{"id":153197,"date":"2023-06-05T19:18:14","date_gmt":"2023-06-05T22:18:14","guid":{"rendered":"https:\/\/sandbox2.institutopmg.com\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/"},"modified":"2026-03-19T16:39:20","modified_gmt":"2026-03-19T19:39:20","slug":"it-shaped-cybersecurity-vulnerabilities-and-threats-foundation","status":"publish","type":"curso-online","link":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","title":{"rendered":"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF"},"content":{"rendered":"<p class=\"ng-star-inserted\"><span class=\"ng-star-inserted\">En este curso, conocer\u00e1s los principios y fundamentos del an\u00e1lisis de Ciberseguridad de una organizaci\u00f3n.<\/span><\/p>\n<p class=\"ng-star-inserted\"><span class=\"ng-star-inserted\">Comprender\u00e1s la terminolog\u00eda b\u00e1sica, conocer\u00e1s las herramientas y dispositivos relacionados con la ciberseguridad y los principales ataques, vulnerabilidades y amenazas cibern\u00e9ticas, desde el Malware hasta la Ingenier\u00eda Social, pasando por Ataques de Aplicaciones, Ataques de Red, Actores de Amenazas y comprendiendo los fundamentos de Protocolos y Redes.<\/span><\/p>\n","protected":false},"featured_media":149601,"comment_status":"open","ping_status":"closed","template":"","_formacao-curso-online":[10703],"class_list":["post-153197","curso-online","type-curso-online","status-publish","has-post-thumbnail","hentry","_formacao-curso-online-cyber-security-es"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation<\/title>\n<meta name=\"description\" content=\"En este curso, conocer\u00e1s los principales ataques, vulnerabilidades y amenazas cibern\u00e9ticas, desde el Malware hasta la Ingenier\u00eda Social, pasando por Ataques de Aplicaciones, Ataques de Red, Actores de Amenazas y comprendiendo los fundamentos de Protocolos y Redes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF\" \/>\n<meta property=\"og:description\" content=\"En este curso, conocer\u00e1s los principales ataques, vulnerabilidades y amenazas cibern\u00e9ticas, desde el Malware hasta la Ingenier\u00eda Social, pasando por Ataques de Aplicaciones, Ataques de Red, Actores de Amenazas y comprendiendo los fundamentos de Protocolos y Redes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\" \/>\n<meta property=\"og:site_name\" content=\"PMG Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T19:39:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\" \/>\n\t<meta property=\"og:image:width\" content=\"759\" \/>\n\t<meta property=\"og:image:height\" content=\"759\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\",\"name\":\"PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\",\"datePublished\":\"2023-06-05T22:18:14+00:00\",\"dateModified\":\"2026-03-19T19:39:20+00:00\",\"description\":\"En este curso, conocer\u00e1s los principales ataques, vulnerabilidades y amenazas cibern\u00e9ticas, desde el Malware hasta la Ingenier\u00eda Social, pasando por Ataques de Aplicaciones, Ataques de Red, Actores de Amenazas y comprendiendo los fundamentos de Protocolos y Redes.\",\"breadcrumb\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage\",\"url\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\",\"contentUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\",\"width\":759,\"height\":759,\"caption\":\"IT Shaped Cybersecurity Vulnerabilities And Threats Foundation T-CVTF\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Curso Online\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#website\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/es\/\",\"name\":\"PMG Academy\",\"description\":\"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis\",\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sandbox2.institutopmg.com\/es\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#organization\",\"name\":\"PMG Academy\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/es\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"width\":6964,\"height\":2938,\"caption\":\"PMG Academy\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation","description":"En este curso, conocer\u00e1s los principales ataques, vulnerabilidades y amenazas cibern\u00e9ticas, desde el Malware hasta la Ingenier\u00eda Social, pasando por Ataques de Aplicaciones, Ataques de Red, Actores de Amenazas y comprendiendo los fundamentos de Protocolos y Redes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","og_locale":"es_ES","og_type":"article","og_title":"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF","og_description":"En este curso, conocer\u00e1s los principales ataques, vulnerabilidades y amenazas cibern\u00e9ticas, desde el Malware hasta la Ingenier\u00eda Social, pasando por Ataques de Aplicaciones, Ataques de Red, Actores de Amenazas y comprendiendo los fundamentos de Protocolos y Redes.","og_url":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","og_site_name":"PMG Academy","article_publisher":"https:\/\/www.facebook.com\/PMG.Academy.Brasil","article_modified_time":"2026-03-19T19:39:20+00:00","og_image":[{"width":759,"height":759,"url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","url":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","name":"PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage"},"thumbnailUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","datePublished":"2023-06-05T22:18:14+00:00","dateModified":"2026-03-19T19:39:20+00:00","description":"En este curso, conocer\u00e1s los principales ataques, vulnerabilidades y amenazas cibern\u00e9ticas, desde el Malware hasta la Ingenier\u00eda Social, pasando por Ataques de Aplicaciones, Ataques de Red, Actores de Amenazas y comprendiendo los fundamentos de Protocolos y Redes.","breadcrumb":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage","url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","contentUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","width":759,"height":759,"caption":"IT Shaped Cybersecurity Vulnerabilities And Threats Foundation T-CVTF"},{"@type":"BreadcrumbList","@id":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Curso Online","item":"https:\/\/sandbox2.institutopmg.com\/es\/curso-online\/"},{"@type":"ListItem","position":2,"name":"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF"}]},{"@type":"WebSite","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#website","url":"https:\/\/sandbox2.institutopmg.com\/es\/","name":"PMG Academy","description":"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis","publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sandbox2.institutopmg.com\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#organization","name":"PMG Academy","url":"https:\/\/sandbox2.institutopmg.com\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","width":6964,"height":2938,"caption":"PMG Academy"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PMG.Academy.Brasil"]}]}},"_links":{"self":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/curso-online\/153197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/curso-online"}],"about":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/types\/curso-online"}],"replies":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/comments?post=153197"}],"version-history":[{"count":2,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/curso-online\/153197\/revisions"}],"predecessor-version":[{"id":153206,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/curso-online\/153197\/revisions\/153206"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/media\/149601"}],"wp:attachment":[{"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/media?parent=153197"}],"wp:term":[{"taxonomy":"_formacao-curso-online","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/es\/wp-json\/wp\/v2\/_formacao-curso-online?post=153197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}