{"id":326,"date":"2023-07-25T23:37:05","date_gmt":"2023-07-26T02:37:05","guid":{"rendered":"https:\/\/ciberingenieria.com.ar\/index.php\/home\/"},"modified":"2024-08-15T19:35:04","modified_gmt":"2024-08-15T22:35:04","slug":"inicio","status":"publish","type":"page","link":"https:\/\/ciberingenieria.com.ar\/","title":{"rendered":"Inicio"},"content":{"rendered":"\n<div class=\"wp-block-uagb-container uagb-block-e57fda73 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-columns is-layout-flex wp-container-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"inherit-container-width wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<div class=\"wp-block-uagb-info-box uagb-block-808a3593 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-icon-wrap\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 448 512\"><path d=\"M224 416c-8.188 0-16.38-3.125-22.62-9.375l-192-192c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L224 338.8l169.4-169.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-192 192C240.4 412.9 232.2 416 224 416z\"><\/path><\/svg><\/div><div class=\"uagb-ifb-title-wrap\"><h1 class=\"uagb-ifb-title\">Bienvenido a<br>Ciberingenier\u00eda <\/h1><\/div><\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-45ab379b alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-9945a805 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h2 class=\"uagb-ifb-title\"><strong>Certificados en H<strong>acking \u00c9tico<\/strong><\/strong><\/h2><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-image aligncenter uagb-block-4334298d wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><a class=\"\" href=\"https:\/\/www.credly.com\/badges\/9b6d5d05-53f4-422f-884b-62988d9abb6b\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/09\/CompTIA_PenTest_2B-PNG-ByN.png ,https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/09\/CompTIA_PenTest_2B-PNG-2.png 780w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/09\/CompTIA_PenTest_2B-PNG-ByN.png 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/09\/CompTIA_PenTest_2B-PNG-ByN.png\" alt=\"\" class=\"uag-image-1835\" width=\"70\" height=\"70\" title=\"\" loading=\"lazy\" role=\"img\"\/><\/a><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-8e8db665 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-32f70d08 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><span class=\"uagb-ifb-title-prefix\">\u00bfQu\u00e9 hacemos?<\/span><h2 class=\"uagb-ifb-title\">Protegemos tu Informaci\u00f3n<\/h2><\/div><p class=\"uagb-ifb-desc\">En el mundo de hoy, la ciberseguridad es m\u00e1s importante que nunca..<br><\/p><div class=\"uagb-ifb-button-wrapper wp-block-button\"><a href=\"https:\/\/ciberingenieria.com.ar\/index.php\/quienessomos#ancla\" class=\"uagb-infobox-cta-link wp-block-button__link\" target=\"_blank\" rel=\"noopener noreferrer\" onclick=\"return true;\" alt=\"\"><span class=\"uagb-inline-editing\">leer m\u00e1s<\/span><\/a><\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-01d0137d alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-3e853131\"><h3 class=\"uagb-heading-text\">Macros<strong>ervicios<\/strong><\/h3><div class=\"uagb-separator\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-13 wp-block-columns-is-layout-flex\" style=\"border-style:none;border-width:0px;border-radius:0px;padding-top:0;padding-right:0;padding-bottom:0;padding-left:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div data-aos= \"zoom-out\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-image aligncenter uagb-block-4b38525d wp-block-uagb-image--layout-default wp-block-uagb-image--effect-zoomin wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><a class=\"\" href=\"https:\/\/ciberingenieria.com.ar\/index.php\/pruebas-de-penetracion-y-evaluacion-de-vulnerabilidades\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/ESTE.png ,https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/ESTE.png 780w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/ESTE.png 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/ESTE.png\" alt=\"\" class=\"uag-image-3832\" width=\"140\" height=\"500\" title=\"ESTE\" loading=\"lazy\" role=\"img\"\/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-a8d20427\"><h2 class=\"uagb-heading-text\">Hacking<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-721c4bf9\"><h2 class=\"uagb-heading-text\">\u00c9tico<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-modal