{"id":939,"date":"2022-07-21T19:48:36","date_gmt":"2022-07-21T19:48:36","guid":{"rendered":"https:\/\/isec-infosecurity.com\/icoaching\/?page_id=939"},"modified":"2024-09-04T23:48:26","modified_gmt":"2024-09-04T23:48:26","slug":"capacitaciones","status":"publish","type":"page","link":"https:\/\/isec-infosecurity.com\/icoaching\/capacitaciones\/","title":{"rendered":"Capacitaciones"},"content":{"rendered":"\n<p class=\"has-text-align-center has-white-color has-vivid-cyan-blue-background-color has-text-color has-background has-large-font-size\"><strong>iCoaching Memebres\u00eda #Free<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong><a href=\"https:\/\/isec-infosecurity.com\/icoaching\/paper\/C\u00f3mputo_Forense_porque.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">C\u00f3mputo Forense \u00bfPorqu\u00e9 usar t\u00e9cnicas del siglo pasado?<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"540\" style=\"aspect-ratio: 960 \/ 540;\" width=\"960\" controls src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2022\/07\/Evil3_expo_CVila.mp4\"><\/video><figcaption class=\"wp-element-caption\"><strong>Evil 3 Full Analysis (Owasp)<\/strong><\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"has-text-align-center has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong><a href=\"https:\/\/isec-infosecurity.com\/icoaching\/paper\/Evil3_expo_CVila.pdf\" target=\"_blank\" rel=\"noreferrer noopener\">Evil 3  Full Analysys (pdf)<\/a><\/strong><\/p>\n<\/div>\n<\/div>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"540\" style=\"aspect-ratio: 960 \/ 540;\" width=\"960\" controls src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2022\/07\/Ciberdelito_CVila1.mp4\"><\/video><figcaption class=\"wp-element-caption\">Cibercrimen an\u00e1lisis de escenarios posibles<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-video\"><video height=\"720\" style=\"aspect-ratio: 1280 \/ 720;\" width=\"1280\" controls src=\"https:\/\/isec-infosecurity.com\/icoaching\/wp-content\/uploads\/2022\/07\/Wannacrypt_iLab_CVila.mp4\"><\/video><figcaption class=\"wp-element-caption\">Ransonware, an\u00e1lisis t\u00e9cnico del caso WANACRY<\/figcaption><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\"\/>\n\n\n\n<p class=\"has-text-align-center\">Prohibida su distribuci\u00f3n &#8211; todos los derechos reservados \u00ae ISEC Global Inc. Cada una de las partes proteger\u00e1 la informaci\u00f3n obtenida durante el desarrollo del curso de la misma manera en que protege su propia informaci\u00f3n confidencial, haci\u00e9ndose responsable por cualquier da\u00f1o\/perjuicio que se pudiera ocasionar por el uso indebido de la informaci\u00f3n accedida. <strong>Nuestros documentos entregables y papeles de trabajo ser\u00e1n de acceso exclusivo para el alumno<\/strong>, quien podr\u00e1 disponer para su uso de todos los entregables, que no incluyen metodolog\u00eda ni software utilizado. <strong>PROHIBIDA SU REPRODUCCI\u00d3N PARCIAL O TOTAL DEL MATERIAL<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>iCoaching Memebres\u00eda #Free C\u00f3mputo Forense \u00bfPorqu\u00e9 usar t\u00e9cnicas del siglo pasado? Evil 3 Full Analysys (pdf) Prohibida su distribuci\u00f3n &#8211; todos los derechos reservados \u00ae ISEC Global Inc. Cada una de las partes proteger\u00e1 la informaci\u00f3n obtenida durante el desarrollo<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-939","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/comments?post=939"}],"version-history":[{"count":12,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/939\/revisions"}],"predecessor-version":[{"id":1278,"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/pages\/939\/revisions\/1278"}],"wp:attachment":[{"href":"https:\/\/isec-infosecurity.com\/icoaching\/wp-json\/wp\/v2\/media?parent=939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}