{"id":37,"date":"2019-01-23T21:50:23","date_gmt":"2019-01-23T21:50:23","guid":{"rendered":"http:\/\/kravmagahacking.com\/?page_id=21"},"modified":"2020-05-31T10:58:05","modified_gmt":"2020-05-31T10:58:05","slug":"training","status":"publish","type":"page","link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/","title":{"rendered":"Training"},"content":{"rendered":"\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-731\" srcset=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Security Awareness <\/h5>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/sever-3100049_1280-1024x745.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"655\" src=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/sever-3100049_1280-1024x745.jpg?resize=900%2C655\" alt=\"\" class=\"wp-image-732\" srcset=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/sever-3100049_1280.jpg?resize=1024%2C745&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/sever-3100049_1280.jpg?resize=300%2C218&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/sever-3100049_1280.jpg?resize=768%2C559&amp;ssl=1 768w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/sever-3100049_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Networking Basics<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/linux-1962898_1280-1024x574.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"504\" src=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/linux-1962898_1280-1024x574.jpg?resize=900%2C504\" alt=\"\" class=\"wp-image-733\" srcset=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/linux-1962898_1280.jpg?resize=1024%2C574&amp;ssl=1 1024w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/linux-1962898_1280.jpg?resize=300%2C168&amp;ssl=1 300w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/linux-1962898_1280.jpg?resize=768%2C431&amp;ssl=1 768w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/linux-1962898_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Linux Basics<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/code-820275_1280-1024x682.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/code-820275_1280-1024x682.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-734\" srcset=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/code-820275_1280.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/code-820275_1280.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/code-820275_1280.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/code-820275_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Python Basics<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-2450155_1280-1024x682.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-2450155_1280-1024x682.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-735\" srcset=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-2450155_1280.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-2450155_1280.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-2450155_1280.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-2450155_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Malware Analysis<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-in-the-office-1967479_1280-1024x683.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"600\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-in-the-office-1967479_1280-1024x683.jpg?resize=900%2C600\" alt=\"\" class=\"wp-image-737\" srcset=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-in-the-office-1967479_1280.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-in-the-office-1967479_1280.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-in-the-office-1967479_1280.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/laptop-in-the-office-1967479_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Secure Software Development<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/hacker-1569744_1280-1024x681.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/hacker-1569744_1280-1024x681.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-738\" srcset=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/hacker-1569744_1280.jpg?resize=1024%2C681&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/hacker-1569744_1280.jpg?resize=300%2C199&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/hacker-1569744_1280.jpg?resize=768%2C511&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/hacker-1569744_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Hacking Web Apps<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920-1024x683.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"600\" src=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920-1024x683.jpg?resize=900%2C600\" alt=\"\" class=\"wp-image-740\" srcset=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920.jpg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/satellite-dishes-195128_1920.jpg?w=1800&amp;ssl=1 1800w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Hacking WiFi<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/dirt-88534_1280-2-1024x670.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"589\" src=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/dirt-88534_1280-2-1024x670.jpg?resize=900%2C589\" alt=\"\" class=\"wp-image-741\" srcset=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/dirt-88534_1280-2.jpg?resize=1024%2C670&amp;ssl=1 1024w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/dirt-88534_1280-2.jpg?resize=300%2C196&amp;ssl=1 300w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/dirt-88534_1280-2.jpg?resize=768%2C503&amp;ssl=1 768w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/dirt-88534_1280-2.jpg?resize=560%2C367&amp;ssl=1 560w, https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/dirt-88534_1280-2.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Digital Forensics &amp; Incident Response<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/control-center-1054460_1280-1-1024x867.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"762\" src=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/control-center-1054460_1280-1-1024x867.jpg?resize=900%2C762\" alt=\"\" class=\"wp-image-742\" srcset=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/control-center-1054460_1280-1.jpg?resize=1024%2C867&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/control-center-1054460_1280-1.jpg?resize=300%2C254&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/control-center-1054460_1280-1.jpg?resize=768%2C650&amp;ssl=1 768w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/control-center-1054460_1280-1.jpg?w=1134&amp;ssl=1 1134w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Red Team Management<\/h5>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/archive-1850170_1280-1-1024x682.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/archive-1850170_1280-1-1024x682.