{"id":178,"date":"2016-02-09T14:13:42","date_gmt":"2016-02-09T14:13:42","guid":{"rendered":"http:\/\/cidti40.com\/?page_id=178"},"modified":"2021-10-01T10:45:20","modified_gmt":"2021-10-01T15:45:20","slug":"laboratorio-de-ciberseguridad","status":"publish","type":"page","link":"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/","title":{"rendered":"Laboratorio de Ciberseguridad"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1590198353098{margin-top: 5rem !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Laboratorio de Ciberseguridad&#8221; font_container=&#8221;tag:h1|text_align:center|color:%2333cccc&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221;][vc_single_image image=&#8221;2246&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1633103089801{margin-top: 25px !important;margin-bottom: 25px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1590198301109{margin-top: 4px !important;}&#8221;][vc_column css_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;La seguridad de la informaci\u00f3n es una tendencia que cada d\u00eda cobra m\u00e1s valor en los \u00faltimos a\u00f1os. La transformaci\u00f3n digital en la que se ven envueltas las empresas las obliga a poner m\u00e1s atenci\u00f3n a las nuevas pol\u00edticas de seguridad. Gracias a esta transformaci\u00f3n, la interacci\u00f3n con el ciberespacio es mucho mayor, pero esto conlleva ciertos peligros que no se pueden descuidar. Tanto es que la seguridad de la informaci\u00f3n se ha convertido en una prioridad para cualquier organizaci\u00f3n.<\/BR>&#8221; font_container=&#8221;tag:div|text_align:justify&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1594481145107{margin-bottom: 15px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1590198301109{margin-top: 4px !important;}&#8221;][vc_column css_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;Este es el actor principal en la protecci\u00f3n de la infraestructura computacional. A partir de la ciberseguridad se dise\u00f1an procedimientos y m\u00e9todos para tener un sistema seguro en el ciberespacio, por lo que las amenazas se generan de manera inevitable y de forma imprevista, siendo necesarios y considerablemente oportunos los mecanismos de protecci\u00f3n como m\u00e9todo de barrera.&#8221; font_container=&#8221;tag:div|text_align:justify&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1594479254605{margin-bottom: 15px !important;}&#8221;][vc_custom_heading text=&#8221;Las empresas, como parte de su transformaci\u00f3n, innovaci\u00f3n y mejora corporativa, que exponen sus servicios al ciberespacio deben prever los riesgos que esto trae consigo, esto quiere decir que existen m\u00e1s y nuevas posibilidades de vulnerar la infraestructura corporativa de una organizaci\u00f3n, por tal motivo, en el Cidti 4.0 contaremos con un Laboratorio que acompa\u00f1ar\u00e1 a las organizaciones -p\u00fablicas y privadas- en sus proyectos de ciberseguridad:&#8221; font_container=&#8221;tag:div|text_align:justify&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeInUp&#8221; css=&#8221;.vc_custom_1590198203087{margin-top: 5px !important;}&#8221;][vc_column width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1590005288418{margin-top: 10px !important;margin-bottom: 35px !important;}&#8221;][vc_single_image image=&#8221;1190&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1594327193121{margin-top: 25px !important;margin-bottom: 25px !important;}&#8221;][\/vc_column][vc_column css_animation=&#8221;none&#8221; width=&#8221;1\/2&#8243;][vc_empty_space][vc_custom_heading text=&#8221;<b>+<\/b> Desarrollos de evaluaci\u00f3n tecnol\u00f3gica en tiempo real.<\/br><br \/>\n<b>+<\/b> Diagn\u00f3sticos de seguridad sobre temas definidos. <\/br><br \/>\n<b>+<\/b> Prevenci\u00f3n, detecci\u00f3n y respuesta a ataques de CiberSeguridad, abarcando tanto la seguridad de la informaci\u00f3n en la organizaci\u00f3n como los riesgos existentes en el ciberespacio (fuga de informaci\u00f3n o gesti\u00f3n de diferentes tipos de fraude).