{"id":786,"date":"2026-01-06T10:20:52","date_gmt":"2026-01-06T08:20:52","guid":{"rendered":"https:\/\/wawiwa-tech.com\/?page_id=786"},"modified":"2026-03-25T11:09:44","modified_gmt":"2026-03-25T09:09:44","slug":"cyber","status":"publish","type":"page","link":"https:\/\/wawiwa-tech.com\/es\/programs\/cyber\/","title":{"rendered":"Analista de ciberseguridad"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"786\" class=\"elementor elementor-786\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1bdfc9a6 elementor-section-height-min-height elementor-section-content-middle custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"1bdfc9a6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-15edf83e\" data-id=\"15edf83e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-56097b44 elementor-widget elementor-widget-heading\" data-id=\"56097b44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Analista de ciberseguridad<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1bd8f7ce elementor-widget elementor-widget-heading\" data-id=\"1bd8f7ce\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">450 Hours \/ 8 Months, Part Time Program<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6b73065 elementor-widget elementor-widget-heading\" data-id=\"6b73065\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Este programa de Ciberseguridad a tiempo parcial cuenta con instrucci\u00f3n experta, proyectos pr\u00e1cticos y laboratorios en vivo para que los graduados est\u00e9n capacitados en el manejo de los vectores de ataque actuales.<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-72389014 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"72389014\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-1af42bbe\" data-id=\"1af42bbe\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5707c118 elementor-widget elementor-widget-text-editor\" data-id=\"5707c118\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Los estudios sugieren una enorme escasez de analistas de ciberseguridad y un aumento constante de la demanda de esta profesi\u00f3n. Seg\u00fan Deloitte, \"la escasez masiva y creciente de talento es uno de los retos m\u00e1s cr\u00edticos a los que se enfrenta el mundo de la ciberseguridad hoy en d\u00eda\". De hecho, <b>En ning\u00fan sector de las TI la escasez de talentos es m\u00e1s pronunciada que en el cibern\u00e9tico.<\/b>\"<\/span><\/p><p>Los ciberataques aumentan por doquier, lo que convierte a la ciberseguridad en una de las profesiones m\u00e1s candentes de la tecnolog\u00eda.\u00a0<span style=\"font-weight: 400;\"><br \/><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-4e40e08c\" data-id=\"4e40e08c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2032d0e1 elementor-widget elementor-widget-text-editor\" data-id=\"2032d0e1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>La funci\u00f3n altamente lucrativa de un analista de ciberseguridad lucha contra los piratas inform\u00e1ticos que intentan penetrar en la red de una organizaci\u00f3n con fines malintencionados.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-45ebf0c e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"45ebf0c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-33961df e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"33961df\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-79a81db elementor-align-center elementor-widget elementor-widget-button\" data-id=\"79a81db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quiero ofrecer este programa<br>en mi instituci\u00f3n<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-bcc6299 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"bcc6299\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-46cc0d3 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"46cc0d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quiero asistir a este programa<br>como estudiante<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d0ce247 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"d0ce247\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-efa5cff elementor-widget elementor-widget-video\" data-id=\"efa5cff\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=aQU71KPwk3c&amp;t=4s&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-79ef9488 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"79ef9488\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-38af2fd8\" data-id=\"38af2fd8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-527bea16 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"527bea16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-desktop\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f79cf9a elementor-widget elementor-widget-heading\" data-id=\"1f79cf9a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Permitir que los estudiantes sirvan de vanguardia en la defensa de las organizaciones<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1145bfb3 elementor-widget elementor-widget-text-editor\" data-id=\"1145bfb3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Los estudiantes aprender\u00e1n a identificar los ataques en sus fases m\u00e1s tempranas y a prevenir da\u00f1os significativos en la red de la organizaci\u00f3n. Los estudiantes desarrollar\u00e1n conocimientos sobre herramientas de ciberseguridad, amenazas emergentes, vulnerabilidades t\u00edpicas y patrones de hacking. Tambi\u00e9n u<\/span><span style=\"font-weight: 400;\">ntender el impacto de las nuevas tecnolog\u00edas de IA en el panorama de la ciberseguridad.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b76d4b4 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"5b76d4b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-58028884\" data-id=\"58028884\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-51719861 elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"51719861\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-handshake\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-135d10df elementor-widget elementor-widget-heading\" data-id=\"135d10df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Aprenda de los expertos del sector<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-26c6943b elementor-widget elementor-widget-text-editor\" data-id=\"26c6943b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Prepare a los estudiantes para tener \u00e9xito en un campo en r\u00e1pida expansi\u00f3n con la ayuda de nuestra red de expertos cibern\u00e9ticos, instructores, socios de contrataci\u00f3n y antiguos alumnos. El plan de estudios de Analista de Ciberseguridad se cre\u00f3 en colaboraci\u00f3n con el <b>empresas l\u00edderes del sector<\/b> para que nuestros programas respondan lo mejor posible a las necesidades de la industria local, garantizando que los graduados est\u00e9n preparados para trabajar en cuanto terminen el programa.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-58b540a6\" data-id=\"58b540a6\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-70f1dddd elementor-position-inline-start elementor-view-default elementor-mobile-position-block-start elementor-widget elementor-widget-icon-box\" data-id=\"70f1dddd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\t\t\t<div class=\"elementor-icon-box-icon\">\n\t\t\t\t<span  class=\"elementor-icon\">\n\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-file\"><\/i>\t\t\t\t<\/span>\n\t\t\t<\/div>\n\t\t\t\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-65abca41 elementor-widget elementor-widget-heading\" data-id=\"65abca41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Guiar a los estudiantes para que realicen un proyecto profesional<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-627ff958 elementor-widget elementor-widget-text-editor\" data-id=\"627ff958\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Creemos que el mejor aprendizaje se realiza a trav\u00e9s de<b><span data-usefontface=\"false\" data-contrast=\"none\">\u00a0trabajo pr\u00e1ctico<\/span><\/b><span data-usefontface=\"false\" data-contrast=\"none\">. En consecuencia, toda la\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">programa se lleva a cabo como un laboratorio continuo durante el cual\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">los estudiantes deben instalar sistemas de ataque y defensa\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">entornos, configurar y crear herramientas de ciberseguridad,\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">y experimentar situaciones que simulan el mundo real\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">eventos.\u00a0<\/span><\/p><p><span data-usefontface=\"false\" data-contrast=\"none\">Como el programa abarca diversas disciplinas\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">conocimientos y habilidades, el proyecto final del programa BIT (Bring It Together)\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">se\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">dedicarse a la realizaci\u00f3n de\u00a0<\/span>un escenario de laboratorio integrador que requerir\u00e1 que los estudiantes demuestren conocimientos, habilidades y capacidades de todas las disciplinas que han aprendido.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-370513d custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"370513d\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-48414813\" data-id=\"48414813\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-44c0dfb9 elementor-widget elementor-widget-heading\" data-id=\"44c0dfb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfA qui\u00e9n va dirigido el programa?