{"id":23461,"date":"2025-11-22T00:32:27","date_gmt":"2025-11-22T00:32:27","guid":{"rendered":"https:\/\/academiadeciberseguridad.com\/online\/?post_type=lp_course&#038;p=23461"},"modified":"2025-12-16T03:07:12","modified_gmt":"2025-12-16T03:07:12","slug":"centro-de-operaciones-de-ciberseguridad","status":"publish","type":"lp_course","link":"https:\/\/academiadeciberseguridad.com\/online\/cursos\/centro-de-operaciones-de-ciberseguridad\/","title":{"rendered":"Centro de Operaciones de Ciberseguridad"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"23461\" class=\"elementor elementor-23461\" data-elementor-post-type=\"lp_course\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6149ccf4 e-con-full e-flex e-con e-parent\" data-id=\"6149ccf4\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-708ce82c elementor-widget elementor-widget-text-editor\" data-id=\"708ce82c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El\u00a0<strong data-start=\"65\" data-end=\"113\">Centro de Operaciones de Ciberseguridad 2025<\/strong>\u00a0es un programa dise\u00f1ado para mostrar c\u00f3mo funciona un CyberSOC moderno y cu\u00e1les son las capacidades esenciales para detectar, analizar y responder a amenazas avanzadas. A trav\u00e9s de casos reales y contenido pr\u00e1ctico, conocer\u00e1s los componentes, herramientas y procesos que permiten a las organizaciones proteger sus activos digitales y tomar decisiones estrat\u00e9gicas frente a ciberataques.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7fea36b8 elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"7fea36b8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading\"><h4 class=\"title\">Objetivos de Aprendizaje <\/h4><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59ebc538 elementor-widget elementor-widget-thim-ekits-header-info\" data-id=\"59ebc538\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-ekits-header-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"header-info-swapper\">\n\t\t\t<ul class=\"thim-header-info\">\n\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\"><path d=\"M13.3337 4L6.00033 11.3333L2.66699 8\" stroke=\"#3AB500\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tComprender la estructura, funciones y capacidades de un CyberSOC moderno.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\"><path d=\"M13.3337 4L6.00033 11.3333L2.66699 8\" stroke=\"#3AB500\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tIdentificar y evaluar las tecnolog\u00edas claves utilizadas en un SOC.\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\"><path d=\"M13.3337 4L6.00033 11.3333L2.66699 8\" stroke=\"#3AB500\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tAnalizar casos reales de incidentes de ciberseguridad\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t\t\t\t<li>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span>\n\t\t\t\t\t\t\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\" viewBox=\"0 0 16 16\" fill=\"none\"><path d=\"M13.3337 4L6.00033 11.3333L2.66699 8\" stroke=\"#3AB500\" stroke-width=\"2\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><\/path><\/svg>\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t\tAdquirir criterios para implementar o tercerizar un Centro de Operaciones de Ciberseguridad\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t\t<\/ul>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5720cfee elementor-widget thim-ekits-heading elementor-widget-thim-heading\" data-id=\"5720cfee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"thim-heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"sc_heading\"><h4 class=\"title\">Preguntas y Respuestas <\/h4><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-831eb43 elementor-widget elementor-widget-n-accordion\" data-id=\"831eb43\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;default_state&quot;:&quot;expanded&quot;,&quot;max_items_expended&quot;:&quot;one&quot;,&quot;n_accordion_animation_duration&quot;:{&quot;unit&quot;:&quot;ms&quot;,&quot;size&quot;:400,&quot;sizes&quot;:[]}}\" data-widget_type=\"nested-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"e-n-accordion\" aria-label=\"Accordion. Open links with Enter or Space, close with Escape, and navigate with Arrow Keys\">\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1370\" class=\"e-n-accordion-item\" open>\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"1\" tabindex=\"0\" aria-expanded=\"true\" aria-controls=\"e-n-accordion-item-1370\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfNecesito experiencia previa en ciberseguridad para llevar este curso? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1370\" class=\"elementor-element elementor-element-6686808 e-con-full e-flex e-con e-child\" data-id=\"6686808\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-1cc655f elementor-widget elementor-widget-text-editor\" data-id=\"1cc655f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"font-size: 16px; font-style: normal; font-weight: 400; margin-bottom: 1em; background-color: #f7f8f8;\">No. El curso est\u00e1 dise\u00f1ado para todo profesional que desee comprender c\u00f3mo funciona un CyberSOC moderno. No se requieren conocimientos avanzados, aunque ayuda tener nociones b\u00e1sicas de TI o seguridad.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1371\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"2\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1371\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfQu\u00e9 aprender\u00e9 exactamente en este programa? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1371\" class=\"elementor-element elementor-element-a8a5e5a e-con-full e-flex e-con e-child\" data-id=\"a8a5e5a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b779505 elementor-widget elementor-widget-text-editor\" data-id=\"b779505\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Aprender\u00e1s las <strong data-start=\"644\" data-end=\"714\">8 capacidades claves de un Centro de Operaciones de Ciberseguridad<\/strong>, incluyendo monitoreo, detecci\u00f3n, respuesta a incidentes, SIEM, XDR, SOAR, Threat Hunting, Dark Web, Brand Protection y gesti\u00f3n operativa de un SOC.