{"id":1904,"date":"2023-09-16T17:02:40","date_gmt":"2023-09-16T20:02:40","guid":{"rendered":"https:\/\/ciberingenieria.com.ar\/?page_id=1904"},"modified":"2023-11-22T09:27:25","modified_gmt":"2023-11-22T12:27:25","slug":"capacitacion-y-concienciacion-en-seguridad-informatica","status":"publish","type":"page","link":"https:\/\/ciberingenieria.com.ar\/index.php\/capacitacion-y-concienciacion-en-seguridad-informatica\/","title":{"rendered":"Capacitaci\u00f3n y Concientizaci\u00f3n"},"content":{"rendered":"\n<div class=\"wp-block-uagb-advanced-heading uagb-block-82c7ed6e\"><h2 class=\"uagb-heading-text\">Capacitaci\u00f3n y Concientizaci\u00f3n<\/h2><p class=\"uagb-desc-text\"><strong>Empoderando a tu Equipo: Defensores Activos de la Ciberseguridad<\/strong><\/p><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-95d115be alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<p class=\"has-ast-global-color-7-color has-text-color\" style=\"margin-top:0;margin-bottom:0;padding-top:0;padding-right:var(--wp--preset--spacing--40);padding-bottom:0;padding-left:var(--wp--preset--spacing--40);font-size:16px\">En Ciberingenier\u00eda, comprendemos que el eslab\u00f3n humano es fundamental en la cadena de seguridad de la informaci\u00f3n. Nuestro servicio de Capacitaci\u00f3n y Concienciaci\u00f3n en Seguridad Inform\u00e1tica est\u00e1 cuidadosamente dise\u00f1ado para fortalecer a tu equipo humano y convertirlos en defensores activos de la ciberseguridad. A trav\u00e9s de programas educativos especializados y talleres pr\u00e1cticos, los capacitamos para enfrentar los desaf\u00edos cibern\u00e9ticos y fomentamos buenas pr\u00e1cticas de seguridad.<\/p>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-59c40690 wp-block-uagb-separator--text\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><div class=\"wp-block-uagb-separator-element\"><h4 class=\"uagb-html-tag\">Modalidades<\/h4><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f9594f7a alignfull uagb-is-root-container\">\n<div class=\"wp-block-uagb-container uagb-block-b3912bc3\">\n<div class=\"wp-block-cover is-light wp-duotone-000000-rgba3957227047-3\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img decoding=\"async\" loading=\"lazy\" width=\"2560\" height=\"1707\" class=\"wp-block-cover__image-background wp-image-2612\" alt=\"\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/jason-goodman-vbxyFxlgpjM-unsplash-scaled.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/jason-goodman-vbxyFxlgpjM-unsplash-scaled.jpg 2560w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/jason-goodman-vbxyFxlgpjM-unsplash-300x200.jpg 300w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/jason-goodman-vbxyFxlgpjM-unsplash-1024x683.jpg 1024w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/jason-goodman-vbxyFxlgpjM-unsplash-768x512.jpg 768w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/jason-goodman-vbxyFxlgpjM-unsplash-1536x1024.jpg 1536w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/jason-goodman-vbxyFxlgpjM-unsplash-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center\" style=\"margin-right:var(--wp--preset--spacing--20);margin-left:var(--wp--preset--spacing--20);padding-right:0;padding-left:0;font-size:28px;line-height:1.4\"><strong>Talleres<\/strong> <strong>Interactivos<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details\"><summary>\u00bfQu\u00e9 es?<\/summary>\n<p>Impartimos talleres interactivos y programas de formaci\u00f3n altamente participativos. Estos est\u00e1n meticulosamente dise\u00f1ados para educar a tu personal sobre las \u00faltimas amenazas cibern\u00e9ticas y, lo que es a\u00fan m\u00e1s importante, c\u00f3mo mitigarlas de manera efectiva. Creemos en aprender haciendo, por lo que nuestros talleres est\u00e1n llenos de interacci\u00f3n y escenarios realistas.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-1 wp-block-buttons-is-layout-flex\"><\/div>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-2 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button animated pulse\"><a class=\"wp-block-button__link has-ast-global-color-0-background-color has-background wp-element-button\" href=\"https:\/\/ciberingenieria.com.ar\/index.php\/talleres-y-programas-de-formacion\/\" target=\"_blank\" rel=\"noreferrer noopener\">ir al servicio<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-dbbe3a48\">\n<div class=\"wp-block-cover is-light wp-duotone-000000-rgba3957227047-7\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim\"><\/span><img decoding=\"async\" loading=\"lazy\" width=\"2560\" height=\"1707\" class=\"wp-block-cover__image-background wp-image-2615\" alt=\"\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-burst-374820-scaled.jpg\" data-object-fit=\"cover\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-burst-374820-scaled.jpg 2560w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-burst-374820-300x200.jpg 300w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-burst-374820-1024x683.jpg 1024w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-burst-374820-768x512.jpg 768w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-burst-374820-1536x1024.jpg 1536w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-burst-374820-2048x1365.jpg 2048w\" sizes=\"(max-width: 2560px) 100vw, 2560px\" \/><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\n<p class=\"has-text-align-center\" style=\"margin-right:var(--wp--preset--spacing--20);margin-left:var(--wp--preset--spacing--20);padding-right:0;padding-left:0;font-size:28px;line-height:1.4\"><strong>Programas de Formaci\u00f3n<\/strong><\/p>\n\n\n\n<details class=\"wp-block-details\"><summary>\u00bfQu\u00e9 es?