uagb-block-85dabd78 uagb-modal-wrapper\" data-escpress=\"enable\" data-overlayclick=\"enable\"><div class=\"uagb-spectra-button-wrapper wp-block-button\"><a class=\"uagb-modal-button-link wp-block-button__link uagb-modal-trigger\" href=\"#\" onclick=\"return false;\" target=\"_self\" rel=\"noopener noreferrer\"><span class=\"uagb-modal-content-wrapper\"><span class=\"uagb-inline-editing\">M\u00e1s<\/span><\/span><\/a><\/div><div class=\"uagb-effect-default uagb-modal-popup uagb-block-85dabd78\"><div class=\"uagb-modal-popup-wrap\"><div class=\"uagb-modal-popup-content\">\n<div class=\"wp-block-columns is-layout-flex wp-container-5 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-ast-global-color-7-color has-text-color\" style=\"font-size:15px;font-style:normal;font-weight:700\">El Hacking \u00c9tico es una pr\u00e1ctica fundamental en la seguridad inform\u00e1tica que busca identificar vulnerabilidades y debilidades en los sistemas de una empresa de manera \u00e9tica y controlada. En Ciberingenier\u00eda, ofrecemos un conjunto de servicios especializados de Hacking \u00c9tico para asegurar que tu empresa est\u00e9 protegida contra las amenazas cibern\u00e9ticas. <strong>|<a href=\"https:\/\/ciberingenieria.com.ar\/index.php\/pruebas-de-penetracion-y-evaluacion-de-vulnerabilidades\/\" data-type=\"link\" data-id=\"https:\/\/ciberingenieria.com.ar\/index.php\/asesoramiento-y-estrategia\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s detalle<\/a>|<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div><button class=\"uagb-modal-popup-close\" aria-label=\"Close Modal\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M310.6 361.4c12.5 12.5 12.5 32.75 0 45.25C304.4 412.9 296.2 416 288 416s-16.38-3.125-22.62-9.375L160 301.3L54.63 406.6C48.38 412.9 40.19 416 32 416S15.63 412.9 9.375 406.6c-12.5-12.5-12.5-32.75 0-45.25l105.4-105.4L9.375 150.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L160 210.8l105.4-105.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-105.4 105.4L310.6 361.4z\"><\/path><\/svg><\/button><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div data-aos= \"zoom-out\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-image aligncenter uagb-block-70d1537f wp-block-uagb-image--layout-default wp-block-uagb-image--effect-zoomin wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><a class=\"\" href=\"https:\/\/ciberingenieria.com.ar\/index.php\/ingenieria-de-procesos\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/07\/MServicio-Ingenieria-de-Procesos-2.png ,https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/07\/MServicio-Ingenieria-de-Procesos-2.png 780w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/07\/MServicio-Ingenieria-de-Procesos-2.png 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/07\/MServicio-Ingenieria-de-Procesos-2.png\" alt=\"\" class=\"uag-image-3808\" width=\"140\" height=\"500\" title=\"MServicio-Ingenieria-de-Procesos-2\" loading=\"lazy\" role=\"img\"\/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-28187244\"><h2 class=\"uagb-heading-text\">Ingenier\u00eda de<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-73d65edf\"><h2 class=\"uagb-heading-text\">Procesos<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-modal uagb-block-e4368fb0 uagb-modal-wrapper\" data-escpress=\"enable\" data-overlayclick=\"enable\"><div class=\"uagb-spectra-button-wrapper wp-block-button\"><a class=\"uagb-modal-button-link wp-block-button__link uagb-modal-trigger\" href=\"#\" onclick=\"return false;\" target=\"_self\" rel=\"noopener noreferrer\"><span class=\"uagb-modal-content-wrapper\"><span class=\"uagb-inline-editing\">M\u00e1s<\/span><\/span><\/a><\/div><div class=\"uagb-effect-default uagb-modal-popup uagb-block-e4368fb0\"><div class=\"uagb-modal-popup-wrap\"><div class=\"uagb-modal-popup-content\">\n<div class=\"wp-block-columns is-layout-flex wp-container-8 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-ast-global-color-7-color has-text-color\" style=\"font-size:15px;font-style:normal;font-weight:700\">&#8230;&#8230;&#8230;. <strong>|<a href=\"https:\/\/ciberingenieria.com.ar\/index.php\/ingenieria-de-procesos\/\" data-type=\"link\" data-id=\"https:\/\/ciberingenieria.com.ar\/index.php\/especializacion-tecnologica-y-monitoreo\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s detalle<\/a>|<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div><button class=\"uagb-modal-popup-close\" aria-label=\"Close Modal\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M310.6 361.4c12.5 12.5 12.5 32.75 0 45.25C304.4 412.9 296.2 416 288 416s-16.38-3.125-22.62-9.375L160 301.3L54.63 406.6C48.38 412.9 40.19 416 32 416S15.63 412.9 9.375 406.6c-12.5-12.5-12.5-32.75 0-45.25l105.4-105.4L9.375 150.