{"id":1934,"date":"2023-09-16T17:21:22","date_gmt":"2023-09-16T20:21:22","guid":{"rendered":"https:\/\/ciberingenieria.com.ar\/?page_id=1934"},"modified":"2023-11-23T10:38:05","modified_gmt":"2023-11-23T13:38:05","slug":"talleres-y-programas-de-formacion","status":"publish","type":"page","link":"https:\/\/ciberingenieria.com.ar\/index.php\/talleres-y-programas-de-formacion\/","title":{"rendered":"Talleres Interactivos"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uag-hide-tab uag-hide-mob uagb-block-6d976574 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-01d495f4\"><h2 class=\"uagb-heading-text\">Talleres Interactivos<\/h2><\/div>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Aprendizaje Activo para una Ciberseguridad Reforzada<\/strong><\/p>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-1c781da6\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-be93864e alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-0116ff9e\"><h2 class=\"uagb-heading-text\"><strong>En Ciberingenier\u00eda, sabemos que el aprendizaje activo es fundamental para interiorizar los principios de la ciberseguridad.<\/strong> <strong>Conducimos talleres altamente interactivos, simulando situaciones reales de ciberseguridad.<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-b188d5e6\"><h2 class=\"uagb-heading-text\"><strong>Estos talleres implican la participaci\u00f3n activa de los miembros de tu equipo, enfrent\u00e1ndolos a escenarios de amenazas cibern\u00e9ticas y ense\u00f1\u00e1ndoles c\u00f3mo responder de manera efectiva.<\/strong><\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-c7fe92fd\"><h2 class=\"uagb-heading-text\"><strong>La interactividad refuerza la comprensi\u00f3n y la toma de decisiones informadas en tiempo real.<\/strong><\/h2><\/div>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-center has-large-font-size\" style=\"padding-top:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--80)\"><strong>Abordamos<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-0c9256aa animated zoomIn\"><h2 class=\"uagb-heading-text\">Simulaci\u00f3n de Ataques cibern\u00e9ticos<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Mediante simulaciones controladas, recreamos ataques cibern\u00e9ticos como phishing, malware y ataques de ingenier\u00eda social, permitiendo a tu equipo experimentar c\u00f3mo reconocer y combatir estas amenazas.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-a54d6b96 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-anete-lusina-5240544-copia-987x1024.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-anete-lusina-5240544-copia-987x1024.jpg\" alt=\"\" class=\"uag-image-3289\" width=\"1024\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-desktop is-layout-flex wp-container-14 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-12 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-1c50215c animated zoomIn\"><h2 class=\"uagb-heading-text\">Pruebas de Respuesta en Incidentes<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Simulamos incidentes de seguridad para entrenar a tu personal en la respuesta adecuada y r\u00e1pida, prepar\u00e1ndolos para mitigar los efectos y minimizar da\u00f1os potenciales.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-3c486fe5 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/chandler-cruttenden-bPUvUVxPzGE-unsplash-edited-1024x1024.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/chandler-cruttenden-bPUvUVxPzGE-unsplash-edited-1024x1024.jpg\" alt=\"\" class=\"uag-image-3292\" width=\"1024\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-tab uag-hide-mob is-layout-flex wp-container-20 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-18 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-73532738 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/chandler-cruttenden-bPUvUVxPzGE-unsplash-edited-scaled.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/chandler-cruttenden-bPUvUVxPzGE-unsplash-edited-scaled.jpg\" alt=\"\" class=\"uag-image-3292\" width=\"1024\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Simulamos incidentes de seguridad para entrenar a tu personal en la respuesta adecuada y r\u00e1pida, prepar\u00e1ndolos para mitigar los efectos y minimizar da\u00f1os potenciales.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-f9870d9e animated zoomIn\"><h2 class=\"uagb-heading-text\">Pruebas de Respuesta en Incidentes<\/h2><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-924d9160 alignfull uagb-is-root-container\"><div class=\"uagb-container__shape uagb-container__shape-top\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 700 10\" preserveAspectRatio=\"none\"><path class=\"uagb-container__shape-fill\" d=\"M350,10L340,0h20L350,10z\"><\/path><\/svg><\/div><div class=\"uagb-container-inner-blocks-wrap\">\n<p class=\"has-text-align-center has-ast-global-color-5-color has-text-color\" style=\"padding-top:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--80);font-size:55px\">Beneficios<\/p>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-cc44146c\"><div class=\"uagb-icon-list__wrap\">\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-59dab220\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Aprendizaje Activo y Pr\u00e1ctico<\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-add3c338\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">La participaci\u00f3n activa en talleres y programas permite a tu equipo aprender de forma pr\u00e1ctica, lo que fortalece su comprensi\u00f3n y retenci\u00f3n de los conceptos de ciberseguridad.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-a684f836\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Preparaci\u00f3n para Escenarios Reales<\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-6b5b26b3\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">La exposici\u00f3n a situaciones simuladas prepara a tu personal para enfrentar desaf\u00edos reales y tomar decisiones informadas en tiempo real.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-8ea2740f\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong><strong>Desarrollo Continuo<\/strong><\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-718befa0\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Nuestros programas de formaci\u00f3n brindan una base s\u00f3lida y una oportunidad para el aprendizaje continuo, manteniendo a tu equipo actualizado con las \u00faltimas amenazas y contramedidas.<\/span><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f5114e1b alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-2db48d5b\"><h2 class=\"uagb-heading-text\">\u00a1Fortalece tu Equipo con Aprendizaje Interactivo en Ciberseguridad!<\/h2><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Talleres Interactivos Aprendizaje Activo para una Ciberseguridad Reforzada En Ciberingenier\u00eda, sabemos que el aprendizaje activo es fundamental para interiorizar los principios de la ciberseguridad. Conducimos talleres altamente interactivos, simulando situaciones reales de ciberseguridad. Estos talleres implican la participaci\u00f3n activa de los miembros de tu equipo, enfrent\u00e1ndolos a escenarios de amenazas cibern\u00e9ticas y ense\u00f1\u00e1ndoles c\u00f3mo responder [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"CeciliaManzano","author_link":"https:\/\/ciberingenieria.com.ar\/index.php\/author\/ceciliamanzano\/"},"uagb_comment_info":0,"uagb_excerpt":"Talleres Interactivos Aprendizaje Activo para una Ciberseguridad Reforzada En Ciberingenier\u00eda, sabemos que el aprendizaje activo es fundamental para interiorizar los principios de la ciberseguridad. Conducimos talleres altamente interactivos, simulando situaciones reales de ciberseguridad. Estos talleres implican la participaci\u00f3n activa de los miembros de tu equipo, enfrent\u00e1ndolos a escenarios de amenazas cibern\u00e9ticas y ense\u00f1\u00e1ndoles c\u00f3mo responder&hellip;","_links":{"self":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1934"}],"collection":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/comments?post=1934"}],"version-history":[{"count":31,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1934\/revisions"}],"predecessor-version":[{"id":3759,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/1934\/revisions\/3759"}],"wp:attachment":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/media?parent=1934"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}