{"id":8588,"date":"2021-11-18T20:29:56","date_gmt":"2021-11-19T02:29:56","guid":{"rendered":"https:\/\/anuies-tic.anuies.mx\/web\/?p=8588"},"modified":"2021-12-03T09:53:42","modified_gmt":"2021-12-03T15:53:42","slug":"24nov","status":"publish","type":"post","link":"https:\/\/anuies-tic.anuies.mx\/web\/24nov\/","title":{"rendered":"24 noviembre &#8211;  \u00abRespuesta a Ciberincidentes &#8211; Entendiendo la Anatom\u00eda de un Ciberataque\u00bb"},"content":{"rendered":"<div id=\"pl-8588\"  class=\"panel-layout\" ><div id=\"pg-8588-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-8588-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-8588-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8582\" src=\"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2.jpg\" alt=\"\" width=\"1280\" height=\"1280\" srcset=\"https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2.jpg 1280w, https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-300x300.jpg 300w, https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1024x1024.jpg 1024w, https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-150x150.jpg 150w, https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-768x768.jpg 768w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-8588-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-8588-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h1 style=\"text-align: center;\"><span style=\"font-size: 14pt;\"><u><strong>Seminario:&nbsp;<\/strong>Ciberseguridad en las Instituciones de Educaci\u00f3n Superior<\/u><\/span><\/h1>\n<p style=\"text-align: center;\"><span style=\"font-size: 14pt;\">Temporada 2 \/ Sesi\u00f3n 12<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 18pt;\"><strong>\"Respuesta a Ciberincidentes - Entendiendo la Anatom\u00eda de un Ciberataque\"<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 14pt;\">Impartido por:<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"font-size: 14pt;\"><strong>M.C. Ricardo Ali Barrera Arteaga<\/strong>, Cyber Security Incident Handler en el centro de Ciberseguridad de Scitum | Telmex<\/span><\/p>\n<p style=\"text-align: center;\"><a class=\"fasc-button fasc-size-large fasc-type-glossy fasc-rounded-medium\" style=\"background-color: #33809e; color: #ffffff;\" target=\"_blank\" href=\"http:\/\/eventos.anuies.mx\/go\/C-T2S12\" rel=\"noopener\">Registro<\/a><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Seminario:&nbsp;Ciberseguridad en las Instituciones de Educaci\u00f3n Superior Temporada 2 \/ Sesi\u00f3n 12 \u00abRespuesta a Ciberincidentes &#8211; Entendiendo la Anatom\u00eda de un Ciberataque\u00bb Impartido por: M.C. Ricardo Ali Barrera Arteaga, Cyber Security Incident Handler en el centro de Ciberseguridad de Scitum | Telmex Registro<\/p>\n","protected":false},"author":1,"featured_media":8589,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,52],"tags":[],"class_list":{"0":"post-8588","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","6":"hentry","7":"category-eventos","8":"category-eventos-anteriores","10":"post-with-thumbnail","11":"post-with-thumbnail-large"},"rttpg_featured_image_url":{"full":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1.jpg",1280,1280,false],"landscape":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1.jpg",1280,1280,false],"portraits":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1.jpg",1280,1280,false],"thumbnail":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-150x150.jpg",150,150,true],"medium":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-300x300.jpg",300,300,true],"large":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-1024x1024.jpg",720,720,true],"1536x1536":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1.jpg",1280,1280,false],"2048x2048":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1.jpg",1280,1280,false],"post-thumbnail":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-720x380.jpg",720,380,true],"vantage-thumbnail-no-sidebar":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-1080x380.jpg",1080,380,true],"vantage-slide":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-960x480.jpg",960,480,true],"vantage-carousel":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-272x182.jpg",272,182,true],"vantage-grid-loop":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-436x272.jpg",436,272,true],"sow-carousel-default":["https:\/\/anuies-tic.anuies.mx\/web\/wp-content\/uploads\/2021\/11\/banner-2-1-272x182.jpg",272,182,true]},"rttpg_author":{"display_name":"ctrlweb","author_link":"https:\/\/anuies-tic.anuies.mx\/web\/author\/ctrldcsctrlweb\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/anuies-tic.anuies.mx\/web\/category\/eventos\/\" rel=\"category tag\">Eventos<\/a> <a href=\"https:\/\/anuies-tic.anuies.mx\/web\/category\/eventos\/eventos-anteriores\/\" rel=\"category tag\">Eventos anteriores<\/a>","rttpg_excerpt":"Seminario:&nbsp;Ciberseguridad en las Instituciones de Educaci\u00f3n Superior Temporada 2 \/ Sesi\u00f3n 12 \"Respuesta a Ciberincidentes - Entendiendo la Anatom\u00eda de un Ciberataque\" Impartido por: M.C. Ricardo Ali Barrera Arteaga, Cyber Security Incident Handler en el centro de Ciberseguridad de Scitum | Telmex Registro","_links":{"self":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts\/8588","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/comments?post=8588"}],"version-history":[{"count":2,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts\/8588\/revisions"}],"predecessor-version":[{"id":8652,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/posts\/8588\/revisions\/8652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/media\/8589"}],"wp:attachment":[{"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/media?parent=8588"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/categories?post=8588"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/anuies-tic.anuies.mx\/web\/wp-json\/wp\/v2\/tags?post=8588"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}