&#8221; font_container=&#8221;tag:p|text_align:justify|color:%2333cccc&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221;][vc_custom_heading text=&#8221;En el Laboratorio, podr\u00e1s encontrar los siguientes equipos para el desarrollo de tus proyectos de transformaci\u00f3n digital:&#8221; font_container=&#8221;tag:div|text_align:justify&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:400%20regular%3A400%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221;][vc_custom_heading text=&#8221;<b>+<\/b> Servidores y almacenamiento<br \/>\n<b>+<\/b> Soluciones firewall<br \/>\n<b>+<\/b> Switches<br \/>\n<b>+<\/b> Racks y\/o Gabinetes para UPSs<br \/>\n<b>+<\/b> Equipos de c\u00f3mputo desktop&#8221; font_container=&#8221;tag:p|text_align:justify|color:%2333cccc&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1599317310236{margin-top: 30px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css=&#8221;.vc_custom_1590159238440{margin-top: 3px !important;}&#8221;][vc_column css_animation=&#8221;fadeInLeft&#8221; offset=&#8221;vc_hidden-md vc_hidden-sm vc_hidden-xs&#8221;][vc_empty_space][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1590198353098{margin-top: 5rem !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Laboratorio de Ciberseguridad&#8221; font_container=&#8221;tag:h1|text_align:center|color:%2333cccc&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221;][vc_single_image image=&#8221;2246&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1633103089801{margin-top: 25px !important;margin-bottom: 25px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1590198301109{margin-top: 4px !important;}&#8221;][vc_column css_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;La seguridad de la informaci\u00f3n es una tendencia que cada d\u00eda cobra m\u00e1s valor en los \u00faltimos a\u00f1os. La transformaci\u00f3n digital en la que se ven envueltas las empresas las [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Laboratorio de Ciberseguridad - CIDTI 4.0<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Laboratorio de Ciberseguridad - CIDTI 4.0\" \/>\n<meta property=\"og:description\" content=\"[vc_row css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1590198353098{margin-top: 5rem !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Laboratorio de Ciberseguridad&#8221; font_container=&#8221;tag:h1|text_align:center|color:%2333cccc&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221;][vc_single_image image=&#8221;2246&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1633103089801{margin-top: 25px !important;margin-bottom: 25px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1590198301109{margin-top: 4px !important;}&#8221;][vc_column css_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;La seguridad de la informaci\u00f3n es una tendencia que cada d\u00eda cobra m\u00e1s valor en los \u00faltimos a\u00f1os. La transformaci\u00f3n digital en la que se ven envueltas las empresas las [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"CIDTI 4.0\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CIDTI40\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-01T15:45:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/\",\"url\":\"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/\",\"name\":\"Laboratorio de Ciberseguridad - CIDTI 4.0\",\"isPartOf\":{\"@id\":\"https:\/\/cidti.com.co\/cidti40\/#website\"},\"datePublished\":\"2016-02-09T14:13:42+00:00\",\"dateModified\":\"2021-10-01T15:45:20+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cidti.com.co\/cidti40\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Laboratorio de Ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cidti.com.co\/cidti40\/#website\",\"url\":\"https:\/\/cidti.com.co\/cidti40\/\",\"name\":\"CIDTI 40\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cidti.com.co\/cidti40\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cidti.com.co\/cidti40\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cidti.com.co\/cidti40\/#organization\",\"name\":\"CIDTI 4.0\",\"url\":\"https:\/\/cidti.com.co\/cidti40\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/cidti.com.co\/cidti40\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cidti40.com\/wp-content\/uploads\/2020\/05\/FAVICON_CIDTI-1.png\",\"contentUrl\":\"https:\/\/cidti40.com\/wp-content\/uploads\/2020\/05\/FAVICON_CIDTI-1.png\",\"width\":1067,\"height\":1067,\"caption\":\"CIDTI 