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1372\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"3\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1372\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfEl curso es en vivo o grabado? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1372\" class=\"elementor-element elementor-element-5b7dd27 e-con-full e-flex e-con e-child\" data-id=\"5b7dd27\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c47f3a5 elementor-widget elementor-widget-text-editor\" data-id=\"c47f3a5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este programa es <strong data-start=\"932\" data-end=\"950\">100% as\u00edncrono<\/strong>, lo que te permite estudiar a tu ritmo, con acceso 24\/7 al contenido desde nuestra plataforma.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1373\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"4\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1373\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfQu\u00e9 certificaci\u00f3n recibir\u00e9 al finalizar? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1373\" class=\"elementor-element elementor-element-aa0af46 e-flex e-con-boxed e-con e-child\" data-id=\"aa0af46\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-219a309 elementor-widget elementor-widget-text-editor\" data-id=\"219a309\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1459\" data-end=\"1760\">Al completar todas las sesiones y actividades, recibir\u00e1s un <strong data-start=\"1167\" data-end=\"1223\">certificado oficial de la Academia de Ciberseguridad<\/strong>, avalando tus conocimientos en operaci\u00f3n y gesti\u00f3n de un CyberSOC moderno.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1374\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"5\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1374\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfRecibo un certificado al finalizar? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1374\" class=\"elementor-element elementor-element-8719101 e-flex e-con-boxed e-con e-child\" data-id=\"8719101\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cef570d elementor-widget elementor-widget-text-editor\" data-id=\"cef570d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>S\u00ed. Al culminar el programa y aprobar las evaluaciones, recibir\u00e1s un <strong data-start=\"1880\" data-end=\"1956\">Certificado de Especializaci\u00f3n en Ciberseguridad: Ataque y Defensa (96h)<\/strong> emitido por <strong data-start=\"1969\" data-end=\"2009\">LDGrupo \u2013 Academia de Ciberseguridad<\/strong>, v\u00e1lido para tu CV profesional o procesos de certificaci\u00f3n avanzada.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1375\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"6\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1375\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfEl contenido es actualizado seg\u00fan las tendencias del 2025? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1375\" class=\"elementor-element elementor-element-c38ffb1 e-flex e-con-boxed e-con e-child\" data-id=\"c38ffb1\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3e499c6 elementor-widget elementor-widget-text-editor\" data-id=\"3e499c6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2180\" data-end=\"2262\">S\u00ed. El programa est\u00e1 dise\u00f1ado con base en est\u00e1ndares actuales, escenarios reales y tecnolog\u00edas usadas en los SOC modernos durante el 2025.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1376\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"7\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1376\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfA qui\u00e9n est\u00e1 dirigido este curso? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1376\" class=\"elementor-element elementor-element-28e6a3a e-flex e-con-boxed e-con e-child\" data-id=\"28e6a3a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d994ef9 elementor-widget elementor-widget-text-editor\" data-id=\"d994ef9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"2533\" data-end=\"2670\">A profesionales de TI, seguridad digital, l\u00edderes tecnol\u00f3gicos, responsables de transformaci\u00f3n digital, consultores y cualquier persona interesada en comprender c\u00f3mo funciona un centro de operaciones de ciberseguridad.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1377\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"8\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1377\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfPuedo acceder al curso desde cualquier pa\u00eds? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1377\" class=\"elementor-element elementor-element-a1c3e6a e-flex e-con-boxed e-con e-child\" data-id=\"a1c3e6a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-991c0fc elementor-widget elementor-widget-text-editor\" data-id=\"991c0fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1855\" data-end=\"1942\">S\u00ed. El acceso es <strong data-start=\"1872\" data-end=\"1889\">internacional<\/strong>, desde cualquier dispositivo y en cualquier horario.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1378\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"9\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1378\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfQu\u00e9 materiales incluye el curso? