{"id":3978,"date":"2021-12-01T10:20:00","date_gmt":"2021-12-01T09:20:00","guid":{"rendered":"https:\/\/grupoloyal.net\/curso-implementing-and-operating-cisco-security-core-technologies\/"},"modified":"2021-12-01T10:20:00","modified_gmt":"2021-12-01T09:20:00","slug":"curso-implementing-and-operating-cisco-security-core-technologies","status":"publish","type":"post","link":"https:\/\/grupoloyal.net\/curso-implementing-and-operating-cisco-security-core-technologies\/","title":{"rendered":"Implementing and Operating Cisco Security Core Technologies"},"content":{"rendered":"

[et_pb_section fb_built=\u00bb1″ fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][et_pb_fullwidth_image src=\u00bbhttps:\/\/grupoloyal.net\/wp-content\/uploads\/2022\/02\/curso-e1645533395126.jpg\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ min_height=\u00bb223.3px\u00bb height=\u00bb530px\u00bb][\/et_pb_fullwidth_image][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ min_height=\u00bb106px\u00bb custom_padding=\u00bb12px||0px|||\u00bb background_color=\u00bb#eaeaea\u00bb hover_enabled=\u00bb0″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column _builder_version=\u00bb4.4.0″ type=\u00bb4_4″][et_pb_text _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Implementing and Operating Cisco Security Core Technologies<\/h1>\n

The Implementing and Operating Cisco Security Core Technologies (SCOR) course helps you prepare for the Cisco\u00ae CCNP\u00ae Security and CCIE\u00ae Security certifications and for senior-level security roles. In this course, you will master the skills and technologies you need to implement core Cisco security solutions to provide advanced threat protection against cybersecurity attacks. You will learn security for networks, cloud and content, endpoint protection, secure network access, visibility and enforcements. You will get extensive hands-on experience deploying Cisco Firepower Next-Generation Firewall and Cisco ASA Firewall; configuring access control policies, mail policies, and 802.1X Authentication; and more. You will get introductory practice on Cisco Stealthwatch Enterprise and Cisco Stealthwatch Cloud threat detection features.<\/p>\n

Please note that this course is a combination of Instructor-Led and Self-Paced Study – 5 days in the classroom and approx 3 days of self study. The self-study content will be provided as part of the digital courseware that you will recieve at the beginning of the course and should be part of your preparation for the exam.
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_padding=\u00bb52px|||||\u00bb][et_pb_row column_structure=\u00bb3_5,2_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_column type=\u00bb3_5″ _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″][et_pb_blurb title=\u00bbObjetivos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-objetivos.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″ header_font_size=\u00bb19px\u00bb]
\nAfter completing this course you should be able to:<\/p>\n

Describe information security concepts and strategies within the network
\nDescribe common TCP\/IP, network application, and endpoint attacks
\nDescribe how various network security technologies work together to guard against attacks
\nImplement access control on Cisco ASA appliance and Cisco Firepower Next-Generation Firewall
\nDescribe and implement basic email content security features and functions provided by Cisco Email Security Appliance
\nDescribe and implement web content security features and functions provided by Cisco Web Security Appliance
\nDescribe Cisco Umbrella security capabilities, deployment models, policy management, and Investigate console
\nIntroduce VPNs and describe cryptography solutions and algorithms
\nDescribe Cisco secure site-to-site connectivity solutions and explain how to deploy Cisco IOS VTI-based point-to-point IPsec VPNs, and point-to-point IPsec VPN on the Cisco ASA and Cisco FirePower NGFW
\nDescribe and deploy Cisco secure remote access connectivity solutions and describe how to configure 802.1X and EAP authentication
\nProvide basic understanding of endpoint security and describe AMP for Endpoints architecture and basic features
\nExamine various defenses on Cisco devices that protect the control and management plane
\nConfigure and verify Cisco IOS Software Layer 2 and Layer 3 Data Plane Controls
\nDescribe Cisco Stealthwatch Enterprise and Stealthwatch Cloud solutions
\nDescribe basics of cloud computing and common cloud attacks and how to secure cloud environment
\n[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb2_5″ _builder_version=\u00bb4.4.0″][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-palabras-clave-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Ciberseguridad<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-elearning-300×194.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato e-learning<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-presencial.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato presencial<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Disponible en formato a distancia<\/strong><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-remoto-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Acceso al campus<\/strong><\/a><\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-subvencionado-300×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Subvenci\u00f3n disponible<\/strong>
\nA trav\u00e9s de Fundae, cumpliendo requisitos.<\/p>\n

