{"id":7,"date":"2021-01-06T00:16:53","date_gmt":"2021-01-06T00:16:53","guid":{"rendered":"http:\/\/www.isec-global.com\/icoaching\/?page_id=7"},"modified":"2023-02-08T15:39:29","modified_gmt":"2023-02-08T15:39:29","slug":"acerca-de","status":"publish","type":"page","link":"https:\/\/isec-infosecurity.com\/icoaching\/acerca-de\/","title":{"rendered":"Acerca de"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">iCoaching &#8211; TE AYUDAMOS A APRENDER<\/h1>\n\n\n\n<p class=\"has-white-color has-vivid-cyan-blue-background-color has-text-color has-background has-medium-font-size\"><strong>M\u00e1s de 100 iCoachers certificados en todo Latinoam\u00e9rica que los guiar\u00e1n en su aprendizaje.<\/strong><\/p>\n\n\n\n<p>Instructores profesionales especializados en ciberseguridad y seguridad de la informaci\u00f3n con amplio conocimiento y experiencia espec\u00edfica en los temas de sus responsabilidades.<\/p>\n\n\n\n<p>Los instructores adem\u00e1s de haberse capacitado y CERTIFICADO ampliamente en el tema, han tenido experiencia profesionales pr\u00e1cticas en diferentes compa\u00f1\u00edas internacionales lo cual les permite no solamente realizar una adecuada gu\u00eda de aprendizaje en forma te\u00f3rica, sino que adem\u00e1s les permiten compartir experiencias practicas reales.<\/p>\n\n\n\n<p><strong>ENTRENAMIENTOS Y DIPLOMADOS PRESENCIALES<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"419\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/WhatsApp-Image-2019-12-04-at-9.25.23-PM-1024x768.jpeg\" alt=\"\" class=\"wp-image-419\" srcset=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/WhatsApp-Image-2019-12-04-at-9.25.23-PM-1024x768.jpeg 1024w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/WhatsApp-Image-2019-12-04-at-9.25.23-PM-300x225.jpeg 300w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/WhatsApp-Image-2019-12-04-at-9.25.23-PM-768x576.jpeg 768w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/WhatsApp-Image-2019-12-04-at-9.25.23-PM.jpeg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" data-id=\"420\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/NQN_Digital_Forensics-1024x768.jpg\" alt=\"\" class=\"wp-image-420\" srcset=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/NQN_Digital_Forensics-1024x768.jpg 1024w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/NQN_Digital_Forensics-300x225.jpg 300w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/NQN_Digital_Forensics-768x576.jpg 768w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/NQN_Digital_Forensics-1536x1152.jpg 1536w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/NQN_Digital_Forensics-1568x1176.jpg 1568w, https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/NQN_Digital_Forensics.jpg 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" data-id=\"430\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/Christian-Vila-1024x498.jpg\" alt=\"\" class=\"wp-image-430\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" data-id=\"432\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/IMG-20171205-WA0007-1024x599.jpg\" alt=\"\" class=\"wp-image-432\"\/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" data-id=\"433\" src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2021\/01\/photo_2020-02-29_12-20-40-1024x768.jpg\" alt=\"\" class=\"wp-image-433\"\/><\/figure>\n<\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p>Desarrolladores de los contenidos, organizadores e instructores en programas de postgrado de entrenamiento y especializaciones en seguridad de la informaci\u00f3n, ethical hacking&nbsp; y auditor\u00eda de sistemas (aproximadamente 2100 seminarios).<\/p>\n\n\n\n<hr class=\"wp-block-separator has-text-color has-luminous-vivid-amber-color has-alpha-channel-opacity has-luminous-vivid-amber-background-color has-background is-style-wide\"\/>\n\n\n\n<pre class=\"wp-block-verse has-text-align-center\">Prohibida su distribuci\u00f3n - todos los derechos reservados \u00ae ISEC Global Inc.\n Cada una de las partes proteger\u00e1 la informaci\u00f3n obtenida durante el desarrollo del curso de la misma manera en que protege su propia informaci\u00f3n confidencial, haci\u00e9ndose responsable por cualquier da\u00f1o\/perjuicio que se pudiera ocasionar por el uso indebido de la informaci\u00f3n accedida. <strong>Nuestros documentos entregables y papeles de trabajo ser\u00e1n de acceso exclusivo para el alumno<\/strong>, quien podr\u00e1 disponer para su uso de todos los entregables, que no incluyen metodolog\u00eda ni software utilizado. <strong>PROHIBIDA SU REPRODUCCI\u00d3N PARCIAL O TOTAL DEL MATERIAL<\/strong><\/pre>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>iCoaching &#8211; TE AYUDAMOS A APRENDER M\u00e1s de 100 iCoachers certificados en todo Latinoam\u00e9rica que los guiar\u00e1n en su aprendizaje. Instructores profesionales especializados en ciberseguridad y seguridad de la informaci\u00f3n con amplio conocimiento y experiencia espec\u00edfica en los temas de<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-7","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":1,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/7\/revisions"}],"predecessor-version":[{"id":1156,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/7\/revisions\/1156"}],"wp:attachment":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/media?parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}