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79a7be25 elementor-widget elementor-widget-heading\" data-id=\"79a7be25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Personas motivadas y motivadas, con o sin experiencia previa en TI, que deseen avanzar en su carrera como analista de ciberseguridad o miembro de un equipo del Centro de Operaciones de Seguridad (SOC).<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-4dcae06 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"4dcae06\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c186e33 elementor-widget elementor-widget-heading\" data-id=\"c186e33\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">C\u00f3mo funciona el programa<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-641c770 elementor-widget elementor-widget-text-editor\" data-id=\"641c770\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\"><strong>450 total learning hours designed for skill-building<\/strong>:<\/span><\/p><ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>350 academic hours<\/strong> - clases en directo con un instructor experto y pr\u00e1cticas guiadas<br \/><br \/><\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>100 homework hours<\/strong> - tareas reales dise\u00f1adas para ayudar a los estudiantes a integrar lo que aprenden en la pr\u00e1ctica y crear una cartera que puedan mostrar a los empleadores<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-461b9aa6 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"461b9aa6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b65e464\" data-id=\"b65e464\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-796656a4 elementor-widget elementor-widget-heading\" data-id=\"796656a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Simulaciones reales en ciberlaboratorios\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-15b87a8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"15b87a8\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-7e2e0a7d\" data-id=\"7e2e0a7d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-626344f1 elementor-widget elementor-widget-image\" data-id=\"626344f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/03\/cybersecurity-analyst-1024x574.png\" class=\"attachment-large size-large wp-image-5566\" alt=\"Analista de ciberseguridad\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/03\/cybersecurity-analyst-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/03\/cybersecurity-analyst-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/03\/cybersecurity-analyst-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/03\/cybersecurity-analyst.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-612962ac\" data-id=\"612962ac\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-39fa46f5 elementor-widget elementor-widget-text-editor\" data-id=\"39fa46f5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-usefontface=\"false\" data-contrast=\"none\">Ciberlaboratorios avanzados\u00a0<\/span><\/b><span data-usefontface=\"false\" data-contrast=\"none\">para educar a los\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">pr\u00f3xima generaci\u00f3n de ciberprofesionales.<\/span><\/li><li data-aria-posinset=\"2\" data-aria-level=\"1\"><span style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\" data-usefontface=\"false\" data-contrast=\"none\">Permite a los formadores\u00a0<\/span><b style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;\"><span data-usefontface=\"false\" data-contrast=\"none\">demostrar y dejar\u00a0<\/span><\/b><b style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif;\"><span data-usefontface=\"false\" data-contrast=\"none\">los estudiantes experimentan situaciones de la vida real<\/span><\/b><span style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\" data-usefontface=\"false\" data-contrast=\"none\">.\u00a0<\/span><span style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\" data-usefontface=\"false\" data-contrast=\"none\">Los estudiantes pueden experimentar con posibles\u00a0<\/span><span style=\"background-color: transparent; color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight );\" data-usefontface=\"false\" data-contrast=\"none\">respuestas en tiempo real.<\/span><\/li><li data-aria-posinset=\"4\" data-aria-level=\"1\"><span data-usefontface=\"false\" data-contrast=\"none\">Los cuadros de mandos de los estudiantes y los informes detallados proporcionan\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">a\u00a0<\/span><b><span data-usefontface=\"false\" data-contrast=\"none\">an\u00e1lisis completo del aprendizaje y\u00a0<\/span><\/b><b><span data-usefontface=\"false\" data-contrast=\"none\">rendimiento<\/span><\/b><span data-usefontface=\"false\" data-contrast=\"none\">que ayudar\u00e1 a los alumnos a aprender de sus fracasos y a\u00a0<\/span><span data-usefontface=\"false\" data-contrast=\"none\">\u00e9xitos a nivel individual y de equipo.<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f403949 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"f403949\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5147eb elementor-widget elementor-widget-heading\" data-id=\"e5147eb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Desarrollamos las competencias interpersonales que necesitan los analistas de ciberseguridad<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95818c5 elementor-widget elementor-widget-text-editor\" data-id=\"95818c5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Las competencias t\u00e9cnicas son tan importantes como las interpersonales para un analista de ciberseguridad. Se necesitan ambas para tener \u00e9xito.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f14dd8b e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"f14dd8b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3c17009 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"3c17009\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cdf18a7 elementor-widget elementor-widget-image\" data-id=\"cdf18a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/analytical-skill-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-6968\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/analytical-skill-150x150.png 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/analytical-skill-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/analytical-skill-12x12.png 12w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/analytical-skill.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-acc0781 elementor-widget elementor-widget-heading\" data-id=\"acc0781\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pensamiento anal\u00edtico<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3a57297 elementor-widget elementor-widget-text-editor\" data-id=\"3a57297\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Comprender el reto, detectar patrones y convertirlos en soluciones<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c74e401 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"c74e401\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-798f0fc elementor-widget elementor-widget-image\" data-id=\"798f0fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/teamwork-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-6955\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/teamwork-150x150.png 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/teamwork-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/teamwork-12x12.png 12w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/teamwork.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-67c3100 elementor-widget elementor-widget-heading\" data-id=\"67c3100\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Trabajo en equipo<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cda3c41 elementor-widget elementor-widget-text-editor\" data-id=\"cda3c41\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Colaborar con los dem\u00e1s, aprovechar los puntos fuertes y respetar las responsabilidades.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c070d27 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"c070d27\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cc12c6c elementor-widget elementor-widget-image\" data-id=\"cc12c6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/pressure-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-6970\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/pressure-150x150.png 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/pressure-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/pressure-12x12.png 12w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/pressure.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b7e93da elementor-widget elementor-widget-heading\" data-id=\"b7e93da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Manipulaci\u00f3n de la presi\u00f3n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-260200f elementor-widget elementor-widget-text-editor\" data-id=\"260200f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Mantener la calma bajo presi\u00f3n, establecer prioridades y obtener resultados en plazos ajustados.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9dff293 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"9dff293\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-55089d4 elementor-widget elementor-widget-image\" data-id=\"55089d4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/equality-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-6971\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/equality-150x150.png 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/equality-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/equality-12x12.png 12w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/equality.