{"id":173,"date":"2018-01-16T16:58:37","date_gmt":"2018-01-16T16:58:37","guid":{"rendered":"http:\/\/uctechpro.unican.es\/2018\/?p=173"},"modified":"2018-02-26T09:10:13","modified_gmt":"2018-02-26T09:10:13","slug":"pentesting-deteccion-vulnerabilidades-explotacion","status":"publish","type":"post","link":"https:\/\/uctechpro.unican.es\/2018\/pentesting-deteccion-vulnerabilidades-explotacion\/","title":{"rendered":"Pentesting, detecci\u00f3n de vulnerabilidades y explotaci\u00f3n"},"content":{"rendered":"

– Introducci\u00f3n a Pentesting<\/p>\n

– Tipos de pentesting, metodolog\u00edas.<\/p>\n

– Vulnerabilidades: descripci\u00f3n, clasificaci\u00f3n<\/p>\n

– Descubrimiento de vulnerabilidades. Recopilaci\u00f3n de datos.<\/p>\n

– B\u00fasqueda y Explotaci\u00f3n de vulnerabilidades. Acciones resultantes.<\/p>\n

– Acciones preventivas<\/p>\n

– Pol\u00edticas de Seguridad en las empresas.<\/p>\n","protected":false},"excerpt":{"rendered":"

– Introducci\u00f3n a Pentesting – Tipos de pentesting, metodolog\u00edas. – Vulnerabilidades: descripci\u00f3n, clasificaci\u00f3n – Descubrimiento de vulnerabilidades. Recopilaci\u00f3n de datos. – B\u00fasqueda y Explotaci\u00f3n de vulnerabilidades. Acciones resultantes. – AccionesLeer m\u00e1s sobre Pentesting, detecci\u00f3n de vulnerabilidades y explotaci\u00f3n<\/span>[…]<\/a><\/p>\n","protected":false},"author":1,"featured_media":174,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[18],"tags":[35,36],"class_list":["post-173","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-and-hacking","tag-ciberseguridad","tag-pentesting"],"_links":{"self":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts\/173","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/comments?post=173"}],"version-history":[{"count":4,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts\/173\/revisions"}],"predecessor-version":[{"id":492,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/posts\/173\/revisions\/492"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/media\/174"}],"wp:attachment":[{"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/media?parent=173"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/categories?post=173"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/uctechpro.unican.es\/2018\/wp-json\/wp\/v2\/tags?post=173"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}