/435205630?h=f33193a5c4&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast MALWAREBYTES &#8211; El elemento Humano en la detecci\u00ecn de amenazas<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"2020-06-30 1300 iWebcast Veracode_ EL VIAJE HACIA EL DEVSECOPS\" src=\"https:\/\/player.vimeo.com\/video\/434358257?h=99b5425a93&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast VERACODE &#8211;  El viaje hacia DevSecOps                                   <\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast SOTI_ Como eliminar la complejidad de su estrategia de MOVILIDAD\" src=\"https:\/\/player.vimeo.com\/video\/432584328?h=d29c830a9e&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SOTI &#8211; C\u00f3mo eliminar la complejidad de su estrategia de Movilidad<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast Malwarebytes\" src=\"https:\/\/player.vimeo.com\/video\/430851849?h=7793d7145b&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast MALWAREBYTES &#8211; Detecci\u00f3n de amenazas<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast Thales_ Asegurando sus entornos en la nube con cifrado y gesti&amp;oacute;n de llaves\" src=\"https:\/\/player.vimeo.com\/video\/425488077?h=ab16b26f17&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast THALES &#8211; Asegurando sus entornos en la nube<\/figcaption><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"#iWebcast &amp;ndash; SITEPRO-HARDkey\" src=\"https:\/\/player.vimeo.com\/video\/441337704?h=7494711964&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast &#8211; SITEPRO\/HARDKEY<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Gesti&amp;oacute;n segura del acceso de los proveedores remotos con CyberArk\" src=\"https:\/\/player.vimeo.com\/video\/411775952?h=fda415ae8a&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast CyberArk &#8211; Gesti\u00f3n segura del acceso de los proveedores remotos<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Inteligencia en el descubrimiento y gesti&amp;oacute;n de amenazas en ambientes TI\" src=\"https:\/\/player.vimeo.com\/video\/415151937?h=a07ed253c2&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast HACKNOID &#8211; Vulnerability Management<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"iWebcast #Samsung - Seguridad y Productividad en tiempo de Contingencia\" src=\"https:\/\/player.vimeo.com\/video\/405847830?h=1e0fa3e422&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SAMSUNG &#8211; Seguridad y Productividad en ttiempo de Contingencias<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"DLP_aaS_ESP\" src=\"https:\/\/player.vimeo.com\/video\/379759240?h=a2c0599d92&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast SEARCHINFORM &#8211; DLP en la modalidad de servicio<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-vimeo wp-block-embed-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Gestionar de Manera Segura el Acceso es Crucial para Enfrentar los Desaf&amp;iacute;os Actuales\" src=\"https:\/\/player.vimeo.com\/video\/419892488?h=72d3e79e55&amp;dnt=1&amp;app_id=122963\" width=\"750\" height=\"422\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">#iWebcast Thales &#8211; Gestion de identidades<\/figcaption><\/figure>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<figure class=\"wp-block-image alignfull size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"766\" height=\"431\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/iGadget-edited.jpg\" alt=\"\" class=\"wp-image-92\" srcset=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/iGadget-edited.jpg 766w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/iGadget-edited-300x169.jpg 300w\" sizes=\"auto, (max-width: 766px) 100vw, 766px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"360\" height=\"203\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/contenidos-edited.jpg\" alt=\"\" class=\"wp-image-93\" srcset=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/contenidos-edited.jpg 360w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/contenidos-edited-300x169.jpg 300w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p class=\"has-text-align-left has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-normal-font-size\"><strong><strong>\u00bfQU\u00c9 ES UN GADGET?<\/strong><\/strong>          <strong>Gadget <\/strong>es un dispositivo que tiene un prop\u00f3sito y una funci\u00f3n espec\u00edfica, generalmente de<strong> peque\u00f1as proporciones, pr\u00e1ctico y a la vez novedoso.<\/strong> Los gadgets suelen tener un dise\u00f1o m\u00e1s ingenioso que el de la tecnolog\u00eda corriente.<\/p>\n\n\n\n<p class=\"has-black-color has-cyan-bluish-gray-background-color has-text-color has-background has-medium-font-size\"><strong>\u00bfQU\u00c9 ES iCOACHING?<\/strong>          <strong>iCoaching<\/strong> (\u00abentrenar\u00bb) es un m\u00e9todo que consiste en acompa\u00f1ar, instruir y entrenar a una persona o a un grupo de ellas, con el objetivo de conseguir cumplir metas o desarrollar habilidades espec\u00edficas.