{"id":9305,"date":"2025-03-15T14:17:08","date_gmt":"2025-03-15T14:17:08","guid":{"rendered":"https:\/\/face.unt.edu.ar\/web\/iadmin\/?p=9305"},"modified":"2025-04-30T14:39:13","modified_gmt":"2025-04-30T14:39:13","slug":"curso-de-extension-fundamentos-de-ciberseguridad","status":"publish","type":"post","link":"https:\/\/face.unt.edu.ar\/web\/iadmin\/curso-de-extension-fundamentos-de-ciberseguridad\/","title":{"rendered":"Curso de extensi\u00f3n: Fundamentos de ciberseguridad"},"content":{"rendered":"<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><span class=\"j9e5Sc C9DxTc \">El 4 de abril inicia el curso Fundamentos de ciberseguridad a cargo de la Egresada de la Licenciatura en Administraci\u00f3n de la FACE <\/span><span class=\"C9DxTc \">Milagros de la Rosa. Los encuentros se llevaran a cabo los d\u00edas viernes en el <\/span><span class=\"C9DxTc \">Horario: 1<\/span><span class=\"C9DxTc \">8:30<\/span><span class=\"C9DxTc \">\u00a0a 20:<\/span><span class=\"C9DxTc \">30<\/span><span class=\"C9DxTc \"> hs por P<\/span><span class=\"C9DxTc \">lataforma: Zoom\u00a0<\/span><\/p>\n<section id=\"h.a3b2341b66ff7f9_19\" class=\"yaqOZd lQAHbd\">\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_22\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><strong><span class=\"jgG6ef C9DxTc \">FUNDAMENTACI\u00d3N<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_23\" class=\"yaqOZd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_26\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><span class=\"C9DxTc \">En un mundo cada vez m\u00e1s digitalizado y atravesado por las tecnolog\u00edas cada vez m\u00e1s complejas, la seguridad de la informaci\u00f3n y la ciberseguridad se han convertido en aspectos cr\u00edticos para individuos, empresas y gobiernos. La creciente sofisticaci\u00f3n de los ataques cibern\u00e9ticos, el aumento de las regulaciones de protecci\u00f3n de datos y la dependencia de la tecnolog\u00eda en todos los sectores requieren profesionales capacitados para enfrentar estos desaf\u00edos.\u00a0<\/span><\/p>\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><span class=\"C9DxTc \">A\u00f1o tras a\u00f1o, la demanda de especialistas en ciberseguridad con habilidades tanto t\u00e9cnicas como de gesti\u00f3n ha ido en aumento. Esto hace imprescindible la formaci\u00f3n de nuevos profesionales, independientemente de su formaci\u00f3n de base, que puedan desarrollar competencias clave para la protecci\u00f3n de la informaci\u00f3n y la mitigaci\u00f3n de riesgos en entornos digitales.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_27\" class=\"yaqOZd lQAHbd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_30\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><strong><span class=\"jgG6ef C9DxTc \">OBJETIVOS<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_31\" class=\"yaqOZd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_34\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Brindar conocimientos fundamentales de ciberseguridad y herramientas claves para implementar un programa de seguridad en organizaciones<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Introducir conceptos claves de ciberseguridad y gesti\u00f3n de los riesgos de ciberseguridad<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Brindar conocimientos pr\u00e1cticos para la gesti\u00f3n de controles de ciberseguridad en infraestructuras tecnol\u00f3gicas<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Confeccionar un programa de ciberseguridad primario para la implementaci\u00f3n de controles claves en las organizaciones<\/span><\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_35\" class=\"yaqOZd lQAHbd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_38\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><strong><span class=\"jgG6ef C9DxTc \">DESTINATARIOS<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_99\" class=\"yaqOZd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_102\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Alumnos avanzados y egresados de las carreras de ciencias econ\u00f3micas<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Profesionales dedicados a \u00e1reas de tecnolog\u00eda y sistemas tecnol\u00f3gicos que trabajen en tareas relativas a la ciberseguridad en las organizaciones.\u00a0<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Interesados en desarrollar actividades relativas a la ciberseguridad en organizaciones locales.\u00a0<\/span><\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_95\" class=\"yaqOZd lQAHbd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_98\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><strong><span class=\"jgG6ef C9DxTc \">REQUISITOS<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_39\" class=\"yaqOZd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_42\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Computadora o tablet con accesos a plataformas como google.<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Sistemas I y\/o II cursadas o bien trabajar en \u00e1rea de conocimientos a fines.