{"id":3955,"date":"2021-12-01T10:20:00","date_gmt":"2021-12-01T09:20:00","guid":{"rendered":"https:\/\/grupoloyal.net\/curso-comptia-cysa-cybersecurity-analyst\/"},"modified":"2021-12-01T10:20:00","modified_gmt":"2021-12-01T09:20:00","slug":"curso-comptia-cysa-cybersecurity-analyst","status":"publish","type":"post","link":"https:\/\/grupoloyal.net\/curso-comptia-cysa-cybersecurity-analyst\/","title":{"rendered":"CompTIA CySA+ Cybersecurity Analyst"},"content":{"rendered":"

[et_pb_section fb_built=\u00bb1″ fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][et_pb_fullwidth_image src=\u00bbhttps:\/\/grupoloyal.net\/wp-content\/uploads\/2022\/02\/curso-e1645533395126.jpg\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ min_height=\u00bb223.3px\u00bb height=\u00bb530px\u00bb][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ min_height=\u00bb106px\u00bb custom_padding=\u00bb12px||0px|||\u00bb background_color=\u00bb#eaeaea\u00bb hover_enabled=\u00bb0″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column _builder_version=\u00bb4.4.0″ type=\u00bb4_4″][et_pb_text _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

CompTIA CySA+ Cybersecurity Analyst<\/h1>\n

Nuestra soluci\u00f3n de formaci\u00f3n remota o virtual, combina tecnolog\u00edas de alta calidad y la experiencia de nuestros formadores, contenidos, ejercicios e interacci\u00f3n entre compa\u00f1eros que est\u00e9n atendiendo la formaci\u00f3n, para garantizar una sesi\u00f3n formativa superior, independiente de la ubicaci\u00f3n de los alumnos.
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_padding=\u00bb52px|||||\u00bb][et_pb_row column_structure=\u00bb3_5,2_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_blurb title=\u00bbObjetivos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-objetivos.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ header_font_size=\u00bb19px\u00bb]
\nThe CompTIA CSA+ certification is a vendor-neutral credential. The CompTIA CSA+ exam (Exam CS0-001) is an internationally targeted validation of intermediate-level security skills and knowledge. The course has a technical, \u201chands-on\u201d focus on IT security analytics.<\/p>\n

The CompTIA CSA+ exam is based on these objectives:
\nThreat Management
\nVulnerability Management<\/p>\n

Cyber Incident Response
\nSecurity Architecture and Tool Sets
\n[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.4.0″][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-palabras-clave-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Ciberseguridad<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-elearning-300×194.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato e-learning<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-presencial.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato presencial<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato a distancia<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Acceso al campus<\/strong><\/a><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-subvencionado-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Subvenci\u00f3n disponible<\/strong>
\nA trav\u00e9s de Fundae, cumpliendo requisitos.<\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-duracion-1-290×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Duraci\u00f3n<\/strong>
\n25 horas<\/p>\n

[\/et_pb_blurb][et_pb_counters _builder_version=\u00bb4.4.0″][et_pb_counter percent=\u00bb50″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Dificultad[\/et_pb_counter][et_pb_counter percent=\u00bb80″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Nivel alcanzado[\/et_pb_counter][\/et_pb_counters][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#eeeeee\u00bb min_height=\u00bb194px\u00bb custom_padding=\u00bb17px||19px|||\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbDirigido a\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-dirigido-a-300×268.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n

The CompTIA Cybersecurity Analyst (CSA+) examination is designed for IT security analysts, vulnerability analysts, or threat intelligence analysts. The exam will certify that the successful candidate has the knowledge and skills required to configure and use threat detection tools, perform data analysis, and interpret the results to identify vulnerabilities, threats, and risks to an organization with the end goal of securing and protecting applications and systems within an organization.<\/p>\n<\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbConocimientos requeridos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-skils.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ custom_margin=\u00bb||-120px|||\u00bb child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n
\n

While there is no required prerequisite, the CompTIA CSA+ certification is intended to follow CompTIA Security+ or equivalent experience. It is recommended for CompTIA CSA+ certification candidates to have the following:<\/p>\n

3-4 years of hands-on information security or related experience
\nNetwork+, Security+, or equivalent knowledge\n<\/p><\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n

