{"id":2026,"date":"2023-09-19T10:30:57","date_gmt":"2023-09-19T13:30:57","guid":{"rendered":"https:\/\/ciberingenieria.com.ar\/?page_id=2026"},"modified":"2023-11-23T10:12:46","modified_gmt":"2023-11-23T13:12:46","slug":"pruebas-de-penetracion","status":"publish","type":"page","link":"https:\/\/ciberingenieria.com.ar\/index.php\/pruebas-de-penetracion\/","title":{"rendered":"Pruebas de Penetraci\u00f3n"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uag-hide-tab uag-hide-mob uagb-block-5df62f0d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-not-stacked-on-mobile is-layout-flex wp-container-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-3c767c22\"><h2 class=\"uagb-heading-text\">Pruebas de penetraci\u00f3n<\/h2><\/div>\n\n\n\n<p class=\"has-medium-font-size\" style=\"text-transform:none\"><strong>Evaluaci\u00f3n Profunda de tu Seguridad Digital<\/strong><\/p>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-c67c4074\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-2ef43636 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-0d8d71f3\"><h2 class=\"uagb-heading-text\"><strong>Las Pruebas de Penetraci\u00f3n, tambi\u00e9n conocidas como PenTesting, son una estrategia esencial en el \u00e1mbito de la ciberseguridad. En Ciberingenier\u00eda, ofrecemos un servicio de Pruebas de Penetraci\u00f3n altamente especializado y certificado por CompTIA, dise\u00f1ado para evaluar a fondo la resistencia de tus sistemas y aplicaciones ante ataques cibern\u00e9ticos.<\/strong><\/h2><\/div>\n<\/div><\/div>\n\n\n\n<p class=\"has-text-align-center\" style=\"padding-top:0;padding-bottom:0;font-size:35px\"><strong>Nuestros servicios<\/strong><\/p>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-6 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-f7cb251c animated zoomIn\"><h2 class=\"uagb-heading-text\">An\u00e1lisis y Evaluaci\u00f3n de Vulnerabilidades<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Aplicamos t\u00e9cnicas avanzadas para identificar y evaluar vulnerabilidades en tu infraestructura digital. Nuestro equipo, certificado por CompTIA, emplea m\u00e9todos de vanguardia para simular ataques reales y descubrir posibles puntos de entrada no autorizados.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-a35ff68a wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-erik-mclean-9689364-edited-scaled.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-erik-mclean-9689364-edited-scaled.jpg\" alt=\"\" class=\"uag-image-3260\" width=\"680\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-desktop is-layout-flex wp-container-14 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-12 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-79da9f2a animated zoomIn\"><h2 class=\"uagb-heading-text\">Simulaci\u00f3n de Ataques Controlados<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Realizamos pruebas de penetraci\u00f3n controladas, replicando posibles escenarios de ataque para evaluar la capacidad de tus sistemas para resistir y defenderse. Esto permite fortalecer tus defensas y prepararte para situaciones reales.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-7c3b514d wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-thisisengineering-3862634-edited-1024x1024.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-thisisengineering-3862634-edited-1024x1024.jpg\" alt=\"\" class=\"uag-image-3259\" width=\"1024\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns uag-hide-tab uag-hide-mob is-layout-flex wp-container-20 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-18 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-ff6b8f7e wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-thisisengineering-3862634-edited-scaled.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/pexels-thisisengineering-3862634-edited-scaled.jpg\" alt=\"\" class=\"uag-image-3259\" width=\"683\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Realizamos pruebas de penetraci\u00f3n controladas, replicando posibles escenarios de ataque para evaluar la capacidad de tus sistemas para resistir y defenderse. Esto permite fortalecer tus defensas y prepararte para situaciones reales.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-aa6e16db animated zoomIn\"><h2 class=\"uagb-heading-text\">Simulaci\u00f3n de Ataques Controlados<\/h2><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-26 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div class=\"wp-block-columns is-layout-flex wp-container-24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-85c6d702 animated zoomIn\"><h2 class=\"uagb-heading-text\">Informes Detallados y Acciones Correctivas<\/h2><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\">\n<p style=\"font-size:18px\">Proporcionamos informes exhaustivos que detallan los hallazgos de las pruebas, junto con recomendaciones claras de acciones correctivas espec\u00edficas. Trabajamos contigo para implementar soluciones efectivas y mejorar tu postura de seguridad.