{"id":5401,"date":"2024-01-31T16:46:05","date_gmt":"2024-01-31T14:46:05","guid":{"rendered":"https:\/\/wawiwa-tech.com\/?page_id=5401"},"modified":"2024-07-15T12:39:25","modified_gmt":"2024-07-15T09:39:25","slug":"certified-penetration-testing","status":"publish","type":"page","link":"https:\/\/wawiwa-tech.com\/es\/certified-penetration-testing\/","title":{"rendered":"Pruebas de penetraci\u00f3n certificadas"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5401\" class=\"elementor elementor-5401\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f4a0206 elementor-section-height-min-height elementor-section-content-middle custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3f4a0206\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-412f2665\" data-id=\"412f2665\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee71bcf elementor-widget elementor-widget-heading\" data-id=\"ee71bcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Pruebas de penetraci\u00f3n certificadas<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25af809d elementor-widget elementor-widget-heading\" data-id=\"25af809d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Curso de perfeccionamiento, 80 horas lectivas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2115c2 elementor-widget elementor-widget-heading\" data-id=\"5c2115c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Formaci\u00f3n integral en ciberseguridad con un enfoque de seguridad ofensiva<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8f6122 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c8f6122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Nivel: Intermedio<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4265929f custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4265929f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53fec5fa\" data-id=\"53fec5fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50cac22b elementor-widget elementor-widget-text-editor\" data-id=\"50cac22b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">Para proteger las redes inform\u00e1ticas y los activos digitales, a veces es necesario pasar a la ofensiva e intentar penetrar en ellos para descubrir vulnerabilidades. Este completo curso de formaci\u00f3n en ciberseguridad se centra en varios aspectos de la seguridad ofensiva.\u00a0<\/span><span style=\"font-weight: 400;\">Abarca <strong>m\u00e9todos y t\u00e9cnicas de pruebas de penetraci\u00f3n en infraestructuras, aplicaciones y seguridad inal\u00e1mbrica<\/strong> que pueden ayudar a construir una carrera en ciberseguridad en los campos de <strong>pentesting de sistemas, pentesting de infraestructuras, ciberseguridad, pentesting de aplicaciones web y operaciones cibern\u00e9ticas. <\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6167863 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6167863\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f66c6ff\" data-id=\"f66c6ff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3348bf6 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"3348bf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_scale_effect&quot;:&quot;yes&quot;,&quot;motion_fx_scale_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;motion_fx_scale_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_scale_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:20,&quot;end&quot;:80}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tAl inscribirse en este curso, explorar\u00e1 todas las v\u00edas de las pruebas de penetraci\u00f3n, obteniendo una ventaja competitiva y desarrollando las capacidades para realizar diversas evaluaciones de seguridad sin problemas.\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-11dd455 e-flex e-con-boxed e-con e-parent\" data-id=\"11dd455\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b381644 e-con-full e-flex e-con e-child\" data-id=\"b381644\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-409ef1c e-flex e-con-boxed e-con e-child\" data-id=\"409ef1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbfa227 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cbfa227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quiero ofrecer este curso<br>en mi instituci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0fb50f e-con-full e-flex e-con e-child\" data-id=\"f0fb50f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-b76dc31 e-flex e-con-boxed e-con e-child\" data-id=\"b76dc31\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2eada0d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2eada0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quiero asistir a este curso<br>o inscribir a mi equipo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78cdcfbe custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78cdcfbe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3e7f7d99\" data-id=\"3e7f7d99\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96d1ca3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"96d1ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-user-check\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-463414b0 elementor-widget elementor-widget-heading\" data-id=\"463414b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfA qui\u00e9n va dirigido este curso?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97deeda elementor-widget elementor-widget-text-editor\" data-id=\"97deeda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Analistas de seguridad\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ingenieros de redes y seguridad\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hackers \u00e9ticos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Responsables de TI\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ciberinvestigadores\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Probadores de penetraci\u00f3n<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evaluadores de vulnerabilidad<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b529e elementor-widget elementor-widget-heading\" data-id=\"82b529e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Requisitos previos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32e3c9b2 elementor-widget