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L160 210.8l105.4-105.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-105.4 105.4L310.6 361.4z\"><\/path><\/svg><\/button><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div data-aos= \"zoom-out\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-image aligncenter uagb-block-65a9c4a2 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-zoomin wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><a class=\"\" href=\"https:\/\/ciberingenieria.com.ar\/index.php\/especializacion-tecnologica-y-monitoreo\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/38.png ,https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/38.png 780w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/38.png 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2024\/08\/38.png\" alt=\"\" class=\"uag-image-3834\" width=\"140\" height=\"500\" title=\"38\" loading=\"lazy\" role=\"img\"\/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-f5240b01\"><h2 class=\"uagb-heading-text\">Infraestructura y<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-e4143407\"><h2 class=\"uagb-heading-text\">Comunicaciones<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-modal uagb-block-f345e9c3 uagb-modal-wrapper\" data-escpress=\"enable\" data-overlayclick=\"enable\"><div class=\"uagb-spectra-button-wrapper wp-block-button\"><a class=\"uagb-modal-button-link wp-block-button__link uagb-modal-trigger\" href=\"#\" onclick=\"return false;\" target=\"_self\" rel=\"noopener noreferrer\"><span class=\"uagb-modal-content-wrapper\"><span class=\"uagb-inline-editing\">M\u00e1s<\/span><\/span><\/a><\/div><div class=\"uagb-effect-default uagb-modal-popup uagb-block-f345e9c3\"><div class=\"uagb-modal-popup-wrap\"><div class=\"uagb-modal-popup-content\">\n<div class=\"wp-block-columns is-layout-flex wp-container-11 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-ast-global-color-7-color has-text-color\" style=\"font-size:15px;font-style:normal;font-weight:700\">En Ciberingenier\u00eda, reconocemos la importancia de la especializaci\u00f3n tecnol\u00f3gica en un mundo digital en constante evoluci\u00f3n. Nuestro servicio de Especializaci\u00f3n Tecnol\u00f3gica se enfoca en \u00e1reas clave de la tecnolog\u00eda donde nuestros expertos DevOps y nuestro ingeniero certificado pueden brindar soluciones avanzadas y altamente especializadas. <strong>|<a href=\"https:\/\/ciberingenieria.com.ar\/index.php\/especializacion-tecnologica-y-monitoreo\/\" data-type=\"link\" data-id=\"https:\/\/ciberingenieria.com.ar\/index.php\/pruebas-de-penetracion-y-evaluacion-de-vulnerabilidades\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s detalle<\/a>|<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div><button class=\"uagb-modal-popup-close\" aria-label=\"Close Modal\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M310.6 361.4c12.5 12.5 12.5 32.75 0 45.25C304.4 412.9 296.2 416 288 416s-16.38-3.125-22.62-9.375L160 301.3L54.63 406.6C48.38 412.9 40.19 416 32 416S15.63 412.9 9.375 406.6c-12.5-12.5-12.5-32.75 0-45.25l105.4-105.4L9.375 150.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L160 210.8l105.4-105.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-105.4 105.4L310.6 361.4z\"><\/path><\/svg><\/button><\/div><\/div><\/div>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-c8b54571\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-22 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div data-aos= \"zoom-out\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-image aligncenter uagb-block-4b5bc909 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-zoomin wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><a class=\"\" href=\"https:\/\/ciberingenieria.com.ar\/index.php\/asesoramiento-y-estrategia\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Asesoramiento-y-Estrategia-PNG.png ,https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Asesoramiento-y-Estrategia-PNG.png 