{"id":2135,"date":"2024-06-20T09:50:36","date_gmt":"2024-06-20T07:50:36","guid":{"rendered":"https:\/\/blogs.ugr.es\/seguridadinformatica\/?p=2135"},"modified":"2024-06-20T09:51:11","modified_gmt":"2024-06-20T07:51:11","slug":"proximos-eventos-catedra-incibe-ugr","status":"publish","type":"post","link":"https:\/\/blogs.ugr.es\/seguridadinformatica\/proximos-eventos-catedra-incibe-ugr\/","title":{"rendered":"Pr\u00f3ximos eventos c\u00e1tedra INCIBE-UGR"},"content":{"rendered":"<p><span style=\"color: #000000\"><a href=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2024\/06\/Diseno-sin-titulo-2-min.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-2136 alignleft\" src=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2024\/06\/Diseno-sin-titulo-2-min.jpg\" alt=\"\" width=\"170\" height=\"170\" srcset=\"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2024\/06\/Diseno-sin-titulo-2-min.jpg 800w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2024\/06\/Diseno-sin-titulo-2-min-300x300.jpg 300w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2024\/06\/Diseno-sin-titulo-2-min-700x700.jpg 700w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2024\/06\/Diseno-sin-titulo-2-min-150x150.jpg 150w, https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-content\/uploads\/sites\/47\/2024\/06\/Diseno-sin-titulo-2-min-75x75.jpg 75w\" sizes=\"auto, (max-width: 170px) 100vw, 170px\" \/><\/a>\u00a0 <span style=\"font-family: Calibri, sans-serif\"><span style=\"font-size: medium\">En el marco de la <\/span><\/span><span style=\"font-family: Calibri, sans-serif\"><span style=\"font-size: medium\"><b>C\u00e1tedra de Ciberseguridad\u00a0CiberUGR &#8211; <\/b><b><a class=\"moz-txt-link-freetext\" href=\"https:\/\/catedras.ugr.es\/ciberugr-incibe\">https:\/\/catedras.ugr.es\/ciberugr-incibe<\/a><\/b>(#C\u00e1tedrasCiber, #NextGenerationEU), <b>contrato 025\/24 INCIBE-UGR<\/b>, en las pr\u00f3ximas fechas est\u00e1n programadas las siguientes actividades (cons\u00faltense los enlaces correspondientes para un mayor detalle):<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000\">\u00a0\u00a0\u00a0 <span style=\"font-family: Calibri, sans-serif\"><span style=\"font-size: medium\">&#8211; 24 junio-19 julio -&gt; <b>Desaf\u00edo Tecnol\u00f3gico Jr en Ciberseguridad<\/b>, orientado a la captaci\u00f3n y formaci\u00f3n de talento de j\u00f3venes y adolescentes (<a class=\"moz-txt-link-freetext\" href=\"https:\/\/catedras.ugr.es\/ciberugr-incibe\/informacion\/noticias\/desafiojr\">https:\/\/catedras.ugr.es\/ciberugr-incibe\/informacion\/noticias\/desafiojr<\/a>)<\/span><\/span><\/span><\/p>\n<p><span style=\"color: #000000\">\u00a0\u00a0\u00a0 <span style=\"font-family: Calibri, sans-serif\"><span style=\"font-size: medium\">&#8211; 27 junio -&gt;\u00a0 <b>Curso de Ciberseguridad para CCFFSE<\/b>: \u00abContrainformes periciales en Ingenier\u00eda Infom\u00e1tica\u00bb (<a class=\"moz-txt-link-freetext\" href=\"https:\/\/catedras.ugr.es\/ciberugr-incibe\/informacion\/noticias\/coiijunio2024\">https:\/\/catedras.ugr.es\/ciberugr-incibe\/informacion\/noticias\/coiijunio2024<\/a>)<\/span><\/span><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0 En el marco de la C\u00e1tedra de Ciberseguridad\u00a0CiberUGR &#8211; https:\/\/catedras.ugr.es\/ciberugr-incibe(#C\u00e1tedrasCiber, #NextGenerationEU), contrato 025\/24 INCIBE-UGR, en las pr\u00f3ximas fechas est\u00e1n programadas las siguientes actividades (cons\u00faltense los enlaces correspondientes para un mayor detalle): \u00a0\u00a0\u00a0 &#8211; 24 junio-19 julio -&gt; Desaf\u00edo Tecnol\u00f3gico Jr en Ciberseguridad, orientado a la captaci\u00f3n y formaci\u00f3n de talento de j\u00f3venes y adolescentes [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":2136,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[47,12],"tags":[59,14,18],"class_list":{"0":"post-2135","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-alertas","8":"category-noticias","9":"tag-charlas-catedra-incibe-ugr","10":"tag-noticias","11":"tag-seguridad","12":"entry"},"_links":{"self":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/comments?post=2135"}],"version-history":[{"count":2,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2135\/revisions"}],"predecessor-version":[{"id":2138,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/posts\/2135\/revisions\/2138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media\/2136"}],"wp:attachment":[{"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/media?parent=2135"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/categories?post=2135"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.ugr.es\/seguridadinformatica\/wp-json\/wp\/v2\/tags?post=2135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}