elementor-widget-text-editor\" data-id=\"32e3c9b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conocimientos de TCP\/IP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conocimientos b\u00e1sicos de las l\u00edneas de comandos de Windows y Linux<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58d8fb79 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"58d8fb79\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5e02c07\" data-id=\"5e02c07\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a0dc02b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2a0dc02b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-target-arrow\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77be9cb4 elementor-widget elementor-widget-heading\" data-id=\"77be9cb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objetivos de aprendizaje<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d9f828f elementor-widget elementor-widget-text-editor\" data-id=\"1d9f828f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Comprender los fundamentos de las redes y la arquitectura inform\u00e1tica\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aprovechamiento de Linux para pr\u00e1cticas de hacking \u00e9tico\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aprender sobre privacidad y anonimato\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Familiarizaci\u00f3n con la inteligencia de fuentes abiertas (OSINT)\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enumeraci\u00f3n y exploraci\u00f3n avanzadas de protocolos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identificaci\u00f3n y evaluaci\u00f3n de vulnerabilidades\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Descifrar contrase\u00f1as y acceso seguro\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pirateo de sistemas, redes y aplicaciones organizativas\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Evaluar las post-explotaciones\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inspecci\u00f3n precisa de paquetes\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Realizar ataques de sniffing activo<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c9e0117 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c9e0117\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4168f5c8\" data-id=\"4168f5c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58fa2b16 elementor-widget elementor-widget-heading\" data-id=\"58fa2b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lo que obtendr\u00e1...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-722dba0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"722dba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Presentaci\u00f3n del curso en formato PDF<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Fichas y documentaci\u00f3n \u00fatil<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\"Navaja suiza\" - 3Gb de herramientas IR<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">42 horas de aprendizaje pr\u00e1ctico mediante actividades pr\u00e1cticas<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Un certificado Wawiwa al finalizar con \u00e9xito el curso<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3257990 elementor-widget elementor-widget-text-editor\" data-id=\"3257990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Adem\u00e1s, puede optar por aumentar el curso de su equipo para incluir la preparaci\u00f3n para las pruebas de certificaci\u00f3n pertinentes de la industria de la ciberseguridad, con un coste adicional. Las certificaciones de ciberseguridad para las que se puede utilizar este curso de preparaci\u00f3n incluyen: GIAC Penetration Tester (GPEN) con CyberLive y GIAC Web Application Penetration Tester (GWAPT).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f29cbdd elementor-widget elementor-widget-image\" data-id=\"f29cbdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"263\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Cyber-certifications.png\" class=\"attachment-medium_large size-medium_large wp-image-5403\" alt=\"Certificaciones cibern\u00e9ticas\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Cyber-certifications.png 512w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Cyber-certifications-300x154.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a27c56 elementor-widget elementor-widget-text-editor\" data-id=\"2a27c56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Certificaciones de ciberseguridad pertinentes<\/span><\/i><\/p><p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Nota: No se ofrece ni se garantiza una certificaci\u00f3n industrial como parte del curso.<\/span><\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-131f25b9 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"131f25b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3321e838\" data-id=\"3321e838\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66f56654 elementor-widget elementor-widget-heading\" data-id=\"66f56654\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Supervisor profesional e instructores<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dedad4a elementor-widget elementor-widget-heading\" data-id=\"dedad4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Supervisa todos los cursos cibern\u00e9ticos de Wawiwa el Sr. Nadav Nachmias, Jefe de Programas de Ciberseguridad de Wawiwa.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77938287 elementor-widget elementor-widget-heading\" data-id=\"77938287\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Los instructores del curso son profesionales de la ciberseguridad con experiencia pr\u00e1ctica y conocimientos de formaci\u00f3n. El nivel t\u00e9cnico del curso puede ajustarse en funci\u00f3n de la audiencia.