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:25%\">\n<div class=\"wp-block-uagb-image uagb-block-04b96242 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/digital-marketing-1433427_1280-edited.jpg \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/digital-marketing-1433427_1280-edited.jpg\" alt=\"\" class=\"uag-image-3258\" width=\"680\" height=\"1024\" title=\"\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-9372df57 alignfull uagb-is-root-container\"><div class=\"uagb-container__shape uagb-container__shape-top\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 700 10\" preserveAspectRatio=\"none\"><path class=\"uagb-container__shape-fill\" d=\"M350,10L340,0h20L350,10z\"><\/path><\/svg><\/div><div class=\"uagb-container-inner-blocks-wrap\">\n<p class=\"has-text-align-center has-ast-global-color-5-color has-text-color\" style=\"padding-top:var(--wp--preset--spacing--80);padding-bottom:var(--wp--preset--spacing--80);font-size:35px\">Beneficios Clave<\/p>\n\n\n\n<div class=\"wp-block-uagb-icon-list uagb-block-7d023196\"><div class=\"uagb-icon-list__wrap\">\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-ba93f952\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong>Experiencia Certificada por CompTIA<\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-a248f455\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Nuestro equipo de expertos posee certificaci\u00f3n CompTIA, asegurando que las pruebas se realicen con los m\u00e1s altos est\u00e1ndares de calidad y profesionalismo, brind\u00e1ndote la confianza en la calidad de nuestros servicios.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-b89d7269\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong>Infraestructura Fortificada y Protegida<\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-3bce0895\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Al someter tu infraestructura a pruebas de penetraci\u00f3n regulares, aseguras que est\u00e9 reforzada contra potenciales amenazas, proporcionando tranquilidad tanto a tu organizaci\u00f3n como a tus clientes sobre la seguridad de los datos y operaciones.<\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-f7a84fef\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M438.6 105.4C451.1 117.9 451.1 138.1 438.6 150.6L182.6 406.6C170.1 419.1 149.9 419.1 137.4 406.6L9.372 278.6C-3.124 266.1-3.124 245.9 9.372 233.4C21.87 220.9 42.13 220.9 54.63 233.4L159.1 338.7L393.4 105.4C405.9 92.88 426.1 92.88 438.6 105.4H438.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\"><strong><strong><strong>Cumplimiento con Regulaciones y Confiabilidad:<\/strong><\/strong><\/strong><\/span><\/div>\n\n\n\n<div data-aos= \"fade-down\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-icon-list-child uagb-block-f523516d\"><span class=\"uagb-icon-list__source-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\"><path d=\"M256 0C114.6 0 0 114.6 0 256c0 141.4 114.6 256 256 256s256-114.6 256-256C512 114.6 397.4 0 256 0zM406.6 278.6l-103.1 103.1c-12.5 12.5-32.75 12.5-45.25 0s-12.5-32.75 0-45.25L306.8 288H128C110.3 288 96 273.7 96 256s14.31-32 32-32h178.8l-49.38-49.38c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0l103.1 103.1C414.6 241.3 416 251.1 416 256C416 260.9 414.6 270.7 406.6 278.6z\"><\/path><\/svg><\/span><span class=\"uagb-icon-list__label\">Cumple con las regulaciones de seguridad establecidas y demuestra a tus stakeholders que tomas en serio la protecci\u00f3n de sus datos y la integridad de tu negocio. Esto refuerza la confiabilidad de tu organizaci\u00f3n en el manejo seguro de la informaci\u00f3n.<\/span><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-7478eddb alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-2512087d\"><h2 class=\"uagb-heading-text\">\u00a1Optimiza tu Seguridad con Nuestras Pruebas de Penetraci\u00f3n!<\/h2><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Pruebas de penetraci\u00f3n Evaluaci\u00f3n Profunda de tu Seguridad Digital Las Pruebas de Penetraci\u00f3n, tambi\u00e9n conocidas como PenTesting, son una estrategia esencial en el \u00e1mbito de la ciberseguridad. En Ciberingenier\u00eda, ofrecemos un servicio de Pruebas de Penetraci\u00f3n altamente especializado y certificado por CompTIA, dise\u00f1ado para evaluar a fondo la resistencia de tus sistemas y aplicaciones ante [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Emilio Izarra","author_link":"https:\/\/ciberingenieria.com.ar\/index.php\/author\/eizarra\/"},"uagb_comment_info":0,"uagb_excerpt":"Pruebas de penetraci\u00f3n Evaluaci\u00f3n Profunda de tu Seguridad Digital Las Pruebas de Penetraci\u00f3n, tambi\u00e9n conocidas como PenTesting, son una estrategia esencial en el \u00e1mbito de la ciberseguridad. En Ciberingenier\u00eda, ofrecemos un servicio de Pruebas de Penetraci\u00f3n altamente especializado y certificado por CompTIA, dise\u00f1ado para evaluar a fondo la resistencia de tus sistemas y aplicaciones ante&hellip;","_links":{"self":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/2026"}],"collection":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/comments?post=2026"}],"version-history":[{"count":49,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/2026\/revisions"}],"predecessor-version":[{"id":3748,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/2026\/revisions\/3748"}],"wp:attachment":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/media?parent=2026"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}