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-64a1017 elementor-widget elementor-widget-heading\" data-id=\"64a1017\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00c9tica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d5f16b6 elementor-widget elementor-widget-text-editor\" data-id=\"d5f16b6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Tomar decisiones con honestidad, transparencia y respeto, defendiendo los principios incluso cuando nadie est\u00e1 mirando.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5443e8e e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"5443e8e\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-800b109 elementor-widget elementor-widget-image\" data-id=\"800b109\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/check-mark-150x150.png\" class=\"attachment-thumbnail size-thumbnail wp-image-6966\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/check-mark-150x150.png 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/check-mark-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/check-mark-12x12.png 12w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/12\/check-mark.png 512w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7ae6c0 elementor-widget elementor-widget-heading\" data-id=\"c7ae6c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Rendici\u00f3n de cuentas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f4ba96b elementor-widget elementor-widget-text-editor\" data-id=\"f4ba96b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Asumir las acciones y los resultados, cumplir los compromisos y responsabilizarse de la calidad del trabajo.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8d3b03a e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"8d3b03a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0a947be elementor-widget elementor-widget-text-editor\" data-id=\"0a947be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">En Wawiwa, los alumnos adquieren habilidades interpersonales de forma natural a lo largo del programa. Como nuestra formaci\u00f3n es pr\u00e1ctica, los alumnos aprenden trabajando en equipo, resolviendo problemas reales y practicando c\u00f3mo act\u00faan los profesionales en lugares de trabajo reales. Este enfoque les ayuda a desarrollar s\u00f3lidas capacidades t\u00e9cnicas y las habilidades interpersonales esenciales necesarias para prosperar en el trabajo desde el primer d\u00eda.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a43f064 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a43f064\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-20995d02\" data-id=\"20995d02\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dfb9135 elementor-widget elementor-widget-heading\" data-id=\"dfb9135\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Profesionales de primera categor\u00eda<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2250f3e elementor-widget elementor-widget-heading\" data-id=\"2250f3e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Este programa \u00fanico ha sido creado por un equipo profesional formado por los principales expertos en Ciberseguridad, con amplios conocimientos y experiencia tambi\u00e9n en formaci\u00f3n.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-34d7d021 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"34d7d021\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5c5a2def\" data-id=\"5c5a2def\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-318941e0 elementor-widget elementor-widget-image\" data-id=\"318941e0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/wawiwa-team\/eran-lasser\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"420\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Eran-Lasser600.jpg\" class=\"attachment-large size-large wp-image-2309\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Eran-Lasser600.jpg 600w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Eran-Lasser600-300x210.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d4cb6d9 elementor-widget elementor-widget-heading\" data-id=\"1d4cb6d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Eran Lasser<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79e270a0 elementor-widget elementor-widget-text-editor\" data-id=\"79e270a0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Director General de Wawiwa<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-21afc5cd elementor-widget elementor-widget-text-editor\" data-id=\"21afc5cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Eran es un emprendedor de la educaci\u00f3n tecnol\u00f3gica con m\u00e1s de 20 a\u00f1os de experiencia. Eran fund\u00f3 y dirigi\u00f3 cuatro empresas de formaci\u00f3n en TI:\u00a0<em>Formaci\u00f3n John Bryce<\/em>\u00a0(Israel),\u00a0<em>TRIG\u00a0<\/em>(China),\u00a0<em>JB-IQsoft<\/em>\u00a0(Hungr\u00eda),\u00a0<em>KocBryce<\/em>\u00a0(Turqu\u00eda). Eran tambi\u00e9n se asoci\u00f3 para establecer\u00a0<em>DAN.IT Educaci\u00f3n<\/em>\u00a0(Ucrania), Techub (Georgia), etc. Adem\u00e1s, Eran dirigi\u00f3 Mentergy, que ofrece soluciones de aprendizaje electr\u00f3nico y a distancia. A lo largo de los a\u00f1os, fue responsable de la reconversi\u00f3n profesional de m\u00e1s de 50.000 personas que ahora trabajan como profesionales de la tecnolog\u00eda.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1c2e904b elementor-absolute elementor-widget elementor-widget-image\" data-id=\"1c2e904b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59fac02b elementor-absolute elementor-widget elementor-widget-image\" data-id=\"59fac02b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-772cfdfa\" data-id=\"772cfdfa\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2c3b54f4 elementor-widget elementor-widget-image\" data-id=\"2c3b54f4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/wawiwa-team\/daniel-anderson\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"697\" height=\"922\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/DanielAnderson.jpg\" class=\"attachment-large size-large wp-image-2310\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/DanielAnderson.jpg 697w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/DanielAnderson-227x300.jpg 227w\" sizes=\"(max-width: 697px) 100vw, 697px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3989c9a9 elementor-widget elementor-widget-heading\" data-id=\"3989c9a9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Daniel Anderson<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e491b45 elementor-widget elementor-widget-text-editor\" data-id=\"5e491b45\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Jefe de Formaci\u00f3n<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d19bac6 elementor-widget elementor-widget-text-editor\" data-id=\"4d19bac6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Daniel es responsable de la actualizaci\u00f3n de los temas de vanguardia en los programas de formaci\u00f3n t\u00e9cnica de la empresa y del mantenimiento de sus metodolog\u00edas de formaci\u00f3n. Daniel fue formador jefe en el Centro de Formaci\u00f3n T\u00e9cnica de las Fuerzas de Defensa de Israel y se gradu\u00f3 en el proceso de formaci\u00f3n de las FDI. Desarrolla e imparte una amplia gama de cursos de programaci\u00f3n, y es Desarrollador Full-Stack y Cient\u00edfico de Datos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4cc1f3c0 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"4cc1f3c0\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-4c84e3f\" data-id=\"4c84e3f\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-407f7f7b elementor-widget elementor-widget-image\" data-id=\"407f7f7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/wawiwa-team\/nadav-nachmias\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"982\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Nadav-Nachmias-Low-Quality-834x1024.jpeg\" class=\"attachment-large size-large wp-image-2456\" alt=\"Nadav Nachmias\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Nadav-Nachmias-Low-Quality-834x1024.jpeg 834w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Nadav-Nachmias-Low-Quality-244x300.jpeg 244w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Nadav-Nachmias-Low-Quality-768x943.jpeg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/07\/Nadav-Nachmias-Low-Quality.jpeg 1043w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53b12fcb elementor-widget elementor-widget-heading\" data-id=\"53b12fcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Nadav Nachmias<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a85bda7 elementor-widget elementor-widget-text-editor\" data-id=\"4a85bda7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Jefe de Programas de Ciberseguridad<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fbefad4 elementor-widget elementor-widget-text-editor\" data-id=\"1fbefad4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nadav (CISSP, MBA, Adv.) es un especialista en ciberseguridad con m\u00e1s de 15 a\u00f1os de experiencia, centrado en estrategias de ciberseguridad, arquitectura y capacitaci\u00f3n de personal. Su experiencia pr\u00e1ctica le ha hecho intuitivo el desarrollo de diversos programas y materiales de formaci\u00f3n en varios campos de la ciberseguridad (incluida la gesti\u00f3n de la ciberseguridad, la gesti\u00f3n y respuesta a incidentes y la ciberciencia forense).