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a817760 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a817760\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-461ea04d\" data-id=\"461ea04d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e1bd641 elementor-widget elementor-widget-image\" data-id=\"3e1bd641\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"982\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg\" class=\"attachment-large size-large wp-image-5376\" alt=\"Nadav Nachmias Jefe de Programas de Ciberseguridad\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg 834w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-244x300.jpeg 244w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-768x943.jpeg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias.jpeg 1043w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2158571a elementor-widget elementor-widget-heading\" data-id=\"2158571a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Nadav Nachmias<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720fc5c1 elementor-widget elementor-widget-text-editor\" data-id=\"720fc5c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jefe de Programas de Ciberseguridad<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-104e10f9 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"104e10f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9a810aa\" data-id=\"9a810aa\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12d75dc elementor-widget elementor-widget-text-editor\" data-id=\"12d75dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nadav es un especialista en ciberseguridad con m\u00e1s de 15 a\u00f1os de experiencia, centrado en estrategias de ciberseguridad, arquitectura y capacitaci\u00f3n de la mano de obra. Su experiencia pr\u00e1ctica le ha hecho intuitivo el desarrollo de diversos programas y materiales de formaci\u00f3n en varios campos de la ciberseguridad (incluida la gesti\u00f3n de la ciberseguridad, la gesti\u00f3n y respuesta a incidentes y la ciberciencia forense).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-335d926 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"335d926\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08c1ebb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08c1ebb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fb4226\" data-id=\"0fb4226\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54123b9 elementor-widget elementor-widget-heading\" data-id=\"54123b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 opinan los licenciados?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e78f81c elementor-testimonial--skin-default elementor-testimonial--layout-image_inline elementor-testimonial--align-center elementor-arrows-yes elementor-pagination-type-bullets elementor-widget elementor-widget-testimonial-carousel\" data-id=\"e78f81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;autoplay_speed&quot;:10000,&quot;show_arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;autoplay&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"testimonial-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Diapositivas\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Siempre me interes\u00f3 la ciberseguridad. Me apasionaba este enorme campo que no deja de evolucionar. Busqu\u00e9 cursos en l\u00ednea y descubr\u00ed que la mayor\u00eda son muy pr\u00e1cticos, un v\u00eddeo que se ejecuta en un sitio web. Entonces encontr\u00e9 el programa de Ciberseguridad de Wawiwa. Me inscrib\u00ed y, a lo largo del programa, empec\u00e9 a tener ganas de ir a clase. Es una sesi\u00f3n en directo, con mucho trabajo pr\u00e1ctico, trabajando con herramientas cibern\u00e9ticas de la vida real y experimentando lo que pueden hacer. Los instructores cuentan historias de la vida real y ponen ejemplos sobre el terreno. Eso hace que el programa sea realmente apasionante\".\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-testimonial__footer\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/John-Hamilton-Cyber-CTIA2.jpeg\" alt=\"John Hamilton\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">John Hamilton<\/span><span class=\"elementor-testimonial__title\">Analista de ciberseguridad<\/span><\/cite>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f7ee1d2 e-flex e-con-boxed e-con e-parent\" data-id=\"f7ee1d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47686b9 elementor-widget elementor-widget-heading\" data-id=\"47686b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Programa del curso<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-959e363 elementor-widget elementor-widget-heading\" data-id=\"959e363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 1: Introducci\u00f3n a los fundamentos (6 horas te\u00f3ricas, 5 horas pr\u00e1cticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95186a7 elementor-widget elementor-widget-text-editor\" data-id=\"95186a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00bfQu\u00e9 es la seguridad de la informaci\u00f3n?\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Triada de la CIA\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Autenticaci\u00f3n, autorizaci\u00f3n y contabilidad (AAA)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Fases del pirateo\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Conceptos de hacking \u00e9tico\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Comprender los t\u00e9rminos m\u00e1s comunes del pirateo inform\u00e1tico\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Evaluaci\u00f3n de la vulnerabilidad\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Pruebas de penetraci\u00f3n\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Concepto de Red Teaming\/Blue Teaming\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Controles y pol\u00edticas de seguridad de la informaci\u00f3n\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conceptos b\u00e1sicos del sistema operativo y la red\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kali Linux<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39a8903 elementor-widget elementor-widget-heading\" data-id=\"39a8903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 2: Buenas pr\u00e1cticas en la recopilaci\u00f3n de informaci\u00f3n (7 horas te\u00f3ricas, 8 horas pr\u00e1cticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00fa54a elementor-widget elementor-widget-text-editor\" data-id=\"00fa54a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Huella<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reconocimiento\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recopilaci\u00f3n de