[\/et_pb_blurb][et_pb_blurb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-duracion-1-290×300.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ hover_enabled=\u00bb0″]<\/p>\n

Duraci\u00f3n<\/strong>
\n25 horas<\/p>\n

[\/et_pb_blurb][et_pb_counters _builder_version=\u00bb4.4.0″][et_pb_counter percent=\u00bb50″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Dificultad[\/et_pb_counter][et_pb_counter percent=\u00bb80″ _builder_version=\u00bb4.4.0″ percent_text_color=\u00bb#e88b00″ background_enable_color_default=\u00bbon\u00bb parallax_default=\u00bboff\u00bb parallax_method_default=\u00bbon\u00bb bar_background_color_default=\u00bb#e88b00″ use_percentages=\u00bbon\u00bb allow_player_pause_default=\u00bboff\u00bb]Nivel alcanzado[\/et_pb_counter][\/et_pb_counters][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#eeeeee\u00bb min_height=\u00bb194px\u00bb custom_padding=\u00bb17px||19px|||\u00bb][et_pb_row column_structure=\u00bb1_2,1_2″ _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbDirigido a\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-dirigido-a-300×268.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n

Security individuals who need to be able to implement and operate core security technologies including network security, cloud security, content security, endpoint protection and detection, secure network access, visibility and enforcements.<\/p>\n<\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_2″ _builder_version=\u00bb4.4.0″][et_pb_blurb title=\u00bbConocimientos requeridos\u00bb image=\u00bbhttp:\/\/itformacion.ivanosuna.com\/wp-content\/uploads\/2020\/09\/curso-skils.png\u00bb icon_placement=\u00bbleft\u00bb _builder_version=\u00bb4.4.0″ custom_margin=\u00bb||-120px|||\u00bb child_filter_saturate=\u00bb0%\u00bb child_filter_brightness=\u00bb200%\u00bb]<\/p>\n

\n
\n
\n

Attendees should meet the following prerequisites:<\/p>\n

Familiarity with Ethernet and TCP\/IP networking
\nWorking Knowledge of the Windows operating system
\nWorking Knowledge of Cisco IOS networking and concepts
\nFamiliarity with basics of networking security concepts<\/p>\n

Pre-requisitos:
\nCCNA – Implementing and Administering Cisco Solutions\n<\/p><\/div>\n<\/div>\n

\n
<\/div>\n<\/div>\n

[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ custom_margin=\u00bb1px|||||\u00bb][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″]
\n[et_pb_text content_tablet=\u00bb\u00bb]<\/p>\n

Temario<\/h2>\n

Describing Information Security Concepts (Self-Study)<\/p>\n

Information Security Overview
\nManaging Risk
\nVulnerability Assessment
\nUnderstanding CVSS
\nDescribing Common TCP\/IP Attacks (Self-Study)<\/p>\n

Legacy TCP\/IP Vulnerabilities
\nIP Vulnerabilities
\nICMP Vulnerabilities
\nTCP Vulnerabilities
\nUDP Vulnerabilities
\nAttack Surface and Attack Vectors
\nReconnaissance Attacks
\nAccess Attacks
\nMan-In-The-Middle Attacks
\nDenial of Service and Distributed Denial of Service Attacks
\nReflection and Amplification Attacks
\nSpoofing Attacks
\nDHCP Attacks
\nDescribing Common Network Application Attacks (Self-Study)<\/p>\n

