{"id":2782,"date":"2024-11-20T10:36:22","date_gmt":"2024-11-20T13:36:22","guid":{"rendered":"https:\/\/ciberseguridad.uncoma.edu.ar\/?page_id=2782"},"modified":"2026-03-10T07:11:58","modified_gmt":"2026-03-10T10:11:58","slug":"guias","status":"publish","type":"page","link":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/inicio\/guias\/","title":{"rendered":"Guias"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"2782\" class=\"elementor elementor-2782\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-e3b3362 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e3b3362\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a61e2f7\" data-id=\"a61e2f7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3d8ad92 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"3d8ad92\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Guias<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b0da58d elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"b0da58d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-9919122\" data-id=\"9919122\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-25f0261 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"25f0261\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/www.argentina.gob.ar\/jefatura\/innovacion-publica\/onti\/documentos-etap-v25\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"600\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png\" class=\"attachment-full size-full wp-image-853\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png 424w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina-212x300.png 212w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/www.argentina.gob.ar\/jefatura\/innovacion-publica\/onti\/documentos-etap-v25\">Etaps v26<\/a><\/h5><p class=\"elementor-image-box-description\">Est\u00e1ndares tecnol\u00f3gicos de la Administraci\u00f3n P\u00fablica<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-e2aa50b\" data-id=\"e2aa50b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1429d1a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"1429d1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/03\/mp_18_v24_condiciones_minimas_de_servicio_para_data_centers.pdf\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"600\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png\" class=\"attachment-full size-full wp-image-853\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png 424w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina-212x300.png 212w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/03\/mp_18_v24_condiciones_minimas_de_servicio_para_data_centers.pdf\">Etaps v24<\/a><\/h5><p class=\"elementor-image-box-description\">Condiciones Minimas de Servicios para Data Centers<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-227ca9a\" data-id=\"227ca9a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2cc4aa3 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2cc4aa3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/Guia-introductoria-a-la-Seguridad-para-el0ADesarrollo-de-Aplicaciones-WEB.pdf\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"600\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png\" class=\"attachment-full size-full wp-image-853\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png 424w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina-212x300.png 212w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/Guia-introductoria-a-la-Seguridad-para-el0ADesarrollo-de-Aplicaciones-WEB.pdf\">Desarrollo de Aplicaciones WEB<\/a><\/h5><p class=\"elementor-image-box-description\">DNC - Gu\u00eda  para el Desarrollo de Aplicaciones WEB<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-c26c799\" data-id=\"c26c799\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e782da elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"3e782da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/informe_botnets_-_julio_2021.pdf\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"600\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png\" class=\"attachment-full size-full wp-image-853\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png 424w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina-212x300.png 212w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/informe_botnets_-_julio_2021.pdf\">Botnets<\/a><\/h5><p class=\"elementor-image-box-description\">DNC - \nGu\u00eda y glosario para entender su funcionamiento<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-954214d\" data-id=\"954214d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2db26b0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"2db26b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/el_ransomware_el_software_malicioso_usado_para_atacar_a_las_organizaciones.pdf\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"600\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png\" class=\"attachment-full size-full wp-image-853\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png 424w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina-212x300.png 212w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/el_ransomware_el_software_malicioso_usado_para_atacar_a_las_organizaciones.pdf\">Ransomware<\/a><\/h5><p class=\"elementor-image-box-description\">DNC - Software usado para atacar a las organizaciones<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d2ccfcd elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"d2ccfcd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-11db7bd\" data-id=\"11db7bd\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-90d6e4a elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"90d6e4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/informe_phishing_1.pdf\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"600\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png\" class=\"attachment-full size-full wp-image-853\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png 424w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina-212x300.png 212w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/informe_phishing_1.pdf\">Phishing<\/a><\/h5><p class=\"elementor-image-box-description\">DNC - Guia y Glosario<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-f27ae4e\" data-id=\"f27ae4e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4b981e5 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"4b981e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/guia_de_recomendaciones_para_compras_seguras_por_internet_0.pdf\" tabindex=\"-1\"><img fetchpriority=\"high\" decoding=\"async\" width=\"424\" height=\"600\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png\" class=\"attachment-full size-full wp-image-853\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina.png 424w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/10\/EscudoArgentina-212x300.png 212w\" sizes=\"(max-width: 424px) 100vw, 424px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/guia_de_recomendaciones_para_compras_seguras_por_internet_0.pdf\">Compras Seguras por Internet<\/a><\/h5><p class=\"elementor-image-box-description\">DNC- Recomendaciones<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-b282a41\" data-id=\"b282a41\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-fb8b860\" data-id=\"fb8b860\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-1d219ea\" data-id=\"1d219ea\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-25b6e8c elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"25b6e8c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Buenas Pr\u00e1cticas<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-df3d333 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"df3d333\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-1fab158\" data-id=\"1fab158\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-08fb6f6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"08fb6f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Contrasenas.