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1fe81471 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"1fe81471\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-fec464b e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"fec464b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8fe85b6 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"8fe85b6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a348fe8 elementor-widget elementor-widget-image\" data-id=\"a348fe8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"800\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/06\/thumbs-up-3-1024x1024.png\" class=\"attachment-large size-large wp-image-6655\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/06\/thumbs-up-3-1024x1024.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/06\/thumbs-up-3-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/06\/thumbs-up-3-150x150.png 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/06\/thumbs-up-3-768x768.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/06\/thumbs-up-3-12x12.png 12w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/06\/thumbs-up-3.png 1080w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8bfefdf e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"8bfefdf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4b11fef elementor-widget elementor-widget-text-editor\" data-id=\"4b11fef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2><span style=\"color: #3e868f;\">Medimos el \u00e9xito en funci\u00f3n de la empleabilidad<\/span><\/h2><p>Para nosotros, la formaci\u00f3n tecnol\u00f3gica no es el objetivo final, sino s\u00f3lo el principio. En Wawiwa, medimos el \u00e9xito en funci\u00f3n de la empleabilidad de nuestros titulados. Nuestros programas se construyen con ese objetivo en mente: <strong>formar a los estudiantes para que est\u00e9n preparados para el mundo laboral y ayudarles a conseguir un trabajo lucrativo en el sector tecnol\u00f3gico tras su graduaci\u00f3n<\/strong>.<\/p><p>Este enfoque de la empleabilidad da resultados en todo el mundo - <strong>m\u00e1s del 70% de los graduados de Wawiwa consiguen un empleo tecnol\u00f3gico en los dos meses siguientes a su graduaci\u00f3n<\/strong>.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-86c4e88 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"86c4e88\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/es\/employability\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Vea c\u00f3mo fomentamos la empleabilidad<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3001b766 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3001b766\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1b13e039\" data-id=\"1b13e039\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2ff4955e elementor-widget elementor-widget-heading\" data-id=\"2ff4955e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Plan de estudios<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5efc1122 elementor-widget elementor-widget-toggle\" data-id=\"5efc1122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1591\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-1591\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Sistemas operativos Microsoft<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1591\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-1591\"><ul><li>Introducci\u00f3n a los cursos (administrativos y preliminares)<\/li><li>Estructura inform\u00e1tica<\/li><li>Introducci\u00f3n a los sistemas operativos<\/li><li>Sistemas operativos: conceptos b\u00e1sicos<\/li><li>Sistemas operativos Microsoft: conceptos b\u00e1sicos<\/li><li>Sistemas operativos Microsoft - L\u00ednea de comandos<\/li><li>Sistemas operativos Microsoft - Registro de Windows<\/li><li>Ejercicio de soluci\u00f3n de problemas del SO Windows<\/li><li>Examen del m\u00f3dulo 1<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1592\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"button\" aria-controls=\"elementor-tab-content-1592\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Comunicaciones y redes<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1592\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"region\" aria-labelledby=\"elementor-tab-title-1592\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\">Modelo OSI<\/li><li aria-level=\"1\">Protocolos, puertos y TCP IP<\/li><li aria-level=\"1\">Rastreador de paquetes<\/li><li aria-level=\"1\">Varias configuraciones de red y resoluci\u00f3n de problemas<\/li><li aria-level=\"1\">Introducci\u00f3n al an\u00e1lisis de redes<\/li><li aria-level=\"1\">Seguridad en la nube<\/li><li aria-level=\"1\">Examen del m\u00f3dulo 2<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1593\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"button\" aria-controls=\"elementor-tab-content-1593\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Servidores Microsoft<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1593\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"region\" aria-labelledby=\"elementor-tab-title-1593\"><ul><li style=\"font-weight: 400;\" aria-level=\"1\">Introducci\u00f3n a Windows Server<\/li><li aria-level=\"1\">Servicios DNS y DHCP<\/li><li aria-level=\"1\">Microsoft Active Directory<\/li><li aria-level=\"1\">Gesti\u00f3n de configuraciones del sistema<\/li><li aria-level=\"1\">Examen del m\u00f3dulo 3<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1594\" class=\"elementor-tab-title\" data-tab=\"4\" role=\"button\" aria-controls=\"elementor-tab-content-1594\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Fundamentos de Linux<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1594\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"4\" role=\"region\" aria-labelledby=\"elementor-tab-title-1594\"><ul><li>Introducci\u00f3n a Linux<\/li><li>Conceptos b\u00e1sicos de Linux Shell<\/li><li>Administraci\u00f3n b\u00e1sica del sistema<\/li><li>Herramientas avanzadas de Shell (grep, sed, awk)<\/li><li>Introducci\u00f3n a Shell Scripting (Bash)<\/li><li>Examen del m\u00f3dulo 4<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1595\" class=\"elementor-tab-title\" data-tab=\"5\" role=\"button\" aria-controls=\"elementor-tab-content-1595\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cortafuegos<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1595\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"5\" role=\"region\" aria-labelledby=\"elementor-tab-title-1595\"><ul><li>Introducci\u00f3n a los cortafuegos<\/li><li>Arquitectura de cortafuegos<\/li><li>Pol\u00edticas, t\u00faneles y seguridad<\/li><li>Examen del m\u00f3dulo 5<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1596\" class=\"elementor-tab-title\" data-tab=\"6\" role=\"button\" aria-controls=\"elementor-tab-content-1596\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">PowerShell<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1596\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"6\" role=\"region\" aria-labelledby=\"elementor-tab-title-1596\"><ul><li>Variables<\/li><li>Bucles y condiciones<\/li><li>Automatizaci\u00f3n de las funciones del sistema operativo<\/li><li>Examen del m\u00f3dulo 6<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1597\" class=\"elementor-tab-title\" data-tab=\"7\" role=\"button\" aria-controls=\"elementor-tab-content-1597\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Examen de fin de fase (\"Conceptos b\u00e1sicos de inform\u00e1tica\")<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1597\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"7\" role=\"region\" aria-labelledby=\"elementor-tab-title-1597\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1598\" class=\"elementor-tab-title\" data-tab=\"8\" role=\"button\" aria-controls=\"elementor-tab-content-1598\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Introducci\u00f3n a la ciberseguridad<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1598\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"8\" role=\"region\" aria-labelledby=\"elementor-tab-title-1598\"><ul><li>Rese\u00f1a hist\u00f3rica de la ciberseguridad<\/li><li>Definici\u00f3n de ciberseguridad<\/li><li>Gobernanza y cumplimiento de la ciberseguridad<\/li><li>Principios de ciberseguridad<\/li><li>Examen del m\u00f3dulo 7<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1599\" class=\"elementor-tab-title\" data-tab=\"9\" role=\"button\" aria-controls=\"elementor-tab-content-1599\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Ciberguerra e IA<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-1599\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"9\" role=\"region\" aria-labelledby=\"elementor-tab-title-1599\"><ul><li>Alineaciones preliminares<\/li><li>Mentalidad de atacante<\/li><li>Mentalidad defensiva<\/li><li>La IA en la ciberseguridad<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15910\" class=\"elementor-tab-title\" data-tab=\"10\" role=\"button\" aria-controls=\"elementor-tab-content-15910\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Introducci\u00f3n a la gesti\u00f3n de incidentes de ciberseguridad<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-15910\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"10\" role=\"region\" aria-labelledby=\"elementor-tab-title-15910\"><ul><li>El Centro de Operaciones de Seguridad (SOC)<\/li><li>Metodolog\u00eda NIST SP800-60<\/li><li>Matriz ATT&amp;CK de MITRE<\/li><li>Examen del m\u00f3dulo 9<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15911\" class=\"elementor-tab-title\" data-tab=\"11\" role=\"button\" aria-controls=\"elementor-tab-content-15911\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Sucesos e incidentes de ciberseguridad<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-15911\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"11\" role=\"region\" aria-labelledby=\"elementor-tab-title-15911\"><ul><li>Los componentes tecnol\u00f3gicos de los SOC<\/li><li>Fuentes de