Password Attacks
\nDNS-Based Attacks
\nDNS Tunneling
\nWeb-Based Attacks
\nHTTP 302 Cushioning
\nCommand Injections
\nSQL Injections
\nCross-Site Scripting and Request Forgery
\nEmail-Based Attacks
\nDescribing Common Endpoint Attacks (Self-Study)<\/p>\n

Buffer Overflow
\nMalware
\nReconnaissance Attack
\nGaining Access and Control
\nGaining Access via Social Engineering
\nGaining Access via Web-Based Attacks
\nExploit Kits and Rootkits
\nPrivilege Escalation
\nPost-Exploitation Phase
\nAngler Exploit Kit
\nDescribing Network Security Technologies<\/p>\n

Defense-in-Depth Strategy
\nDefending Across the Attack Continuum
\nNetwork Segmentation and Virtualization Overview
\nStateful Firewall Overview
\nSecurity Intelligence Overview
\nThreat Information Standardization
\nNetwork-Based Malware Protection Overview
\nIPS Overview
\nNext Generation Firewall Overview
\nEmail Content Security Overview
\nWeb Content Security Overview
\nThreat Analytic Systems Overview
\nDNS Security Overview
\nAuthentication, Authorization, and Accounting Overview
\nIdentity and Access Management Overview
\nVirtual Private Network Technology Overview
\nNetwork Security Device Form Factors Overview
\nDeploying Cisco ASA Firewall<\/p>\n

Cisco ASA Deployment Types
\nCisco ASA Interface Security Levels
\nCisco ASA Objects and Object Groups
\nNetwork Address Translation
\nCisco ASA Interface ACLs
\nCisco ASA Global ACLs
\nCisco ASA Advanced Access Policies
\nCisco ASA High Availability Overview
\nDeploying Cisco Firepower Next-Generation Firewall<\/p>\n

Cisco Firepower NGFW Deployments
\nCisco Firepower NGFW Packet Processing and Policies
\nCisco Firepower NGFW Objects
\nCisco Firepower NGFW NAT
\nCisco Firepower NGFW Prefilter Policies
\nCisco Firepower NGFW Access Control Policies
\nCisco Firepower NGFW Security Intelligence
\nCisco Firepower NGFW Discovery Policies
\nCisco Firepower NGFW IPS Policies
\nCisco Firepower NGFW Malware and File Policies
\nDeploying Email Content Security<\/p>\n

Cisco Email Content Security Overview
\nSMTP Overview
\nEmail Pipeline Overview
\nPublic and Private Listeners
\nHost Access Table Overview
\nRecipient Access Table Overview
\nMail Policies Overview
\nProtection Against Spam and Graymail
\nAnti-virus and Anti-malware Protection
\nOutbreak Filters
\nContent Filters
\nData Loss Prevention
\nEmail Encryption
\nDeploying Web Content Security<\/p>\n

Cisco WSA Overview
\nDeployment Options
\nNetwork Users Authentication
\nHTTPS Traffic Decryption
\nAccess Policies and Identification Profiles
\nAcceptable Use Controls Settings
\nAnti-Malware Protection
\nDeploying Cisco Umbrella (Self-Study)<\/p>\n

Cisco Umbrella Architecture
\nDeploying Cisco Umbrella
\nCisco Umbrella Roaming Client
\nManaging Cisco Umbrella
\nCisco Umbrella Investigate Overview
\nExplaining VPN Technologies and Cryptography<\/p>\n

VPN Definition
\nVPN Types
\nSecure Communication and Cryptographic Services
\nKeys in Cryptography
\nPublic Key Infrastructure
\nIntroducing Cisco Secure Site-to-Site VPN Solutions<\/p>\n

Site-to-Site VPN Topologies
\nIPsec VPN Overview
\nIPsec Static Crypto Maps
\nIPsec Static Virtual Tunnel Interface
\nDynamic Multipoint VPN
\nCisco IOS FlexVPN
\nDeploying Cisco IOS VTI-Based Point-to-Point<\/p>\n

Cisco IOS VTIs
\nStatic VTI Point-to-Point IPsec IKEv2 VPN Configuration
\nDeploying Point-to-Point IPsec VPNs on the Cisco ASA and Cisco Firepower NGFW<\/p>\n

