{"id":23426,"date":"2025-06-14T19:22:49","date_gmt":"2025-06-14T19:22:49","guid":{"rendered":"https:\/\/academiadeciberseguridad.com\/online\/?post_type=lp_course&#038;p=23426"},"modified":"2026-01-02T23:32:56","modified_gmt":"2026-01-02T23:32:56","slug":"cyber-threat-hunting-curso-tactico-de-soc","status":"publish","type":"lp_course","link":"https:\/\/academiadeciberseguridad.com\/online\/cursos\/cyber-threat-hunting-curso-tactico-de-soc\/","title":{"rendered":"Cyber Threat Hunting \u2013 Curso t\u00e1ctico de SOC"},"content":{"rendered":"<div style=\"padding: 56.25% 0 0 0; position: relative;\"><iframe style=\"position: absolute; top: 0; left: 0; width: 100%; height: 100%;\" title=\"CTH Jueves 12 de Diciembre\" src=\"https:\/\/player.vimeo.com\/video\/1070398872?h=028f505b7a&amp;title=0&amp;byline=0&amp;portrait=0&amp;badge=0&amp;autopause=0&amp;player_id=0&amp;app_id=58479\" frameborder=\"0\"><\/iframe><\/div>\n<p><script src=\"https:\/\/player.vimeo.com\/api\/player.js\"><\/script><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":24076,"comment_status":"open","ping_status":"closed","template":"","course_category":[62],"course_tag":[],"class_list":["post-23426","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-gestion","course"],"_links":{"self":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course\/23426","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/comments?post=23426"}],"version-history":[{"count":2,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course\/23426\/revisions"}],"predecessor-version":[{"id":23560,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course\/23426\/revisions\/23560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/media\/24076"}],"wp:attachment":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/media?parent=23426"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/course_category?post=23426"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/course_tag?post=23426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}