780w, https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Asesoramiento-y-Estrategia-PNG.png 360w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Asesoramiento-y-Estrategia-PNG.png\" alt=\"\" class=\"uag-image-3223\" width=\"140\" height=\"500\" title=\"Asesoramiento-y-Estrategia-PNG\" loading=\"lazy\" role=\"img\"\/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-aef21f7b\"><h2 class=\"uagb-heading-text\">Asesoramiento y<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-78dd6988\"><h2 class=\"uagb-heading-text\">Estrategia<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-modal uagb-block-d09651eb uagb-modal-wrapper\" data-escpress=\"enable\" data-overlayclick=\"enable\"><div class=\"uagb-spectra-button-wrapper wp-block-button\"><a class=\"uagb-modal-button-link wp-block-button__link uagb-modal-trigger\" href=\"#\" onclick=\"return false;\" target=\"_self\" rel=\"noopener noreferrer\"><span class=\"uagb-modal-content-wrapper\"><span class=\"uagb-inline-editing\">M\u00e1s<\/span><\/span><\/a><\/div><div class=\"uagb-effect-default uagb-modal-popup uagb-block-d09651eb\"><div class=\"uagb-modal-popup-wrap\"><div class=\"uagb-modal-popup-content\">\n<div class=\"wp-block-columns is-layout-flex wp-container-16 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-ast-global-color-7-color has-text-color\" style=\"font-size:15px;font-style:normal;font-weight:700\">En Ciberingenier\u00eda, creemos en la importancia de establecer una s\u00f3lida estrategia que integre la ciberseguridad con la eficiencia operativa. Nuestro servicio de Asesoramiento y Estrategia es un enfoque integral para ayudarte a alcanzar un equilibrio perfecto entre la seguridad de la informaci\u00f3n y la eficiencia en los procesos de tu empresa.. <strong>|<a href=\"https:\/\/ciberingenieria.com.ar\/index.php\/asesoramiento-y-estrategia\/\" data-type=\"link\" data-id=\"https:\/\/ciberingenieria.com.ar\/index.php\/capacitacion-y-concienciacion-en-seguridad-informatica\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s detalle<\/a>|<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div><button class=\"uagb-modal-popup-close\" aria-label=\"Close Modal\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M310.6 361.4c12.5 12.5 12.5 32.75 0 45.25C304.4 412.9 296.2 416 288 416s-16.38-3.125-22.62-9.375L160 301.3L54.63 406.6C48.38 412.9 40.19 416 32 416S15.63 412.9 9.375 406.6c-12.5-12.5-12.5-32.75 0-45.25l105.4-105.4L9.375 150.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L160 210.8l105.4-105.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-105.4 105.4L310.6 361.4z\"><\/path><\/svg><\/button><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<div data-aos= \"zoom-out\" data-aos-duration=\"400\" data-aos-delay=\"0\" data-aos-easing=\"ease\" data-aos-once=\"true\" class=\"wp-block-uagb-image aligncenter uagb-block-0bdc8979 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-zoomin wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><a class=\"\" href=\"https:\/\/ciberingenieria.com.ar\/index.php\/capacitacion-y-concienciacion-en-seguridad-informatica\/\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" srcset=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Capacitacion-y-Concientizacion-PNG.png \" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberingenieria.com.ar\/wp-content\/uploads\/2023\/10\/Capacitacion-y-Concientizacion-PNG.png\" alt=\"\" class=\"uag-image-3226\" width=\"140\" height=\"100\" title=\"\" loading=\"lazy\" role=\"img\"\/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-ebc8a3bd\"><h2 class=\"uagb-heading-text\">Capacitaci\u00f3n y<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-d73c575a\"><h2 class=\"uagb-heading-text\">Concientizaci\u00f3n<\/h2><\/div>\n\n\n\n<div class=\"wp-block-uagb-modal uagb-block-4ee1fb94 uagb-modal-wrapper\" data-escpress=\"enable\" data-overlayclick=\"enable\"><div class=\"uagb-spectra-button-wrapper wp-block-button\"><a class=\"uagb-modal-button-link wp-block-button__link uagb-modal-trigger\" href=\"#\" onclick=\"return false;\" target=\"_self\" rel=\"noopener noreferrer\"><span class=\"uagb-modal-content-wrapper\"><span class=\"uagb-inline-editing\">M\u00e1s<\/span><\/span><\/a><\/div><div class=\"uagb-effect-default uagb-modal-popup uagb-block-4ee1fb94\"><div class=\"uagb-modal-popup-wrap\"><div class=\"uagb-modal-popup-content\">\n<div class=\"wp-block-columns is-layout-flex wp-container-19 