incidentes de seguridad - La Red<\/li><li>Fuentes de incidentes de seguridad: ordenadores de sobremesa y servidores<\/li><li>Trabajo con datos brutos y an\u00e1lisis de datos<\/li><li>Administraci\u00f3n de reglas SIEM<\/li><li>Agregaci\u00f3n de datos y correlaci\u00f3n de eventos<\/li><li>Realizaci\u00f3n del triaje mediante recursos SIEM<\/li><li>Splunk<\/li><li>Examen del m\u00f3dulo 10<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15912\" class=\"elementor-tab-title\" data-tab=\"12\" role=\"button\" aria-controls=\"elementor-tab-content-15912\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Inteligencia sobre ciberamenazas y enriquecimiento de la informaci\u00f3n<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-15912\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"12\" role=\"region\" aria-labelledby=\"elementor-tab-title-15912\"><ul><li>Introducci\u00f3n al CTI<\/li><li>Introducci\u00f3n a OSINT<\/li><li>Pr\u00e1ctica CTI\/OSINT<\/li><li>Examen del m\u00f3dulo 11<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15913\" class=\"elementor-tab-title\" data-tab=\"13\" role=\"button\" aria-controls=\"elementor-tab-content-15913\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Ciberinform\u00e1tica pr\u00e1ctica<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-15913\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"13\" role=\"region\" aria-labelledby=\"elementor-tab-title-15913\"><ul><li>Introducci\u00f3n a la ciberciencia forense<\/li><li>Manipulaci\u00f3n de pruebas digitales<\/li><li>Herramientas ciberforenses comunes<\/li><li>Artefactos forenses - Sistema operativo Windows<\/li><li>Artefactos forenses - Red<\/li><li>Introducci\u00f3n al an\u00e1lisis forense de la memoria<\/li><li>Investigaci\u00f3n forense pr\u00e1ctica<\/li><li>Examen del m\u00f3dulo 12<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15914\" class=\"elementor-tab-title\" data-tab=\"14\" role=\"button\" aria-controls=\"elementor-tab-content-15914\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Introducci\u00f3n al an\u00e1lisis de malware<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-15914\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"14\" role=\"region\" aria-labelledby=\"elementor-tab-title-15914\"><ul><li>Introducci\u00f3n al an\u00e1lisis de malware<\/li><li>An\u00e1lisis de malware est\u00e1tico frente a din\u00e1mico<\/li><li>An\u00e1lisis de correo electr\u00f3nico, Investigaciones COI<\/li><li>Redactar un informe de investigaci\u00f3n<\/li><li>An\u00e1lisis pr\u00e1ctico de malware<\/li><li>Examen del m\u00f3dulo 13<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15915\" class=\"elementor-tab-title\" data-tab=\"15\" role=\"button\" aria-controls=\"elementor-tab-content-15915\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Cyber Challenge - Plataforma CTF<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-15915\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"15\" role=\"region\" aria-labelledby=\"elementor-tab-title-15915\"><ul><li>Marat\u00f3n pr\u00e1ctico<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-15916\" class=\"elementor-tab-title\" data-tab=\"16\" role=\"button\" aria-controls=\"elementor-tab-content-15916\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\">Proyecto final BIT<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-15916\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"16\" role=\"region\" aria-labelledby=\"elementor-tab-title-15916\"><ul><li>Proyecto final - Todo lo que hemos aprendido en un proyecto<\/li><\/ul><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ae2ce66 elementor-widget elementor-widget-spacer\" data-id=\"ae2ce66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-2c325d1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2c325d1\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3b2f9f5\" data-id=\"3b2f9f5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bac6075 elementor-widget elementor-widget-heading\" data-id=\"bac6075\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfQu\u00e9 opinan los licenciados?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0964eac elementor-testimonial--skin-default elementor-testimonial--layout-image_inline elementor-testimonial--align-center elementor-arrows-yes elementor-pagination-type-bullets elementor-widget elementor-widget-testimonial-carousel\" data-id=\"0964eac\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;autoplay_speed&quot;:10000,&quot;show_arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;autoplay&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"testimonial-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Diapositivas\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Siempre me interes\u00f3 la ciberseguridad. Me apasionaba este enorme campo que no deja de evolucionar. Busqu\u00e9 cursos en Internet y descubr\u00ed que la mayor\u00eda son muy pr\u00e1cticos, un v\u00eddeo en una p\u00e1gina web. Entonces encontr\u00e9 el programa de Analista de Ciberseguridad de Wawiwa (en el Cyber-Tech Institute of Technology, Australia). Me matricul\u00e9 y, a lo largo de los 9 meses que dura el programa, ten\u00eda ganas de ir a clase. Es una sesi\u00f3n en directo, con mucho trabajo pr\u00e1ctico, trabajando con herramientas cibern\u00e9ticas de la vida real y experimentando lo que pueden hacer. Los instructores cuentan historias de la vida real y ponen ejemplos sobre el terreno. Esto hace que el programa sea realmente apasionante. Ya durante el programa he encontrado trabajo en una empresa de ciberseguridad. Nunca habr\u00eda tenido la oportunidad de trabajar all\u00ed si no hubiera aprendido la teor\u00eda, adquirido los conocimientos y utilizado las herramientas durante el programa de formaci\u00f3n.\"\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-testimonial__footer\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/02\/John-Hamilton-Cyber-CTIA2.jpg\" alt=\"John Hamilton, graduado del Programa de Analistas de Ciberseguridad, CTIA powered by Wawiwa\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">John Hamilton<\/span><span class=\"elementor-testimonial__title\">Analista de ciberseguridad<\/span><\/cite>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f3ee6df elementor-widget elementor-widget-heading\" data-id=\"f3ee6df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Oportunidades de certificaci\u00f3n industrial<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d106a7d elementor-widget elementor-widget-text-editor\" data-id=\"d106a7d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Despu\u00e9s de completar el Programa de Analista de Ciberseguridad de Wawiwa, los estudiantes pueden obtener certificaciones adicionales para las que el programa ayuda a prepararse.\u00a0<\/span><\/p><p><i><span style=\"font-weight: 400;\">Nota: No se ofrece ni se garantiza una certificaci\u00f3n industrial como parte del programa.<\/span><\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1f5d14b e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"1f5d14b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-927e09c e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"927e09c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f120814 elementor-widget elementor-widget-image\" data-id=\"f120814\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/8623b0fab71111efac96d615e91762a5.webp\" class=\"attachment-large size-large wp-image-6794\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/8623b0fab71111efac96d615e91762a5.webp 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/8623b0fab71111efac96d615e91762a5-150x150.webp 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/8623b0fab71111efac96d615e91762a5-12x12.webp 12w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e2979b4 elementor-widget elementor-widget-text-editor\" data-id=\"e2979b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">En <\/span><a href=\"https:\/\/www.comptia.org\/en-us\/certifications\/security\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Certificaci\u00f3n CompTIA Security+<\/span><\/a><span style=\"font-weight: 400;\"> introduce \u00e1reas clave de la ciberseguridad, incluida la gesti\u00f3n de incidentes, eventos e incidentes, inteligencia de amenazas y OSINT, y ciberforense. Estudio adicional necesario en: seguridad en la nube, gesti\u00f3n de identidades y accesos, y marcos avanzados de evaluaci\u00f3n de riesgos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ad6ae44 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"ad6ae44\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-edb243d elementor-widget elementor-widget-image\" data-id=\"edb243d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/893bb620b71111ef888eca5646afc7d8.webp\" class=\"attachment-large size-large wp-image-6795\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/893bb620b71111ef888eca5646afc7d8.webp 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/893bb620b71111ef888eca5646afc7d8-150x150.webp 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/893bb620b71111ef888eca5646afc7d8-12x12.webp 12w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d06d08 elementor-widget elementor-widget-text-editor\" data-id=\"1d06d08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">En <\/span><a href=\"https:\/\/www.comptia.org\/en-us\/certifications\/network\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Certificaci\u00f3n CompTIA Network+<\/span><\/a><span style=\"font-weight: 400;\"> incluye comunicaciones y redes, servidores Microsoft y cortafuegos. Estudios adicionales necesarios en: soluci\u00f3n de problemas de redes empresariales a gran escala y configuraciones espec\u00edficas de proveedores (Cisco, Juniper, etc.).