Point-to-Point VPNs on the Cisco ASA and Cisco Firepower NGFW
\nCisco ASA Point-to-Point VPN Configuration
\nCisco Firepower NGFW Point-to-Point VPN Configuration
\nIntroducing Cisco Secure Remote Access VPN Solutions<\/p>\n

Remote Access VPN Components
\nRemote Access VPN Technologies
\nSSL Overview
\nDeploying Remote Access SSL VPNs on the Cisco ASA and Cisco Firepower NGFW<\/p>\n

Remote Access Configuration Concepts
\nConnection Profiles
\nGroup Policies
\nCisco ASA Remote Access VPN Configuration
\nCisco Firepower NGFW Remote Access VPN Configuration
\nExplaining Cisco Secure Network Access Solutions<\/p>\n

Cisco Secure Network Access
\nCisco Secure Network Access Components
\nAAA Role in Cisco Secure Network Access Solution
\nCisco Identity Services Engine
\nCisco TrustSec
\nDescribing 802.1X Authentication<\/p>\n

802.1X and EAP
\nEAP Methods
\nRole of RADIUS in 802.1X Communications
\nRADIUS Change of Authorization
\nConfiguring 802.1X Authentication<\/p>\n

Cisco Catalyst Switch 802.1X Configuration
\nCisco WLC 802.1X Configuration
\nCisco ISE 802.1X Configuration
\nSupplicant 802.1x Configuration
\nCisco Central Web Authentication
\nDescribing Endpoint Security Technologies (Self-Study)<\/p>\n

Host-Based Personal Firewall
\nHost-Based Anti-Virus
\nHost-Based Intrusion Prevention System
\nApplication Whitelists and Blacklists
\nHost-Based Malware Protection
\nSandboxing Overview
\nFile Integrity Checking
\nDeploying Cisco AMP for Endpoints (Self-study)<\/p>\n

Cisco AMP for Endpoints Architecture
\nCisco AMP for Endpoints Engines
\nRetrospective Security with Cisco AMP
\nCisco AMP Device and File Trajectory
\nManaging Cisco AMP for Endpoints
\nIntroducing Network Infrastructure Protection (Self-Study)<\/p>\n

Identifying Network Device Planes
\nControl Plane Security Controls
\nManagement Plane Security Controls
\nNetwork Telemetry
\nLayer 2 Data Plane Security Controls
\nLayer 3 Data Plane Security Controls
\nDeploying Control Plane Security Controls (Self-Study)<\/p>\n

Infrastructure ACLs
\nControl Plane Policing
\nControl Plane Protection
\nRouting Protocol Security
\nDeploying Layer 2 Data Plane Security Controls (Self-Study)<\/p>\n

Overview of Layer 2 Data Plane Security Controls
\nVLAN-Based Attacks Mitigation
\nSTP Attacks Mitigation
\nPort Security
\nPrivate VLANs
\nDHCP Snooping
\nARP Inspection
\nStorm Control
\nMACsec Encryption
\nDeploying Layer 3 Data Plane Security Controls (Self-Study)<\/p>\n

Infrastructure Antispoofing ACLs
\nUnicast Reverse Path Forwarding
\nIP Source Guard
\nLabs<\/p>\n