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-743\" srcset=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/archive-1850170_1280-1.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/archive-1850170_1280-1.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/archive-1850170_1280-1.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/archive-1850170_1280-1.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Threat Hunting<\/h5>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/technical-2355871_1280-1024x682.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"599\" src=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/technical-2355871_1280-1024x682.jpg?resize=900%2C599\" alt=\"\" class=\"wp-image-744\" srcset=\"https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/technical-2355871_1280.jpg?resize=1024%2C682&amp;ssl=1 1024w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/technical-2355871_1280.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/technical-2355871_1280.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i1.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/technical-2355871_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Python Advanced for Cybersecurity<\/h5>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile is-image-fill\"><figure class=\"wp-block-media-text__media\" style=\"background-image:url(http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/robot-2301646_1280-1024x576.jpg);background-position:50% 50%\"><img loading=\"lazy\" width=\"900\" height=\"506\" src=\"https:\/\/i2.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/robot-2301646_1280-1024x576.jpg?resize=900%2C506\" alt=\"\" class=\"wp-image-745\" srcset=\"https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/robot-2301646_1280.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/robot-2301646_1280.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/robot-2301646_1280.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/robot-2301646_1280.jpg?w=1280&amp;ssl=1 1280w\" sizes=\"(max-width: 900px) 100vw, 900px\" data-recalc-dims=\"1\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<h5 class=\"has-vivid-red-color has-text-color\">Active Defense (military only)<\/h5>\n\n\n\n<p><\/p>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n","protected":false},"excerpt":{"rendered":"<p>Networking Basics Linux Basics Python Basics Malware Analysis Secure Software Development Hacking Web Apps Hacking WiFi Digital Forensics &amp; Incident Response Red Team Management Threat Hunting Python Advanced for Cybersecurity Active Defense (military only)<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":4,"comment_status":"closed","ping_status":"closed","template":"","meta":{"spay_email":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Training - KINAITECH | Ciberseguridad<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Training - KINAITECH | Ciberseguridad\" \/>\n<meta property=\"og:description\" content=\"Networking Basics Linux Basics Python Basics Malware Analysis Secure Software Development Hacking Web Apps Hacking WiFi Digital Forensics &amp; Incident Response Red Team Management Threat Hunting Python Advanced for Cybersecurity Active Defense (military only)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\" \/>\n<meta property=\"og:site_name\" content=\"KINAITECH | Ciberseguridad\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-31T10:58:05+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\",\"name\":\"KINAITECH | Ciberseguridad\",\"description\":\"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#primaryimage\",\"inLanguage\":\"es\",\"url\":\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg\",\"contentUrl\":\"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#webpage\",\"url\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\",\"name\":\"Training - KINAITECH | Ciberseguridad\",\"isPartOf\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#primaryimage\"},\"datePublished\":\"2019-01-23T21:50:23+00:00\",\"dateModified\":\"2020-05-31T10:58:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Training\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Training - KINAITECH | Ciberseguridad","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/","og_locale":"es_ES","og_type":"article","og_title":"Training - KINAITECH | Ciberseguridad","og_description":"Networking Basics Linux Basics Python Basics Malware Analysis Secure Software Development Hacking Web Apps Hacking WiFi Digital Forensics &amp; Incident Response Red Team Management Threat Hunting Python Advanced for Cybersecurity Active Defense (military only)","og_url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/","og_site_name":"KINAITECH | Ciberseguridad","article_modified_time":"2020-05-31T10:58:05+00:00","og_image":[{"url":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/","name":"KINAITECH | Ciberseguridad","description":"Ethical Hacking, Application Security and Trainings through a partner networks across Latin America and Caribbean","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"},{"@type":"ImageObject","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#primaryimage","inLanguage":"es","url":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg","contentUrl":"http:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-content\/uploads\/2020\/05\/gear-2291916_1280-1024x682.jpg"},{"@type":"WebPage","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#webpage","url":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/","name":"Training - KINAITECH | Ciberseguridad","isPartOf":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#primaryimage"},"datePublished":"2019-01-23T21:50:23+00:00","dateModified":"2020-05-31T10:58:05+00:00","breadcrumb":{"@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/training\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/"},{"@type":"ListItem","position":2,"name":"Training"}]}]}},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false},"uagb_author_info":{"display_name":"Mateo Martinez","author_link":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/author\/admin\/"},"uagb_comment_info":0,"uagb_excerpt":"Networking Basics Linux Basics Python Basics Malware Analysis Secure Software Development Hacking Web Apps Hacking WiFi Digital Forensics &amp; Incident Response Red Team Management Threat Hunting Python Advanced for Cybersecurity Active Defense (military only)","_links":{"self":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/37"}],"collection":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":15,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":749,"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/pages\/37\/revisions\/749"}],"wp:attachment":[{"href":"https:\/\/www.kinaitech.com.ar\/ciberseguridad\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}