<\/span><\/p>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_43\" class=\"yaqOZd lQAHbd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_46\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><strong><span class=\"jgG6ef C9DxTc \">CONTENIDO<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_47\" class=\"yaqOZd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_50\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Introducci\u00f3n a la Ciberseguridad y Marcos de Referencia<\/span><\/p>\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Conceptos y areas\u00a0 claves de ciberseguridad\u00a0<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Marcos de referencia y estructura\u00a0<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Analisis de riesgos y amenazas\u00a0<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Seguridad en Infraestructura, Identidad y Protecci\u00f3n de activos tecnol\u00f3gicos\u00a0<\/span><\/p>\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Fundamentos de redes e infraestructura segura<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Gesti\u00f3n de identidades, autenticaci\u00f3n y gesti\u00f3n de access\u00a0<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Controles claves para la proteccion de activos tecnologicos cr\u00edticos\u00a0<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Implementaci\u00f3n de un Programa de Seguridad en una Organizaci\u00f3n<\/span><\/p>\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Gesti\u00f3n de riesgos e implementacion de controles<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Dise\u00f1o de pol\u00edticas de seguridad de la informaci\u00f3n y estructura documental<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Plan de concientizaci\u00f3n en seguridad<\/span><\/p>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_51\" class=\"yaqOZd lQAHbd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_54\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb wHaque g5GTcb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><strong><span class=\"jgG6ef C9DxTc \">INVERSI\u00d3N<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n<section id=\"h.a3b2341b66ff7f9_55\" class=\"yaqOZd\">\n<div class=\"IFuOkc\"><\/div>\n<div class=\"mYVXT\">\n<div class=\"LS81yb VICjCf j5pSsc db35Fc\">\n<div class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd purZT-AhqUyc-II5mzb ZcASvf-AhqUyc-II5mzb pSzOP-AhqUyc-qWD73c Ktthjf-AhqUyc-qWD73c JNdkSc SQVYQc yYI8W HQwdzb\">\n<div class=\"JNdkSc-SmKAyb LkDMRd\">\n<div class=\"\">\n<div class=\"oKdM2c ZZyype Kzv0Me\">\n<div id=\"h.a3b2341b66ff7f9_58\" class=\"hJDwNd-AhqUyc-uQSCkd Ft7HRd-AhqUyc-uQSCkd jXK9ad D2fZ2 zu5uec OjCsFc dmUFtb\">\n<div class=\"jXK9ad-SmKAyb\">\n<div class=\"tyJCtd mGzaTb Depvyb baZpAe\">\n<ul class=\"n8H08c UVNKR \">\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">P\u00fablico en General &#8211;\u00a0<\/span><span class=\"C9DxTc \">$60.000<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Descuento para Alumnos y Egresados de la Facultad de Ciencias Econ\u00f3micas (UNT) &#8211;\u00a0<\/span><span class=\"C9DxTc \">30%<\/span><\/p>\n<\/li>\n<li class=\"zfr3Q TYR86d eD0Rn \" dir=\"ltr\">\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\" role=\"presentation\"><span class=\"C9DxTc \">Descuentos para Docentes y No Docentes FACE &#8211;\u00a0<\/span><span class=\"C9DxTc \">20%<\/span><\/p>\n<\/li>\n<\/ul>\n<p class=\"zfr3Q CDt4Ke \" dir=\"ltr\"><span class=\"C9DxTc \">Enlace de pago<\/span><span class=\"C9DxTc \">:\u00a0<\/span><a class=\"XqQF9c\" href=\"https:\/\/asociacioncooperadoraface.mitiendanube.com\/productos\/fundamentos-de-ciberseguridad\/\" target=\"_blank\" rel=\"noopener\"><span class=\"C9DxTc \">https:\/\/asociacioncooperadoraface.mitiendanube.com\/productos\/fundamentos-de-ciberseguridad\/<\/span><\/a><span class=\"C9DxTc \">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>El 4 de abril inicia el curso Fundamentos de ciberseguridad a cargo de la Egresada de la Licenciatura en Administraci\u00f3n de la FACE Milagros de la Rosa. Los encuentros se llevaran a cabo los d\u00edas viernes en el Horario: 18:30\u00a0a 20:30 hs por Plataforma: Zoom\u00a0 FUNDAMENTACI\u00d3N En un mundo cada vez m\u00e1s digitalizado y atravesado [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":9306,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,14],"tags":[],"_links":{"self":[{"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/posts\/9305"}],"collection":[{"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/comments?post=9305"}],"version-history":[{"count":1,"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/posts\/9305\/revisions"}],"predecessor-version":[{"id":9307,"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/posts\/9305\/revisions\/9307"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/media\/9306"}],"wp:attachment":[{"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/media?parent=9305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/categories?post=9305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/face.unt.edu.ar\/web\/iadmin\/wp-json\/wp\/v2\/tags?post=9305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}