<\/summary>\n<p>Inculcamos buenas pr\u00e1cticas de seguridad en el entorno laboral, desde la creaci\u00f3n de contrase\u00f1as seguras hasta la identificaci\u00f3n de correos electr\u00f3nicos de phishing. Nuestro enfoque educativo se centra en que cada miembro de tu equipo tenga un entendimiento s\u00f3lido de c\u00f3mo mantener seguros los activos de la empresa y proteger la confidencialidad e integridad de los datos.<\/p>\n\n\n\n<div class=\"wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex\"><\/div>\n<\/details>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-container-6 wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button animated pulse\"><a class=\"wp-block-button__link has-ast-global-color-0-background-color has-background wp-element-button\" href=\"https:\/\/ciberingenieria.com.ar\/index.php\/educacion-en-buenas-practicas-de-seguridad\/\" target=\"_blank\" rel=\"noreferrer noopener\">ir al servicio<\/a><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-45a21110 wp-block-uagb-separator--icon\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><div class=\"wp-block-uagb-separator-element\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M224 416c-8.188 0-16.38-3.125-22.62-9.375l-192-192c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L224 338.8l169.4-169.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-192 192C240.4 412.9 232.2 416 224 416z\"><\/path><\/svg><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-d5564389\"><div class=\"uagb-icon-list__wrap\">\n<div class=\"wp-block-uagb-icon-list-child uagb-block-04a8297a animated fadeIn\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Empoderamiento del Equipo para un Mundo Digital Seguro:<\/strong> Capacitamos a tu personal, brind\u00e1ndoles el conocimiento y la confianza necesarios para enfrentar las complejidades de la ciberseguridad y actuar de manera proactiva en el entorno digital actual.<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-03c4e40b animated fadeIn\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Reducci\u00f3n Sustancial de Riesgos:<\/strong> Al fortalecer la conciencia en seguridad y promover buenas pr\u00e1cticas, disminuimos dr\u00e1sticamente la probabilidad de caer en trampas cibern\u00e9ticas. Esto se traduce en una significativa reducci\u00f3n de los riesgos de seguridad para tu organizaci\u00f3n.<\/span><\/div>\n\n\n\n<div class=\"wp-block-uagb-icon-list-child uagb-block-2c0f27d1 animated fadeIn\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M0 256C0 114.6 114.6 0 256 0C397.4 0 512 114.6 512 256C512 397.4 397.4 512 256 512C114.6 512 0 397.4 0 256zM371.8 211.8C382.7 200.9 382.7 183.1 371.8 172.2C360.9 161.3 343.1 161.3 332.2 172.2L224 280.4L179.8 236.2C168.9 225.3 151.1 225.3 140.2 236.2C129.3 247.1 129.3 264.9 140.2 275.8L204.2 339.8C215.1 350.7 232.9 350.7 243.8 339.8L371.8 211.8z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Escudo Humano Efectivo contra Amenazas Cibern\u00e9ticas:<\/strong> Transformamos a tu equipo en el primer y m\u00e1s efectivo escudo de defensa contra las amenazas cibern\u00e9ticas. Fortalecemos la seguridad desde adentro, creando un escudo humano altamente efectivo.<\/span><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-955bdb1c alignfull uagb-is-root-container\"><div class=\"uagb-container__shape uagb-container__shape-top\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1000 100\" preserveAspectRatio=\"none\"><path class=\"uagb-container__shape-fill\" d=\"M500,98.9L0,6.1V0h1000v6.1L500,98.9z\"><\/path><\/svg><\/div><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8bdc1a19\"><h2 class=\"uagb-heading-text\">\u00a1Convierte a tu Equipo en Defensores Activos de la Ciberseguridad!<\/h2><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Capacitaci\u00f3n y Concientizaci\u00f3n Empoderando a tu Equipo: Defensores Activos de la Ciberseguridad En Ciberingenier\u00eda, comprendemos que el eslab\u00f3n humano es fundamental en la cadena de seguridad de la informaci\u00f3n. Nuestro servicio de Capacitaci\u00f3n y Concienciaci\u00f3n en Seguridad Inform\u00e1tica est\u00e1 cuidadosamente dise\u00f1ado para fortalecer a tu equipo humano y convertirlos en defensores activos de la ciberseguridad. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"CeciliaManzano","author_link":"https:\/\/ciberingenieria.com.ar\/index.php\/author\/ceciliamanzano\/"},"uagb_comment_info":0,"uagb_excerpt":"Capacitaci\u00f3n y Concientizaci\u00f3n Empoderando a tu Equipo: Defensores Activos de la Ciberseguridad En Ciberingenier\u00eda, comprendemos que el eslab\u00f3n humano es fundamental en la cadena de seguridad de la informaci\u00f3n. Nuestro servicio de Capacitaci\u00f3n y Concienciaci\u00f3n en Seguridad Inform\u00e1tica est\u00e1 cuidadosamente dise\u00f1ado para fortalecer a tu equipo humano y convertirlos en defensores activos de la ciberseguridad.&hellip;","_links":{"self":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1904"}],"collection":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/comments?post=1904"}],"version-history":[{"count":52,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1904\/revisions"}],"predecessor-version":[{"id":3647,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1904\/revisions\/3647"}],"wp:attachment":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/media?parent=1904"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}