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1378\" class=\"elementor-element elementor-element-6afb56a e-flex e-con-boxed e-con e-child\" data-id=\"6afb56a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-985bf0d elementor-widget elementor-widget-text-editor\" data-id=\"985bf0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1996\" data-end=\"2006\">Incluye:<\/p><ul data-start=\"2007\" data-end=\"2169\"><li data-start=\"2007\" data-end=\"2042\"><p data-start=\"2009\" data-end=\"2042\">Clases grabadas en alta calidad<\/p><\/li><li data-start=\"2043\" data-end=\"2077\"><p data-start=\"2045\" data-end=\"2077\">Slides y recursos descargables<\/p><\/li><li data-start=\"2078\" data-end=\"2106\"><p data-start=\"2080\" data-end=\"2106\">Contenido complementario<\/p><\/li><li data-start=\"2107\" data-end=\"2143\"><p data-start=\"2109\" data-end=\"2143\">Acceso ilimitado a la plataforma<\/p><\/li><li data-start=\"2144\" data-end=\"2169\"><p data-start=\"2146\" data-end=\"2169\">Certificaci\u00f3n oficial<\/p><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-1379\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"10\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-1379\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfQu\u00e9 habilidades tendr\u00e9 al finalizar el curso? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-1379\" class=\"elementor-element elementor-element-3f04139 e-flex e-con-boxed e-con e-child\" data-id=\"3f04139\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0e92d55 elementor-widget elementor-widget-text-editor\" data-id=\"0e92d55\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Podr\u00e1s comprender, evaluar y operar las funciones esenciales de un SOC moderno, analizar escenarios reales y entender c\u00f3mo se gestionan amenazas, incidentes y procesos de seguridad a nivel corporativo.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t\t<details id=\"e-n-accordion-item-13710\" class=\"e-n-accordion-item\" >\n\t\t\t\t<summary class=\"e-n-accordion-item-title\" data-accordion-index=\"11\" tabindex=\"-1\" aria-expanded=\"false\" aria-controls=\"e-n-accordion-item-13710\" >\n\t\t\t\t\t<span class='e-n-accordion-item-title-header'><div class=\"e-n-accordion-item-title-text\"> \u00bfCu\u00e1nto tiempo dura el acceso al curso? <\/div><\/span>\n\t\t\t\t\t\t\t<span class='e-n-accordion-item-title-icon'>\n\t\t\t<span class='e-opened' ><i aria-hidden=\"true\" class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t<span class='e-closed'><i aria-hidden=\"true\" class=\"fas fa-plus\"><\/i><\/span>\n\t\t<\/span>\n\n\t\t\t\t\t\t<\/summary>\n\t\t\t\t<div role=\"region\" aria-labelledby=\"e-n-accordion-item-13710\" class=\"elementor-element elementor-element-f7662d8 e-flex e-con-boxed e-con e-child\" data-id=\"f7662d8\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-08ead1e elementor-widget elementor-widget-text-editor\" data-id=\"08ead1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>El acceso es <strong data-start=\"2511\" data-end=\"2524\">ilimitado<\/strong>, por lo que podr\u00e1s revisar las clases siempre que lo necesites.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/details>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-647539a e-flex e-con-boxed e-con e-parent\" data-id=\"647539a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-131e371 elementor-widget elementor-widget-image\" data-id=\"131e371\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/academiadeciberseguridad.com\/online\/wp-content\/uploads\/2025\/11\/certifcado-cybersoc2025.png\" data-elementor-open-lightbox=\"yes\" data-elementor-lightbox-title=\"certifcado-cybersoc2025.png\" data-e-action-hash=\"#elementor-action%3Aaction%3Dlightbox%26settings%3DeyJpZCI6MjM3MTYsInVybCI6Imh0dHBzOlwvXC9hY2FkZW1pYWRlY2liZXJzZWd1cmlkYWQuY29tXC9vbmxpbmVcL3dwLWNvbnRlbnRcL3VwbG9hZHNcLzIwMjVcLzExXC9jZXJ0aWZjYWRvLWN5YmVyc29jMjAyNS5wbmcifQ%3D%3D\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"623\" height=\"446\" src=\"https:\/\/academiadeciberseguridad.com\/online\/wp-content\/uploads\/2025\/11\/certifcado-cybersoc2025.png\" class=\"attachment-2048x2048 size-2048x2048 wp-image-23716\" alt=\"\" srcset=\"https:\/\/academiadeciberseguridad.com\/online\/wp-content\/uploads\/2025\/11\/certifcado-cybersoc2025.png 623w, https:\/\/academiadeciberseguridad.com\/online\/wp-content\/uploads\/2025\/11\/certifcado-cybersoc2025-600x430.png 600w, https:\/\/academiadeciberseguridad.com\/online\/wp-content\/uploads\/2025\/11\/certifcado-cybersoc2025-300x215.png 300w\" sizes=\"(max-width: 623px) 100vw, 623px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>El\u00a0Centro de Operaciones de Ciberseguridad 2025\u00a0es un programa dise\u00f1ado para mostrar c\u00f3mo funciona un CyberSOC moderno y cu\u00e1les son las capacidades esenciales para detectar, analizar y responder a amenazas avanzadas. A trav\u00e9s de casos reales y contenido pr\u00e1ctico, conocer\u00e1s los &hellip; <\/p>\n","protected":false},"author":1,"featured_media":24412,"comment_status":"open","ping_status":"closed","template":"","course_category":[62],"course_tag":[],"class_list":["post-23461","lp_course","type-lp_course","status-publish","has-post-thumbnail","hentry","course_category-gestion","course"],"_links":{"self":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course\/23461","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course"}],"about":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/types\/lp_course"}],"author":[{"embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/comments?post=23461"}],"version-history":[{"count":38,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course\/23461\/revisions"}],"predecessor-version":[{"id":24414,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/lp_course\/23461\/revisions\/24414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/media\/24412"}],"wp:attachment":[{"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/media?parent=23461"}],"wp:term":[{"taxonomy":"course_category","embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/course_category?post=23461"},{"taxonomy":"course_tag","embeddable":true,"href":"https:\/\/academiadeciberseguridad.com\/online\/wp-json\/wp\/v2\/course_tag?post=23461"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}