Configure Network Settings And NAT On Cisco ASA
\nConfigure Cisco ASA Access Control Policies
\nConfigure Cisco Firepower NGFW NAT
\nConfigure Cisco Firepower NGFW Access Control Policy
\nConfigure Cisco Firepower NGFW Discovery and IPS Policy
\nConfigure Cisco NGFW Malware and File Policy
\nConfigure Listener, HAT, and RAT on Cisco ESA
\nConfigure Mail Policies
\nConfigure Proxy Services, Authentication, and HTTPS Decryption
\nEnforce Acceptable Use Control and Malware Protection
\nExamine the Umbrella Dashboard
\nExamine Cisco Umbrella Investigate
\nExplore DNS Ransomware Protection by Cisco Umbrella
\nConfigure Static VTI Point-to-Point IPsec IKEv2 Tunnel
\nConfigure Point-to-Point VPN between the Cisco ASA and Cisco Firepower NGFW
\nConfigure Remote Access VPN on the Cisco Firepower NGFW
\nExplore Cisco AMP for Endpoints
\nPerform Endpoint Analysis Using AMP for Endpoints Console
\nExplore File Ransomware Protection by Cisco AMP for Endpoints Console
\nExplore Cisco Stealthwatch Enterprise v6.9.3
\nExplore CTA in Stealthwatch Enterprise v7.0
\nExplore the Cisco Cloudlock Dashboard and User Security
\nExplore Cisco Cloudlock Application and Data Security
\nExplore Cisco Stealthwatch Cloud
\nExplore Stealthwatch Cloud Alert Settings, Watchlists, and Sensors
\n[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1″ _builder_version=\u00bb4.4.0″ background_color=\u00bb#032b35″][et_pb_row _builder_version=\u00bb4.4.0″][et_pb_column type=\u00bb4_4″ _builder_version=\u00bb4.4.0″][et_pb_contact_form captcha=\u00bboff\u00bb title=\u00bbSolicita informaci\u00f3n del curso\u00bb submit_button_text=\u00bbSolicitar informaci\u00f3n ahora\u00bb _builder_version=\u00bb4.4.0″ title_text_color=\u00bb#ffffff\u00bb title_font_size=\u00bb30px\u00bb][et_pb_contact_field field_id=\u00bbName\u00bb field_title=\u00bbNombre\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmail\u00bb field_title=\u00bbDirecci\u00f3n de correo electr\u00f3nico\u00bb field_type=\u00bbemail\u00bb _builder_version=\u00bb3.16″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbEmpresa\u00bb field_title=\u00bbEmpresa\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″][\/et_pb_contact_field][et_pb_contact_field field_id=\u00bbMessage\u00bb field_title=\u00bbCu\u00e9ntanos un poco sobre tus necesidades\u00bb field_type=\u00bbtext\u00bb fullwidth_field=\u00bbon\u00bb _builder_version=\u00bb4.4.0″ form_field_text_color=\u00bb#555555″ button_text_size__hover_enabled=\u00bboff\u00bb button_one_text_size__hover_enabled=\u00bboff\u00bb button_two_text_size__hover_enabled=\u00bboff\u00bb button_text_color__hover_enabled=\u00bboff\u00bb button_one_text_color__hover_enabled=\u00bboff\u00bb button_two_text_color__hover_enabled=\u00bboff\u00bb button_border_width__hover_enabled=\u00bboff\u00bb button_one_border_width__hover_enabled=\u00bboff\u00bb button_two_border_width__hover_enabled=\u00bboff\u00bb button_border_color__hover_enabled=\u00bboff\u00bb button_one_border_color__hover_enabled=\u00bboff\u00bb button_two_border_color__hover_enabled=\u00bboff\u00bb button_border_radius__hover_enabled=\u00bboff\u00bb button_one_border_radius__hover_enabled=\u00bboff\u00bb button_two_border_radius__hover_enabled=\u00bboff\u00bb button_letter_spacing__hover_enabled=\u00bboff\u00bb button_one_letter_spacing__hover_enabled=\u00bboff\u00bb button_two_letter_spacing__hover_enabled=\u00bboff\u00bb button_bg_color__hover_enabled=\u00bboff\u00bb button_one_bg_color__hover_enabled=\u00bboff\u00bb button_two_bg_color__hover_enabled=\u00bboff\u00bb][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

25 horas<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"2880","footnotes":""},"categories":[52,9,11],"tags":[],"class_list":["post-3978","post","type-post","status-publish","format-standard","hentry","category-ciberseguridad","category-cursos","category-cursos-de-it"],"acf":[],"_links":{"self":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3978","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/comments?post=3978"}],"version-history":[{"count":0,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/posts\/3978\/revisions"}],"wp:attachment":[{"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/media?parent=3978"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/categories?post=3978"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/grupoloyal.net\/wp-json\/wp\/v2\/tags?post=3978"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}