Temario<\/h2>\n

1. Threat Management
\nGiven a scenario, apply environmental reconnaissance techniques using appropriate tools and processes
\nProcedures\/common tasks:
\nTopology discovery
\nOS fingerprinting
\nService discovery
\nPacket capture
\nLog review
\nRouter\/firewall ACLs review
\nEmail harvesting
\nSocial media profiling
\nSocial engineering
\nDNS harvesting
\nPhishing
\nVariables:
\nWireless vs. wired
\nVirtual vs. physical
\nInternal vs. external
\n On-premises vs. cloud
\nTools:
\n NMAP
\n Host scanning
\n Network mapping
\n NETSTAT
\n Packet analyzer
\n IDS\/IPS
\n HIDS\/NIDS
\n Firewall rule-based and logs
\n Syslog
\n Vulnerability scanner
\nGiven a scenario, analyze the results of a network reconnaissance
\nPoint-in-time data analysis:
\nPacket analysis
\nProtocol analysis
\nTraffic analysis
\nNetflow analysis
\nWireless analysis
\nData correlation and analytics:
\nAnomaly analysis
\nTrend analysis
\nAvailability analysis
\nHeuristic analysis
\nBehavioral analysis
\nData output:
\nFirewall logs
\nPacket captures
\nNMAP scan results
\nEvent logs
\nSyslogs
\nIDS report
\nTools:
\nSIEM
\nPacket analyzer
\nIDS
\nResource monitoring tool
\nNetflow analyzer
\nGiven a network-based threat, implement or recommend the appropriate response and countermeasure
\nNetwork segmentation:
\nSystem isolation
\nJump box
\nHoneypot
\nEndpoint security
\nGroup policies
\nACLs:
\nSinkhole
\nHardening:
\nMandatory Access Control (MAC)
\nCompensating controls
\nBlocking unused ports\/services
\nPatching
\nNetwork Access Control (NAC):
\nTime-based
\nRule-based
\nRole-based
\nLocation-based
\nExplain the purpose of practices used to secure a corporate environment
\nPenetration testing:
\nRules of engagement
\nReverse engineering:
\nIsolation\/sandboxing
\nHardware
\nSoftware\/malware
\nTraining and exercises:
\nRed team
\nBlue team
\nWhite team
\nRisk evaluation:
\nTechnical control review
\nOperational control review
\nTechnical impact and likelihood
\n2. Vulnerability Management
\nGiven a scenario, implement an information security vulnerability management process
\nIdentification of requirements:
\nRegulatory environments
\nCorporate policy
\nData classification
\nAsset inventory
\nEstablish scanning frequency:
\nRisk appetite
\nRegulatory requirements
\nTechnical constraints
\nWorkflow
\nConfigure tools to perform scans according to specification:
\nDetermine scanning criteria
\nTool updates\/plug-ins
\nPermissions and access
\nExecute scanning
\nGenerate reports:
\nAutomated vs. manual distribution
\nRemediation:
\nPrioritizing
\nCommunication\/change control
\nSandboxing\/testing
\nInhibitors to remediation
\nOngoing scanning and continuous monitoring
\nGiven a scenario, analyze the output resulting from a vulnerability scan
\nAnalyze reports from a vulnerability scan:
\nReview and interpret scan results
\nValidate results and correlate other data points
\nCompare to best practices or compliance
\nReconcile results
\nReview related logs and\/or other data sources
\nDetermine trends
\nCompare and contrast common vulnerabilities found in the following targets within an organization
\nServers
\nEndpoints
\nNetwork infrastructure
\nNetwork appliances
\nVirtual infrastructure:
\nVirtual hosts
\nVirtual networks
\nManagement interface
\nMobile devices
\nInterconnected networks
\nVirtual private networks (VPNs)
\nIndustrial Control Systems (ICSs)
\nSCADA devices
\n3. Cyber Incident Response
\nGiven a scenario, distinguish threat data or behavior to determine the impact of an incident
\nThreat classification:
\nKnown threats vs. unknown threats
\nZero day
\nAdvanced persistent threat
\nFactors contributing to incident severity and prioritization:
\nScope of impact
\nTypes of data
\nGiven a scenario, prepare a toolkit and use appropriate forensics tools during an investigation
\nForensics kit:
\nDigital forensics workstation
\nWrite blockers
\nCables
\nDrive adapters
\nWiped removable media
\nCameras
\nCrime tape
\nTamper-proof seals
\nDocumentation\/forms
\nForensic investigation suite:
\nImaging utilities
\nAnalysis utilities
\nChain of custody
\nHashing utilities
\nOS and process analysis
\nMobile device forensics
\nPassword crackers
\nCryptography tools
\nLog viewers
\nExplain the importance of communication during the incident response process
\nStakeholders:
\nHR
\nLegal
\nMarketing
\nManagement
\nPurpose of communication processes:
\nLimit communication to trusted parties
\nDisclosure based on regulatory\/legislative requirements
\nPrevent inadvertent release of information
\nSecure method of communication
\nRole-based responsibilities:
\nTechnical
\nManagement
\nLaw enforcement
\nRetain incident response provider