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<p class=\"has-ast-global-color-7-color has-text-color\" style=\"font-size:15px;font-style:normal;font-weight:700\">En Ciberingenier\u00eda, comprendemos que el eslab\u00f3n humano es fundamental en la cadena de seguridad de la informaci\u00f3n. Nuestro servicio de Capacitaci\u00f3n y Concienciaci\u00f3n en Seguridad Inform\u00e1tica est\u00e1 cuidadosamente dise\u00f1ado para fortalecer a tu equipo humano y convertirlos en defensores activos de la ciberseguridad. A trav\u00e9s de programas educativos especializados y talleres pr\u00e1cticos, los capacitamos para enfrentar los desaf\u00edos cibern\u00e9ticos y fomentamos buenas pr\u00e1cticas de seguridad. <strong>|<\/strong><a href=\"https:\/\/ciberingenieria.com.ar\/index.php\/capacitacion-y-concienciacion-en-seguridad-informatica\/\" data-type=\"link\" data-id=\"https:\/\/ciberingenieria.com.ar\/index.php\/capacitacion-y-concienciacion-en-seguridad-informatica\/\" target=\"_blank\" rel=\"noreferrer noopener\">M\u00e1s detalle <\/a><strong>|<\/strong><\/p>\n<\/div>\n<\/div>\n<\/div><button class=\"uagb-modal-popup-close\" aria-label=\"Close Modal\"><svg xmlns=\"https:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 320 512\"><path d=\"M310.6 361.4c12.5 12.5 12.5 32.75 0 45.25C304.4 412.9 296.2 416 288 416s-16.38-3.125-22.62-9.375L160 301.3L54.63 406.6C48.38 412.9 40.19 416 32 416S15.63 412.9 9.375 406.6c-12.5-12.5-12.5-32.75 0-45.25l105.4-105.4L9.375 150.6c-12.5-12.5-12.5-32.75 0-45.25s32.75-12.5 45.25 0L160 210.8l105.4-105.4c12.5-12.5 32.75-12.5 45.25 0s12.5 32.75 0 45.25l-105.4 105.4L310.6 361.4z\"><\/path><\/svg><\/button><\/div><\/div><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-24 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\"><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-0a24da79\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-a23191bc alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-uagb-advanced-heading uagb-block-d06e12bb\"><h2 class=\"uagb-heading-text\">Cada uno de los servicios est\u00e1 dise\u00f1ado para proporcionarle la <strong><mark class=\"uagb-highlight\">m\u00e1xima protecci\u00f3n<\/mark><\/strong> y <strong><mark class=\"uagb-highlight\">confianza<\/mark><\/strong> en la seguridad de su infraestructura de TI.                             En Ciberingenier\u00eda, nos enorgullece proporcionar soluciones de seguridad cibern\u00e9tica de <strong><mark class=\"uagb-highlight\">alta calidad<\/mark><\/strong> que protegen su negocio y <strong><mark class=\"uagb-highlight\">promueven su crecimiento<\/mark><\/strong>.<\/h2><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Macroservicios Hacking \u00c9tico Ingenier\u00eda de Procesos Infraestructura y Comunicaciones Asesoramiento y Estrategia Capacitaci\u00f3n y Concientizaci\u00f3n Cada uno de los servicios est\u00e1 dise\u00f1ado para proporcionarle la m\u00e1xima protecci\u00f3n y confianza en la seguridad de su infraestructura de TI. En Ciberingenier\u00eda, nos enorgullece proporcionar soluciones de seguridad cibern\u00e9tica de alta calidad que protegen su negocio y promueven [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"unboxed","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"CeciliaManzano","author_link":"https:\/\/ciberingenieria.com.ar\/index.php\/author\/ceciliamanzano\/"},"uagb_comment_info":0,"uagb_excerpt":"Macroservicios Hacking \u00c9tico Ingenier\u00eda de Procesos Infraestructura y Comunicaciones Asesoramiento y Estrategia Capacitaci\u00f3n y Concientizaci\u00f3n Cada uno de los servicios est\u00e1 dise\u00f1ado para proporcionarle la m\u00e1xima protecci\u00f3n y confianza en la seguridad de su infraestructura de TI. En Ciberingenier\u00eda, nos enorgullece proporcionar soluciones de seguridad cibern\u00e9tica de alta calidad que protegen su negocio y promueven&hellip;","_links":{"self":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/326"}],"collection":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/comments?post=326"}],"version-history":[{"count":164,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/326\/revisions"}],"predecessor-version":[{"id":3835,"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/pages\/326\/revisions\/3835"}],"wp:attachment":[{"href":"https:\/\/ciberingenieria.com.ar\/index.php\/wp-json\/wp\/v2\/media?parent=326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}