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6da992a e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"6da992a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e00ddcb elementor-widget elementor-widget-image\" data-id=\"e00ddcb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/security-compliance-and-identity-fundamentals-600x600-1.png\" class=\"attachment-large size-large wp-image-6796\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/security-compliance-and-identity-fundamentals-600x600-1.png 600w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/security-compliance-and-identity-fundamentals-600x600-1-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/security-compliance-and-identity-fundamentals-600x600-1-150x150.png 150w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/security-compliance-and-identity-fundamentals-600x600-1-12x12.png 12w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0ceffe elementor-widget elementor-widget-text-editor\" data-id=\"a0ceffe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">En <\/span><a href=\"https:\/\/learn.microsoft.com\/en-us\/credentials\/certifications\/security-compliance-and-identity-fundamentals\/?practice-assessment-type=certification\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Certificaci\u00f3n Microsoft: Fundamentos de seguridad, conformidad e identidad<\/span><\/a><span style=\"font-weight: 400;\"> cubre los sistemas operativos de Microsoft, servidores y Active Directory, as\u00ed como los principios b\u00e1sicos de ciberseguridad y cumplimiento. Estudio adicional necesario en: seguridad espec\u00edfica de la nube (Azure Defender, AWS, GCP) e integraci\u00f3n de entornos h\u00edbridos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c55cdc0 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"c55cdc0\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-538878c elementor-widget elementor-widget-image\" data-id=\"538878c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"195\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/ecsa-training-certification.png\" class=\"attachment-large size-large wp-image-6797\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/ecsa-training-certification.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/08\/ecsa-training-certification-18x12.png 18w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-27a4472 elementor-widget elementor-widget-text-editor\" data-id=\"27a4472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">En <\/span><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-soc-analyst-csa\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">Certificaci\u00f3n de Analista de Seguridad Certificado (CSA)<\/span><\/a><span style=\"font-weight: 400;\"> cubre la gesti\u00f3n de incidentes de ciberseguridad, eventos e incidentes de ciberseguridad (SIEM), Inteligencia de Amenazas &amp; OSINT, y ciberforense. Estudios adicionales necesarios en: caza avanzada de amenazas, ingenier\u00eda de detecci\u00f3n y automatizaci\u00f3n\/orquestaci\u00f3n SOAR.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e615e elementor-widget elementor-widget-heading\" data-id=\"94e615e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Wawiwa tambi\u00e9n ofrece cursos de perfeccionamiento para ciberprofesionales<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a513019 elementor-widget elementor-widget-video\" data-id=\"a513019\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/XUsfCElpriQ?si=E4p6nR-xz_S940Oj&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2bd2b42 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2bd2b42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/upskilling\/cybersecurity\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Explore nuestros cursos de capacitaci\u00f3n cibern\u00e9tica<br><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c79c7b2 elementor-widget elementor-widget-heading\" data-id=\"c79c7b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Lea nuestros blogs...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0948f76 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"0948f76\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4873 post type-post status-publish format-standard has-post-thumbnail hentry category-webinar tag-army tag-cyber tag-idf tag-it tag-methodology tag-military tag-tech tag-training\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/webinar\/mamram-webinar-idf-tech-training\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-300x168.png\" class=\"attachment-medium size-medium wp-image-4875\" alt=\"Sala de guerra cibern\u00e9tica\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Webinar<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/webinar\/mamram-webinar-idf-tech-training\/\" >\n\t\t\t\tUna mirada al MAMRAM: c\u00f3mo las Fuerzas de Defensa de Israel forman talento tecnol\u00f3gico e influyen en la innovaci\u00f3n mundial\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Una visita entre bastidores al centro secreto de formaci\u00f3n tecnol\u00f3gica de Israel: MAMRAM, una unidad de \u00e9lite de las Fuerzas de Defensa de Israel (IDF). El MAMRAM lleva mucho tiempo transformando a j\u00f3venes mentes brillantes en magos de la alta tecnolog\u00eda y ciberguerreros, equip\u00e1ndolos con los\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/webinar\/mamram-webinar-idf-tech-training\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Una mirada al MAMRAM: c\u00f3mo las Fuerzas de Defensa de Israel forman al talento tecnol\u00f3gico e influyen en la innovaci\u00f3n mundial\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t10\/07\/2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6292 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-cyber-security tag-cybersecurity tag-learning tag-reskilling tag-upskilling-en\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/best-cyber-security-courses-to-land-top-in-demand-jobs\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-300x168.png\" class=\"attachment-medium size-medium wp-image-6305\" alt=\"cursos cibern\u00e9ticos\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprender<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/best-cyber-security-courses-to-land-top-in-demand-jobs\/\" >\n\t\t\t\tLos mejores cursos de ciberseguridad para conseguir los empleos m\u00e1s demandados\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>La ciberseguridad es uno de los campos m\u00e1s solicitados, ya que ofrece salarios elevados, seguridad laboral y la posibilidad de proteger los activos digitales de las empresas y combatir las ciberamenazas. A medida que las organizaciones dan cada vez m\u00e1s prioridad a la protecci\u00f3n de datos, la demanda de profesionales cualificados se ha disparado. Salarios iniciales\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/best-cyber-security-courses-to-land-top-in-demand-jobs\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Los mejores cursos de ciberseguridad para conseguir los empleos m\u00e1s demandados\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t27\/12\/2024\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6314 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-cyber-security tag-cybersecurity tag-learning tag-reskilling tag-upskilling-en\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/coursera-cybersecurity-alternatives\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-300x168.png\" class=\"attachment-medium size-medium wp-image-6315\" alt=\"Alternativas a coursera\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprender<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/coursera-cybersecurity-alternatives\/\" >\n\t\t\t\tCoursera Ciberseguridad Alternativas\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Las competencias en ciberseguridad son m\u00e1s esenciales que nunca, ya que casi 90% de las organizaciones han sufrido alg\u00fan tipo de brecha en los \u00faltimos a\u00f1os debido a la falta de conocimientos. Esto pone de relieve la urgente necesidad de profesionales con las competencias adecuadas para combatir la ciberseguridad.\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/coursera-cybersecurity-alternatives\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Coursera Cybersecurity Alternatives\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t09\/01\/2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4400 post type-post status-publish format-standard has-post-thumbnail hentry category-tech-jobs tag-cyber-forensics tag-cyber-hunting tag-cybersecurity tag-cybersecurity-specialist tag-industrial-control-systems tag-information-systems tag-malware tag-malware-analysis tag-social-engineering tag-tech-jobs tag-tech-training tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/tech-jobs\/cyber-career-paths-from-cybersecurity-analyst-to-ciso\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"194\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-300x194.jpg\" class=\"attachment-medium size-medium wp-image-4401\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-300x194.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-1024x662.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-768x496.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-1536x993.jpg 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-2048x1324.