<\/p>\n<\/div>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-css-opacity\"\/>\n\n\n\n<p class=\"has-text-align-center has-white-color has-black-background-color has-text-color has-background has-medium-font-size\"><a href=\"https:\/\/isec-infosecurity.com\/icoaching\/icoaching\/imembership-free\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>\u00bfQu\u00e9 es pertenecer a iMembership #FREE?<\/strong>  &#8211; Reg\u00edstrese Aqu\u00ed<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"600\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled2.jpg\" alt=\"\" class=\"wp-image-108\" srcset=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled2.jpg 1000w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled2-300x180.jpg 300w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled2-768x461.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Con iMemership #FREE Ud. accede sin costo -s\u00f3lo registro- a nuestro Sistema de autogesti\u00f3n de aprendizaje basado en iGadgets&nbsp;free&nbsp;ondemand. (ver m\u00e1s)<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-white-color has-black-background-color has-text-color has-background has-medium-font-size\"><a href=\"https:\/\/isec-infosecurity.com\/icoaching\/icoaching\/imembership-vip\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>\u00bfQu\u00e9 es pertenecer a iMembership #VIP?<\/strong> -Registrese Aqu\u00ed<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"600\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled3.jpg\" alt=\"\" class=\"wp-image-109\" srcset=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled3.jpg 1000w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled3-300x180.jpg 300w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled3-768x461.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Dise\u00f1ado para aquellos que prefieran optar por una capacitaci\u00f3n din\u00e1mica en iGadgets de 15 minutos<br>Con nuestra <strong>iMemership #VIP <\/strong>Ud. accede a nuestro <strong>Sistema de autogesti\u00f3n de aprendizaje<\/strong> basado en <strong>iGadgets de 15 minutos ondemand<\/strong>. (ver m\u00e1s)<\/figcaption><\/figure>\n\n\n\n<p class=\"has-text-align-center has-white-color has-black-background-color has-text-color has-background has-medium-font-size\"><a href=\"https:\/\/isec-infosecurity.com\/icoaching\/icoaching\/imembership-pro\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>\u00bfQu\u00e9 es pertenecer a iMembership #PRO?<\/strong> &#8211; Reg\u00edstrese Aqu\u00ed<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image alignwide size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"600\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled-1.jpg\" alt=\"\" class=\"wp-image-107\" srcset=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled-1.jpg 1000w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled-1-300x180.jpg 300w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Untitled-1-768x461.jpg 768w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><figcaption class=\"wp-element-caption\">Dise\u00f1ado para aquellos que prefieran optar por una <strong>CERTIFICACION<\/strong> y profundizar sus habilidades y skills.<br>Con <strong>iMembership #PRO <\/strong>Ud. accede a nuestro sistema de autogesti\u00f3n de aprendizaje basado en <strong>TRACKS de mayor duraci\u00f3n<\/strong>, con<strong> explicaciones adicionales<\/strong>. (ver m\u00e1s)<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-luminous-vivid-amber-color has-alpha-channel-opacity has-luminous-vivid-amber-background-color has-background is-style-wide\"\/>\n\n\n\n<pre class=\"wp-block-verse has-text-align-center\">Prohibida su distribuci\u00f3n - todos los derechos reservados \u00ae ISEC Global Inc.\n Cada una de las partes proteger\u00e1 la informaci\u00f3n obtenida durante el desarrollo del curso de la misma manera en que protege su propia informaci\u00f3n confidencial, haci\u00e9ndose responsable por cualquier da\u00f1o\/perjuicio que se pudiera ocasionar por el uso indebido de la informaci\u00f3n accedida. <strong>Nuestros documentos entregables y papeles de trabajo ser\u00e1n de acceso exclusivo para el alumno<\/strong>, quien podr\u00e1 disponer para su uso de todos los entregables, que no incluyen metodolog\u00eda ni software utilizado. <strong>PROHIBIDA SU REPRODUCCI\u00d3N PARCIAL O TOTAL DEL MATERIAL<\/strong><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>iWebcast: An\u00e1lisis de Soluciones de Seguridad \u00bfQU\u00c9 ES UN GADGET? Gadget es un dispositivo que tiene un prop\u00f3sito y una funci\u00f3n espec\u00edfica, generalmente de peque\u00f1as proporciones, pr\u00e1ctico y a la vez novedoso. Los gadgets suelen tener un dise\u00f1o m\u00e1s ingenioso<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-530","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/530","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/comments?post=530"}],"version-history":[{"count":7,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/530\/revisions"}],"predecessor-version":[{"id":1275,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/530\/revisions\/1275"}],"wp:attachment":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/media?parent=530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}