4.0\"},\"image\":{\"@id\":\"https:\/\/cidti.com.co\/cidti40\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CIDTI40\",\"https:\/\/www.instagram.com\/cidti40\/\",\"https:\/\/www.linkedin.com\/in\/comunicaciones-cidti\/\",\"https:\/\/www.youtube.com\/channel\/UC5JgvJy7YXifAYLqepgNcvg\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Laboratorio de Ciberseguridad - CIDTI 4.0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Laboratorio de Ciberseguridad - CIDTI 4.0","og_description":"[vc_row css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1590198353098{margin-top: 5rem !important;}&#8221;][vc_column][vc_custom_heading text=&#8221;Laboratorio de Ciberseguridad&#8221; font_container=&#8221;tag:h1|text_align:center|color:%2333cccc&#8221; google_fonts=&#8221;font_family:Roboto%20Condensed%3A300%2C300italic%2Cregular%2Citalic%2C700%2C700italic|font_style:700%20bold%20regular%3A700%3Anormal&#8221; css_animation=&#8221;bounceIn&#8221;][vc_single_image image=&#8221;2246&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; css_animation=&#8221;bounceIn&#8221; css=&#8221;.vc_custom_1633103089801{margin-top: 25px !important;margin-bottom: 25px !important;}&#8221;][\/vc_column][\/vc_row][vc_row css_animation=&#8221;fadeIn&#8221; css=&#8221;.vc_custom_1590198301109{margin-top: 4px !important;}&#8221;][vc_column css_animation=&#8221;none&#8221;][vc_custom_heading text=&#8221;La seguridad de la informaci\u00f3n es una tendencia que cada d\u00eda cobra m\u00e1s valor en los \u00faltimos a\u00f1os. La transformaci\u00f3n digital en la que se ven envueltas las empresas las [&hellip;]","og_url":"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/","og_site_name":"CIDTI 4.0","article_publisher":"https:\/\/www.facebook.com\/CIDTI40","article_modified_time":"2021-10-01T15:45:20+00:00","twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/","url":"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/","name":"Laboratorio de Ciberseguridad - CIDTI 4.0","isPartOf":{"@id":"https:\/\/cidti.com.co\/cidti40\/#website"},"datePublished":"2016-02-09T14:13:42+00:00","dateModified":"2021-10-01T15:45:20+00:00","breadcrumb":{"@id":"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cidti.com.co\/cidti40\/laboratorio-de-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cidti.com.co\/cidti40\/"},{"@type":"ListItem","position":2,"name":"Laboratorio de Ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/cidti.com.co\/cidti40\/#website","url":"https:\/\/cidti.com.co\/cidti40\/","name":"CIDTI 40","description":"","publisher":{"@id":"https:\/\/cidti.com.co\/cidti40\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cidti.com.co\/cidti40\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/cidti.com.co\/cidti40\/#organization","name":"CIDTI 4.0","url":"https:\/\/cidti.com.co\/cidti40\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/cidti.com.co\/cidti40\/#\/schema\/logo\/image\/","url":"https:\/\/cidti40.com\/wp-content\/uploads\/2020\/05\/FAVICON_CIDTI-1.png","contentUrl":"https:\/\/cidti40.com\/wp-content\/uploads\/2020\/05\/FAVICON_CIDTI-1.png","width":1067,"height":1067,"caption":"CIDTI 4.0"},"image":{"@id":"https:\/\/cidti.com.co\/cidti40\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CIDTI40","https:\/\/www.instagram.com\/cidti40\/","https:\/\/www.linkedin.com\/in\/comunicaciones-cidti\/","https:\/\/www.youtube.com\/channel\/UC5JgvJy7YXifAYLqepgNcvg\/"]}]}},"_links":{"self":[{"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/pages\/178"}],"collection":[{"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/comments?post=178"}],"version-history":[{"count":21,"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/pages\/178\/revisions"}],"predecessor-version":[{"id":2247,"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/pages\/178\/revisions\/2247"}],"wp:attachment":[{"href":"https:\/\/cidti.com.co\/cidti40\/wp-json\/wp\/v2\/media?parent=178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}