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Contrasenas.pdf\">Contrase\u00f1as<\/a><\/h5><p class=\"elementor-image-box-description\">Recomendaciones de Seguridad<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-1e8b94e\" data-id=\"1e8b94e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d6f183d elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"d6f183d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Entornos-de-Trabajo.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Entornos-de-Trabajo.pdf\">Entorno de Trabajo<\/a><\/h5><p class=\"elementor-image-box-description\">Recomendaciones de Seguridad<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-27f5404\" data-id=\"27f5404\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b8f7288 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"b8f7288\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Email.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Email.pdf\">Correo Electr\u00f3nico<\/a><\/h5><p class=\"elementor-image-box-description\">Recomendaciones de Seguridad<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-8f27214\" data-id=\"8f27214\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0775ed6 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"0775ed6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Navegacion.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-Navegacion.pdf\">Navegaci\u00f3n Web<\/a><\/h5><p class=\"elementor-image-box-description\">Recomendaciones de Seguridad<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-556684e\" data-id=\"556684e\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-74a6b30 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"74a6b30\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-PcCompartidas.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-PcCompartidas.pdf\">Uso de PC Compartidas<\/a><\/h5><p class=\"elementor-image-box-description\">Recomendaciones de Seguridad<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b339315 elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"b339315\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-75caeda\" data-id=\"75caeda\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5152582 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"5152582\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-RedesSociales.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-RedesSociales.pdf\">Redes Sociales<\/a><\/h5><p class=\"elementor-image-box-description\">Recomendaciones de Seguridad<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-9a07a17\" data-id=\"9a07a17\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-967077f elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"967077f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-MI.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/IBP-MI.pdf\">Mensajer\u00eda Instant\u00e1nea<\/a><\/h5><p class=\"elementor-image-box-description\">Recomendaciones de Seguridad<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-016c4c7\" data-id=\"016c4c7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-ae614eb\" data-id=\"ae614eb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-5b385c0\" data-id=\"5b385c0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-8c6693b elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"8c6693b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInDown&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">T\u00e9cnicos<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-149eaba elementor-section-boxed elementor-section-height-default elementor-section-height-default elementor-invisible\" data-id=\"149eaba\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;animation&quot;:&quot;fadeInUp&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-f85a60d\" data-id=\"f85a60d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6761d3e elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"6761d3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/ARIU-Referencias.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2024\/11\/ARIU-Referencias.pdf\">Reportes RIU <\/a><\/h5><p class=\"elementor-image-box-description\">Guia de Referencias<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-a0be40a\" data-id=\"a0be40a\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7e9c7b0 elementor-position-top elementor-widget elementor-widget-image-box\" data-id=\"7e9c7b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><figure class=\"elementor-image-box-img\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2026\/03\/Tutorial-Tics.pdf\" tabindex=\"-1\"><img decoding=\"async\" width=\"605\" height=\"601\" src=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png\" class=\"attachment-full size-full wp-image-1214\" alt=\"\" srcset=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190.png 605w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-300x298.png 300w, https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2022\/11\/ISOLOGO-Ciberseguridad-Color-e1698325640190-150x150.png 150w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/a><\/figure><div class=\"elementor-image-box-content\"><h5 class=\"elementor-image-box-title\"><a href=\"https:\/\/ciberseguridad.uncoma.edu.ar\/wp-content\/uploads\/2026\/03\/Tutorial-Tics.pdf\">Centro de Monitoreo de Seguridad<\/a><\/h5><p class=\"elementor-image-box-description\">Tutorial<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-e403042\" data-id=\"e403042\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-bae2567\" data-id=\"bae2567\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-20 elementor-inner-column elementor-element elementor-element-25fc753\" data-id=\"25fc753\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Guias Etaps v26 Est\u00e1ndares tecnol\u00f3gicos de la Administraci\u00f3n P\u00fablica Etaps v24 Condiciones Minimas de Servicios para Data Centers Desarrollo de Aplicaciones WEB DNC &#8211; Gu\u00eda para el Desarrollo de Aplicaciones WEB Botnets DNC &#8211; Gu\u00eda y glosario para entender su funcionamiento Ransomware DNC &#8211; Software usado para atacar a las organizaciones Phishing DNC &#8211; Guia [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":67,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-2782","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/pages\/2782","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/comments?post=2782"}],"version-history":[{"count":45,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/pages\/2782\/revisions"}],"predecessor-version":[{"id":3069,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/pages\/2782\/revisions\/3069"}],"up":[{"embeddable":true,"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/pages\/67"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.uncoma.edu.ar\/index.php\/wp-json\/wp\/v2\/media?parent=2782"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}