informaci\u00f3n\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Google Dorking\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Shodan\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Informaci\u00f3n p\u00fablica y fuga de informaci\u00f3n DNS\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">An\u00e1lisis y fuerza bruta DNS\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Descubrir hosts de red\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Exploraci\u00f3n de puertos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Enumerar los servicios de escucha\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Descubrir superficies de ataque vulnerables<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-340757f elementor-widget elementor-widget-heading\" data-id=\"340757f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 3: - Pruebas de penetraci\u00f3n en redes e infraestructuras (10 horas te\u00f3ricas, 14 horas pr\u00e1cticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8525407 elementor-widget elementor-widget-text-editor\" data-id=\"8525407\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pruebas de penetraci\u00f3n focalizadas\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Comprometer hosts vulnerables\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Aprovechamiento de la falta de parches de software\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Uso de Metasploit para explotar un sistema sin parches\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Uso de la carga \u00fatil del int\u00e9rprete de comandos Meterpreter\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Generaci\u00f3n de c\u00f3digo shell personalizado para exploits de Exploit-DB\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Despliegue de cargas \u00fatiles ejecutables personalizadas\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Acceso a la interfaz de gesti\u00f3n remota\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Pruebas de penetraci\u00f3n de ataques DOS\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Sniffing y Spoofing\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Sistema de detecci\u00f3n de intrusos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Cortafuegos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Auditor\u00eda de seguridad de dispositivos de red\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Post-Explotaci\u00f3n y Escalada de Privilegios\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Recopilaci\u00f3n de credenciales de archivos .dot\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">T\u00fanel a trav\u00e9s de conexiones SSH\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Automatizaci\u00f3n de la autenticaci\u00f3n SSH Pubkey con Bash\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Programaci\u00f3n de una devoluci\u00f3n de llamada inversa mediante Cron\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Escalada de privilegios con binarios SUID\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Mantener el acceso persistente a Meterpreter\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Recopilaci\u00f3n de credenciales almacenadas en cach\u00e9 de dominio\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Extracci\u00f3n de credenciales de texto claro de la memoria\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">B\u00fasqueda de credenciales en el sistema de archivos de configuraci\u00f3n\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Utilizaci\u00f3n de Pass-the-Hash para desplazarse lateralmente<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5331238 elementor-widget elementor-widget-heading\" data-id=\"5331238\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 4: Pentesting de aplicaciones web (10 horas te\u00f3ricas, 9 horas pr\u00e1cticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9c3b0 elementor-widget elementor-widget-text-editor\" data-id=\"5e9c3b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conceptos b\u00e1sicos de la Web\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Conceptos b\u00e1sicos de las aplicaciones web, principios de funcionamiento\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Conceptos b\u00e1sicos de HTML\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Diferencia entre sitios web est\u00e1ticos y din\u00e1micos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Entender los protocolos HTTP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Introducci\u00f3n a la transferencia de estado representacional (REST)\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Cabeceras de solicitud y respuesta HTTP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">\u00bfQu\u00e9 es una galleta?\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Proxy HTTP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Servidor y cliente con ejemplos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">\u00bfQu\u00e9 es una sesi\u00f3n?\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Diferentes tipos de codificaci\u00f3n\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Herramientas de pruebas de penetraci\u00f3n en aplicaciones web\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">DirBuster\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Wfuzz\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Nikto\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">wpscan\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Suite Eructo\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo Proxy\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo Objetivo y Ara\u00f1a\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Tipos de ataque de intrusos y configuraci\u00f3n de la carga \u00fatil\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo repetidor\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo secuenciador y esc\u00e1ner\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ataques comunes a la seguridad de los sitios web\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inyecci\u00f3n\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Autenticaci\u00f3n rota y gesti\u00f3n de sesiones\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Secuencias de comandos