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Empleo t\u00e9cnico<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/tech-jobs\/cyber-career-paths-from-cybersecurity-analyst-to-ciso\/\" >\n\t\t\t\tTrayectorias profesionales cibern\u00e9ticas: de analista de ciberseguridad a CISO\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>El campo de la ciberseguridad ofrece un amplio abanico de oportunidades a los profesionales de la tecnolog\u00eda. Desde el an\u00e1lisis de malware hasta la gesti\u00f3n de una divisi\u00f3n de ciberdefensores, una carrera en ciberseguridad te mantendr\u00e1 en pie durante d\u00e9cadas.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/tech-jobs\/cyber-career-paths-from-cybersecurity-analyst-to-ciso\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Trayectorias profesionales en ciberseguridad: de analista de ciberseguridad a CISO\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t29\/03\/2022\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5018 post type-post status-publish format-standard has-post-thumbnail hentry category-trending tag-cybersecurity tag-talent-shortage tag-tech tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/trending\/guarding-tomorrow-the-escalating-need-for-cybersecurity-expertise\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-300x168.png\" class=\"attachment-medium size-medium wp-image-5019\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Tendencias<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/trending\/guarding-tomorrow-the-escalating-need-for-cybersecurity-expertise\/\" >\n\t\t\t\tProteger el ma\u00f1ana: La creciente necesidad de expertos en ciberseguridad\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Explore nuestro mundo cibervulnerable: Ad\u00e9ntrese en los retos invisibles de la era digital. A medida que aumentan las ciberamenazas, crece la demanda de 3,4 millones de expertos en ciberseguridad. \u00bfEstamos preparados para defender nuestro reino digital? Sum\u00e9rjase en nuestro \u00faltimo blog y aborde los\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/trending\/guarding-tomorrow-the-escalating-need-for-cybersecurity-expertise\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Guarding Tomorrow: La creciente necesidad de expertos en ciberseguridad\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t29\/08\/2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4381 post type-post status-publish format-standard has-post-thumbnail hentry category-trending tag-cybersecurity tag-cybersecurity-specialist tag-hermetic-wiper tag-isaac-wiper tag-israel tag-malware tag-teamwork tag-tech-jobs tag-tech-training tag-technology tag-the-startup-nation tag-ukraine tag-wiping\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/trending\/hacking-ukraine-russias-cyber-war-and-malware-without-borders\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-300x200.jpg\" class=\"attachment-medium size-medium wp-image-4382\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-300x200.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-1024x683.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-768x512.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-1536x1025.jpg 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Tendencias<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/trending\/hacking-ukraine-russias-cyber-war-and-malware-without-borders\/\" >\n\t\t\t\tHackeando Ucrania: Ciberguerra rusa y malware sin fronteras\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Paralelamente a la guerra sobre el terreno en Ucrania, una guerra cibern\u00e9tica rusa tiene como objetivo la infraestructura inform\u00e1tica del pa\u00eds y, potencialmente, del mundo entero. <\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/trending\/hacking-ukraine-russias-cyber-war-and-malware-without-borders\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Hacking Ukraine: Ciberguerra rusa y malware sin fronteras\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t11\/03\/2022\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6743 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-cybersecurity tag-iran tag-israel tag-reskilling tag-tech tag-upskilling\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/israel-cyber-excellence-lessons-from-the-recent-conflict-with-iran\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-300x169.png\" class=\"attachment-medium size-medium wp-image-6745\" alt=\"Guerra Israel-Ir\u00e1n\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-300x169.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-1024x576.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-768x432.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-1536x864.png 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-18x10.png 18w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprender<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/israel-cyber-excellence-lessons-from-the-recent-conflict-with-iran\/\" >\n\t\t\t\tLa excelencia cibern\u00e9tica de Israel: Lecciones del reciente conflicto con Ir\u00e1n\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Los conflictos suelen librarse con misiles y soldados, pero hoy en d\u00eda tambi\u00e9n se desarrollan en campos de batalla digitales. Los recientes acontecimientos en Oriente Pr\u00f3ximo, concretamente la guerra entre Israel e Ir\u00e1n de junio de 2025, han puesto de relieve c\u00f3mo la ciberseguridad puede desempe\u00f1ar un papel decisivo en\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/israel-cyber-excellence-lessons-from-the-recent-conflict-with-iran\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre La excelencia cibern\u00e9tica de Israel: Lecciones del reciente conflicto con Ir\u00e1n\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t22\/07\/2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4704 post type-post status-publish format-standard has-post-thumbnail hentry category-learning category-upskilling tag-attack-vector tag-awareness tag-cyber tag-cybersecurity tag-hackers tag-management tag-manager tag-organisation tag-organization tag-risk tag-tech tag-technology tag-threat\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/upskilling\/cyber-protection-organization-guide\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-300x169.jpg\" class=\"attachment-medium size-medium wp-image-4706\" alt=\"Concienciaci\u00f3n cibern\u00e9tica en las organizaciones\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-300x169.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-1024x576.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-768x432.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness.jpg 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprender<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/upskilling\/cyber-protection-organization-guide\/\" >\n\t\t\t\tLa importancia de la ciberprotecci\u00f3n para las organizaciones: Una gu\u00eda completa\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Las organizaciones y las personas dependen en gran medida de los ordenadores, los tel\u00e9fonos m\u00f3viles y las aplicaciones. Aunque la tecnolog\u00eda nos ha facilitado la vida, tambi\u00e9n nos ha hecho vulnerables a los ciberataques. Los piratas inform\u00e1ticos y los estafadores est\u00e1n siempre al acecho de vulnerabilidades para explotar datos\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/upskilling\/cyber-protection-organization-guide\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre La importancia de la ciberprotecci\u00f3n para las organizaciones: Una gu\u00eda completa\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t23\/03\/2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1387 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-certification tag-cyber tag-diploma tag-it tag-programming tag-tech tag-technology tag-training\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/get-certified-or-not\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/08\/certified-300x168.png\" class=\"attachment-medium size-medium wp-image-7116\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/08\/certified-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/08\/certified-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/08\/certified-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/08\/certified-1536x861.png 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/08\/certified-2048x1148.png 2048w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/08\/certified-18x10.png 18w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprender<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/get-certified-or-not\/\" >\n\t\t\t\tCertificarse o no certificarse, \u00e9sa es la cuesti\u00f3n\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Por Eran Lasser, fundador y director general de Wawiwa Tech Training En el vertiginoso mundo de la tecnolog\u00eda, las divisas cambian con rapidez. Lo que antes se consideraba oro macizo puede convertirse en un artefacto sin valor en pocos a\u00f1os. Piense en<\/p>\n\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/learning\/get-certified-or-not\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Certificarse o no certificarse, esa es la cuesti\u00f3n\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t04\/08\/2020\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1707 post type-post status-publish format-standard has-post-thumbnail hentry category-tech-jobs tag-cyber tag-cyber-security tag-cybersecurity tag-it tag-learning tag-security tag-tech tag-technology tag-training\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/tech-jobs\/training-cybersecurity-professionals-to-close-the-tech-skills-gap\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-300x169.jpg\" class=\"attachment-medium size-medium wp-image-1709\" alt=\"Formaci\u00f3n en ciberseguridad de Wawiwa\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-300x169.