\nGiven a scenario, analyze common symptoms to select the best course of action to support incident response
\nCommon network-related symptoms:
\nBandwidth consumption
\nBeaconing
\nIrregular peer-to-peer communication
\nRogue devices on the network
\nScan sweeps
\nUnusual traffic spikes
\nCommon host-related symptoms:
\nProcessor consumption
\nMemory consumption
\nDrive capacity consumption
\nUnauthorized software
\nMalicious processes
\nUnauthorized changes
\nUnauthorized privileges
\nData exfiltration
\nCommon application-related symptoms:
\nAnomalous activity
\nIntroduction of new accounts
\nUnexpected output
\nUnexpected outbound communication
\nService interruption
\nMemory overflows
\nSummarize the incident recovery and post-incident response process
\nContainment techniques:
\nSegmentation
\nIsolation
\nRemoval
\nReverse engineering
\nEradication techniques:
\nSanitization
\nReconstruction\/reimage
\nSecure disposal
\nValidation:
\nPatching
\nPermissions
\nScanning
\nVerify logging\/communication to security monitoring
\nCorrective actions:
\nLessons learned report
\nChange control process
\nUpdate incident response plan
\nIncident summary report
\n4. Security Architecture and Tool Sets
\nExplain the relationship between frameworks, common policies, controls, and procedures
\nRegulatory compliance
\nFrameworks:
\nNIST
\nISO
\nCOBIT
\nSABSA
\nTOGAF
\nITIL
\nPolicies:
\nPassword policy
\nAcceptable use policy
\nData ownership policy
\nData retention policy
\nAccount management policy
\nData classification policy
\nControls:
\nControl selection based on criteria
\nOrganizationally defined parameters
\nPhysical controls
\nLogical controls
\nAdministrative controls
\nProcedures:
\nContinuous monitoring
\nEvidence production
\nPatching
\nCompensating control development
\nControl testing procedures
\nManage exceptions
\nRemediation plans
\nVerifications and quality control:
\nAudits
\nEvaluations
\nAssessments
\nMaturity model
\nCertification
\nGiven a scenario, use data to recommend remediation of security issues related to identity and access management
\nSecurity issues associated with context-based authentication:
\nTime
\nLocation
\nFrequency
\nBehavioral
\nSecurity issues associated with identities:
\nPersonnel
\nEndpoints
\nServers
\nServices
\nRoles
\nApplications
\nSecurity issues associated with identity repositories:
\nDirectory services
\nTACACS+
\nRADIUS
\nSecurity issues associated with federation and single sign-on:
\nManual vs. automatic provisioning\/deprovisioning
\nSelf-service password reset
\nExploits:
\nImpersonation
\nMan-in-the-middle
\nSession hijack
\nCross-site scripting
\nPrivilege escalation
\nRootkit
\nGiven ascenario, review security architecture and make recommendations to implement compensating controls
\nSecurity data analytics:
\nData aggregation and correlation
\nTrend analysis
\nHistorical analysis
\nManual review:
\nFirewall log
\nSyslogs
\nAuthentication logs
\nEvent logs
\nDefense in depth:
\nPersonnel
\nProcesses
\nTechnologies
\nOther security concepts
\nGiven a scenario, use application security best practices while participating in the Software Development Life Cycle (SDLC)
\nBest practices during software development:
\nSecurity requirements definition
\nSecurity testing phases
\nManual peer reviews
\nUser acceptance testing
\nStress test application
\nSecurity regression testing
\nInput validation
\nSecure coding best practices:
\nOWASP
\nSANS
\nCenter for Internet Security
\nCompare and contrast the general purpose and reasons for using various cybersecurity tools and technologies
\nPreventative:
\nIPS
\nHIPS
\nFirewall
\nAntivirus
\nAnti-malware
\nEMET
\nWeb proxy
\nWeb Application Firewall (WAF)
\nCollective:
\nSIEM
\nNetwork scanning
\nVulnerability scanning
\nPacket capture
\nCommand line\/IP utilities
\nIDS\/HIDS
\nAnalytical:
\nVulnerability scanning
\nMonitoring tools
\nInterception proxy
\nExploit:
\nInterception proxy
\nExploit framework
\nFuzzers
\nForensics:
\nForensic suites
\nHashing
\nPassword cracking
\nImaging<\/p>\n

[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

25 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[52,9,11],"tags":[],"class_list":["post-3955","post","type-post","status-publish","format-standard","hentry","category-ciberseguridad","category-cursos","category-cursos-de-it"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3955","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=3955"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3955\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=3955"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=3955"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=3955"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}