en sitios cruzados\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Referencia directa insegura a objetos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Desconfiguraci\u00f3n de la seguridad\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Exposici\u00f3n de datos sensibles\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Ausencia de controles de acceso de nivel funcional\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Falsificaci\u00f3n de petici\u00f3n en sitios cruzados\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Uso de componentes con vulnerabilidades conocidas\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Redirecciones y reenv\u00edos no validados\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Entidades externas XML\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Las diez vulnerabilidades de Owasp en detalle\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ataques a bases de datos\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inyecci\u00f3n SQL\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inyecci\u00f3n basada en errores<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Doble inyecci\u00f3n de consulta\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inyecci\u00f3n ciega basada en booleanos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inyecci\u00f3n ciega basada en el tiempo\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Volcado de la base de datos con SQLMap<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8054e elementor-widget elementor-widget-heading\" data-id=\"4a8054e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 5: Wireless Pentest (3 horas te\u00f3ricas, 3 horas pr\u00e1cticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-843a1c2 elementor-widget elementor-widget-text-editor\" data-id=\"843a1c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Visi\u00f3n general de la seguridad inal\u00e1mbrica\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Introducci\u00f3n a la norma 802.11\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kungfu Aircrack-ng\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ataque EvilTwin\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Herramientas de seguridad inal\u00e1mbrica\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pr\u00e1cticas recomendadas para la seguridad inal\u00e1mbrica y de las empresas<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77a44b1 elementor-widget elementor-widget-heading\" data-id=\"77a44b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 6: Limpieza posterior a la contrataci\u00f3n (2 horas te\u00f3ricas, 3 horas pr\u00e1cticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-242e742 elementor-widget elementor-widget-text-editor\" data-id=\"242e742\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Eliminaci\u00f3n de conexiones Shell activas\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Eliminaci\u00f3n de cuentas de usuario innecesarias\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Eliminaci\u00f3n de archivos varios\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Anulaci\u00f3n de los cambios de configuraci\u00f3n\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cerrar puertas traseras<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8dc2662 e-flex e-con-boxed e-con e-parent\" data-id=\"8dc2662\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de9a086 elementor-widget elementor-widget-heading\" data-id=\"de9a086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">D\u00e9 a su equipo la ventaja que necesita para triunfar con nuestros cursos completos, adaptados a sus necesidades espec\u00edficas. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e334b elementor-widget elementor-widget-heading\" data-id=\"94e334b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">\u00bfLe interesa conocer m\u00e1s detalles?\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d9715 elementor-widget elementor-widget-text-editor\" data-id=\"c1d9715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Estaremos encantados de responder a todas sus preguntas.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c14e59 e-flex e-con-boxed e-con e-parent\" data-id=\"0c14e59\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3260b11 e-con-full e-flex e-con e-child\" data-id=\"3260b11\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfd0e5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3bfd0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quiero ofrecer este curso<br>en mi instituci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-081d346 e-con-full e-flex e-con e-child\" data-id=\"081d346\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab29a81 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ab29a81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quiero asistir a este curso<br>o inscribir a mi equipo<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53dc31e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53dc31e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0a84a8\" data-id=\"e0a84a8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b46e040 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b46e040\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-79e3365\" data-id=\"79e3365\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-422aa51 elementor-widget elementor-widget-heading\" data-id=\"422aa51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00a1As\u00f3ciese con Wawiwa para ofrecer programas de formaci\u00f3n tecnol\u00f3gica en menos de 6 meses!<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9970554 elementor-widget elementor-widget-text-editor\" data-id=\"9970554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWawiwa cubre el vac\u00edo de competencias tecnol\u00f3gicas reciclando a personas para profesiones tecnol\u00f3gicas muy demandadas. Hay millones de vacantes en el sector tecnol\u00f3gico y no hay suficientes profesionales con los conocimientos y habilidades necesarios para cubrirlas. Lo que la industria necesita de sus empleados no se ense\u00f1a en largas carreras acad\u00e9micas. Wawiwa ayuda a sus socios de todo el mundo a reciclar y mejorar las cualificaciones de las personas para puestos tecnol\u00f3gicos a trav\u00e9s de centros o programas locales de formaci\u00f3n tecnol\u00f3gica. La empresa utiliza una metodolog\u00eda de formaci\u00f3n probada, contenidos de vanguardia, plataformas digitales para el aprendizaje y la evaluaci\u00f3n, y s\u00f3lidas relaciones con la industria, para ofrecer programas de formaci\u00f3n que se traducen en una mayor empleabilidad y satisfacci\u00f3n de los graduados. Esto, a su vez, tambi\u00e9n crea una marca de formaci\u00f3n fuerte y un negocio sostenible para los socios de Wawiwa.