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-1024x576.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-768x432.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-1536x864.jpg 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Empleo t\u00e9cnico<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/es\/blog\/tech-jobs\/training-cybersecurity-professionals-to-close-the-tech-skills-gap\/\" >\n\t\t\t\tFormar a profesionales de la ciberseguridad para colmar la brecha tecnol\u00f3gica\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Millones de puestos de ciberseguridad est\u00e1n vacantes. Wawiwa ofrece dos programas distintos de ciberseguridad: un programa b\u00e1sico para principiantes y un programa avanzado de perfeccionamiento.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/es\/blog\/tech-jobs\/training-cybersecurity-professionals-to-close-the-tech-skills-gap\/\" aria-label=\"M\u00e1s informaci\u00f3n sobre Formaci\u00f3n de profesionales de la ciberseguridad para colmar la brecha tecnol\u00f3gica\" tabindex=\"-1\" >\n\t\t\tLeer M\u00e1s \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t23\/09\/2020\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNo hay comentarios\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4f878e6 elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4f878e6\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c62a15b\" data-id=\"c62a15b\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-4609959 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4609959\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-1072732\" data-id=\"1072732\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b7ebdbc elementor-widget elementor-widget-heading\" data-id=\"b7ebdbc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">\u00a1As\u00f3ciese con Wawiwa para ofrecer programas de formaci\u00f3n tecnol\u00f3gica en menos de 6 meses!<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a5a659 elementor-widget elementor-widget-text-editor\" data-id=\"6a5a659\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tWawiwa cubre el vac\u00edo de competencias tecnol\u00f3gicas reciclando a personas para profesiones tecnol\u00f3gicas muy demandadas. Hay millones de vacantes en el sector tecnol\u00f3gico y no hay suficientes profesionales con los conocimientos y habilidades necesarios para cubrirlas. Lo que la industria necesita de sus empleados no se ense\u00f1a en largas carreras acad\u00e9micas. Wawiwa ayuda a sus socios de todo el mundo a reciclar y mejorar las cualificaciones de las personas para puestos tecnol\u00f3gicos a trav\u00e9s de centros o programas locales de formaci\u00f3n tecnol\u00f3gica. La empresa utiliza una metodolog\u00eda de formaci\u00f3n probada, contenidos de vanguardia, plataformas digitales para el aprendizaje y la evaluaci\u00f3n, y s\u00f3lidas relaciones con la industria, para ofrecer programas de formaci\u00f3n que se traducen en una mayor empleabilidad y satisfacci\u00f3n de los graduados. Esto, a su vez, tambi\u00e9n crea una marca de formaci\u00f3n fuerte y un negocio sostenible para los socios de Wawiwa.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc44b24 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"fc44b24\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/es\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Contacte con nosotros<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Analyst 450 Hours \/ 8 Months, Part Time Program This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors. Studies suggest a huge shortage in Cybersecurity Analysts and a constant increase in demand for this profession. According to Deloitte, \u201cA massive and growing [&hellip;]<\/p>","protected":false},"author":1,"featured_media":2862,"parent":302,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-786","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Analyst Reskilling Program<\/title>\n<meta name=\"description\" content=\"This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wawiwa-tech.com\/es\/programas\/cyber\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Analyst Reskilling Program\" \/>\n<meta property=\"og:description\" content=\"This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wawiwa-tech.com\/es\/programas\/cyber\/\" \/>\n<meta property=\"og:site_name\" content=\"Wawiwa Tech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wawiwatech\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-25T09:09:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/Wawiwa-BG-for-LinkedIn.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"628\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@WawiwaTech\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"17 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/\",\"name\":\"Cybersecurity Analyst Reskilling Program\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/127-server-2-1.svg\",\"datePublished\":\"2026-01-06T08:20:52+00:00\",\"dateModified\":\"2026-03-25T09:09:44+00:00\",\"description\":\"This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/127-server-2-1.svg\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/127-server-2-1.svg\",\"width\":80,\"height\":80},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/cyber\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Programs\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/programs\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Analyst\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"name\":\"Wawiwa Tech\",\"description\":\"Reskilling the World to Tech\",\"publisher\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wawiwa-tech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\",\"name\":\"Wawiwa Tech\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"width\":1000,\"height\":425,\"caption\":\"Wawiwa Tech\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/wawiwatech\\\/\",\"https:\\\/\\\/x.com\\\/WawiwaTech\",\"https:\\\/\\\/instagram.com\\\/wawiwatech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wawiwa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCN_ejCsLDqznGifvkX86gzA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Analyst Reskilling Program","description":"This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wawiwa-tech.com\/es\/programas\/cyber\/","og_locale":"es_ES","og_type":"article","og_title":"Cybersecurity Analyst Reskilling Program","og_description":"This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.","og_url":"https:\/\/wawiwa-tech.com\/es\/programas\/cyber\/","og_site_name":"Wawiwa Tech","article_publisher":"https:\/\/www.facebook.com\/wawiwatech\/","article_modified_time":"2026-03-25T09:09:44+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/Wawiwa-BG-for-LinkedIn.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@WawiwaTech","twitter_misc":{"Est. reading time":"17 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wawiwa-tech.com\/programs\/cyber\/","url":"https:\/\/wawiwa-tech.com\/programs\/cyber\/","name":"Cybersecurity Analyst Reskilling Program","isPartOf":{"@id":"https:\/\/wawiwa-tech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wawiwa-tech.com\/programs\/cyber\/#primaryimage"},"image":{"@id":"https:\/\/wawiwa-tech.com\/programs\/cyber\/#primaryimage"},"thumbnailUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/10\/127-server-2-1.svg","datePublished":"2026-01-06T08:20:52+00:00","dateModified":"2026-03-25T09:09:44+00:00","description":"This part-time Cybersecurity program features expert instruction, hands-on projects, and live labs to get graduates trained in handling current attack vectors.","breadcrumb":{"@id":"https:\/\/wawiwa-tech.com\/programs\/cyber\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wawiwa-tech.com\/programs\/cyber\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/wawiwa-tech.com\/programs\/cyber\/#primaryimage","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/10\/127-server-2-1.svg","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/10\/127-server-2-1.svg","width":80,"height":80},{"@type":"BreadcrumbList","@id":"https:\/\/wawiwa-tech.com\/programs\/cyber\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wawiwa-tech.com\/"},{"@type":"ListItem","position":2,"name":"Programs","item":"https:\/\/wawiwa-tech.com\/programs\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Analyst"}]},{"@type":"WebSite","@id":"https:\/\/wawiwa-tech.com\/#website","url":"https:\/\/wawiwa-tech.com\/","name":"Wawiwa Tech","description":"Reskilling the World to Tech","publisher":{"@id":"https:\/\/wawiwa-tech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wawiwa-tech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/wawiwa-tech.com\/#organization","name":"Wawiwa Tech","url":"https:\/\/wawiwa-tech.com\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","width":1000,"height":425,"caption":"Wawiwa Tech"},"image":{"@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wawiwatech\/","https:\/\/x.com\/WawiwaTech","https:\/\/instagram.com\/wawiwatech","https:\/\/www.linkedin.com\/company\/wawiwa\/","https:\/\/www.youtube.com\/channel\/UCN_ejCsLDqznGifvkX86gzA"]}]}},"_links":{"self":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/pages\/786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/comments?post=786"}],"version-history":[{"count":0,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/pages\/786\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/pages\/302"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/media\/2862"}],"wp:attachment":[{"href":"https:\/\/wawiwa-tech.com\/es\/wp-json\/wp\/v2\/media?parent=786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}