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71a3895 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"71a3895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contacte con nosotros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Para proteger las redes inform\u00e1ticas y los activos digitales, a veces es necesario pasar a la ofensiva e intentar penetrar en ellos para descubrir vulnerabilidades. Este completo curso de formaci\u00f3n en ciberseguridad se centra en varios aspectos de la seguridad ofensiva. Abarca m\u00e9todos y t\u00e9cnicas de pruebas de penetraci\u00f3n en infraestructuras, aplicaciones y seguridad inal\u00e1mbrica que pueden ayudar a construir una carrera en ciberseguridad en los campos de pentesting de sistemas, pentesting de infraestructuras, ciberseguridad, pentesting de aplicaciones web y operaciones cibern\u00e9ticas.<\/p>","protected":false},"author":13,"featured_media":5415,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5401","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Certified Penetration Testing<\/title>\n<meta name=\"description\" content=\"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wawiwa-tech.com\/es\/certified-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certified Penetration Testing\" \/>\n<meta property=\"og:description\" content=\"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wawiwa-tech.com\/es\/certified-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Wawiwa Tech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wawiwatech\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-15T09:39:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1456\" \/>\n\t<meta property=\"og:image:height\" content=\"816\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@WawiwaTech\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/\",\"name\":\"Certified Penetration Testing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\",\"datePublished\":\"2024-01-31T14:46:05+00:00\",\"dateModified\":\"2024-07-15T09:39:25+00:00\",\"description\":\"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\",\"width\":1456,\"height\":816,\"caption\":\"Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Certified Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"name\":\"Wawiwa Tech\",\"description\":\"Reskilling the World to Tech\",\"publisher\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wawiwa-tech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\",\"name\":\"Wawiwa Tech\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"width\":1000,\"height\":425,\"caption\":\"Wawiwa Tech\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/wawiwatech\\\/\",\"https:\\\/\\\/x.com\\\/WawiwaTech\",\"https:\\\/\\\/instagram.com\\\/wawiwatech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wawiwa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCN_ejCsLDqznGifvkX86gzA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certified Penetration Testing","description":"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wawiwa-tech.com\/es\/certified-penetration-testing\/","og_locale":"es_ES","og_type":"article","og_title":"Certified Penetration Testing","og_description":"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.","og_url":"https:\/\/wawiwa-tech.com\/es\/certified-penetration-testing\/","og_site_name":"Wawiwa Tech","article_publisher":"https:\/\/www.facebook.com\/wawiwatech\/","article_modified_time":"2024-07-15T09:39:25+00:00","og_image":[{"width":1456,"height":816,"url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@WawiwaTech","twitter_misc":{"Est. reading time":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/","url":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/","name":"Certified Penetration Testing","isPartOf":{"@id":"https:\/\/wawiwa-tech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","datePublished":"2024-01-31T14:46:05+00:00","dateModified":"2024-07-15T09:39:25+00:00","description":"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.","breadcrumb":{"@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wawiwa-tech.com\/certified-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#primaryimage","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","width":1456,"height":816,"caption":"Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wawiwa-tech.com\/"},{"@type":"ListItem","position":2,"name":"Certified Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/wawiwa-tech.com\/#website","url":"https:\/\/wawiwa-tech.com\/","name":"Wawiwa Tech","description":"Reskilling the World to Tech","publisher":{"@id":"https:\/\/wawiwa-tech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wawiwa-tech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/wawiwa-tech.com\/#organization","name":"Wawiwa Tech","url":"https:\/\/wawiwa-tech.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","width":1000,"height":425,"caption":"Wawiwa Tech"},"image":{"@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wawiwatech\/","https:\/\/x.com\/WawiwaTech","https:\/\/instagram.com\/wawiwatech","https:\/\/www.linkedin.com\/company\/wawiwa\/","https:\/\/www.youtube.com\/channel\/UCN_ejCsLDqznGifvkX86gzA"]}]}},"_links":{"self":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/pages\/5401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/comments?post=5401"}],"version-history":[{"count":0,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/pages\/5401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/media\/5415"}],"wp:attachment":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/media?parent=5401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}