{"id":941,"date":"2025-09-01T19:38:50","date_gmt":"2025-09-01T19:38:50","guid":{"rendered":"https:\/\/fmubs.com\/?page_id=941"},"modified":"2025-09-08T15:26:44","modified_gmt":"2025-09-08T15:26:44","slug":"titulo-experto-en-inteligencia-artificial-y-ciberseguridad","status":"publish","type":"page","link":"https:\/\/fmubs.com\/en\/titulo-experto-en-inteligencia-artificial-y-ciberseguridad\/","title":{"rendered":"Expert in artificial intelligence and cybersecurity"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"941\" class=\"elementor elementor-941\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-f74621 e-con-full e-flex e-con e-parent\" data-id=\"f74621\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-415f65d5 e-con-full e-flex e-con e-child\" data-id=\"415f65d5\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-575e25ac elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"575e25ac\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Expert in artificial intelligence and cybersecurity<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-32ad4907 e-con-full e-flex e-con e-child\" data-id=\"32ad4907\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3849454b elementor-widget elementor-widget-heading\" data-id=\"3849454b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">150 hours | Online<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57e3551 elementor-tablet-align-center elementor-invisible elementor-widget elementor-widget-button\" data-id=\"57e3551\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInLeft&quot;}\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-shrink\" href=\"https:\/\/fmubs.com\/en\/incripcion\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Apply now<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4bf06762 e-con-full e-flex e-con e-parent\" data-id=\"4bf06762\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-73567033 e-con-full e-flex e-con e-child\" data-id=\"73567033\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a32f998 elementor-widget elementor-widget-image\" data-id=\"a32f998\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Ciberseguridad.png\" class=\"attachment-large size-large wp-image-744\" alt=\"Ciberseguridad\" srcset=\"https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Ciberseguridad.png 200w, https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Ciberseguridad-150x150.png 150w\" sizes=\"(max-width: 200px) 100vw, 200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-70a14909 elementor-widget elementor-widget-heading\" data-id=\"70a14909\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introduction<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-425f396d elementor-widget elementor-widget-text-editor\" data-id=\"425f396d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"265\" data-end=\"823\">The <strong data-start=\"268\" data-end=\"330\">Expert in artificial intelligence and cybersecurity<\/strong> is designed to train professionals capable of understanding and applying the fundamentals of AI in digital environments, while combining them with the core principles and technologies of cybersecurity.<br data-start=\"527\" data-end=\"530\" \/><br \/>This program provides a comprehensive overview of how artificial intelligence is transforming cybersecurity\u2014from threat detection to the prevention of advanced attacks\u2014equipping students to face the challenges of a hyperconnected and digital world.<\/p><p data-start=\"825\" data-end=\"1038\">It is aimed at professionals, executives, entrepreneurs, or consultants interested in leading or facilitating processes related to AI and cybersecurity. No prior technical knowledge is required. <strong data-start=\"985\" data-end=\"1036\">No prior technical knowledge is required.<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4a414886 e-con-full e-flex e-con e-child\" data-id=\"4a414886\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3d689a93 animated-slow elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"3d689a93\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;0&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tObjective\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\tTo train experts capable of designing, implementing, and managing solutions that integrate artificial intelligence and cybersecurity, with a practical, ethical, and strategic approach, in response to the growing demands of digital transformation and data protection.\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5d3e0880 animated-slow elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"5d3e0880\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tMethodology\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Synchronous and asynchronous online classes.<\/li>\n<li>Case studies and simulations.<\/li>\n<li>Practical workshops and collaborative exercises.<\/li>\n<li>Personalized mentoring for the final project.<\/li>\n\n\n\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f078c2a e-con-full e-flex e-con e-parent\" data-id=\"f078c2a\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0be030d elementor-widget elementor-widget-heading\" data-id=\"0be030d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Curriculum<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-44cc4f44 e-con-full elementor-hidden-mobile e-flex e-con e-parent\" data-id=\"44cc4f44\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-50e56b13 e-con-full e-flex e-con e-child\" data-id=\"50e56b13\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ad4b535 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"ad4b535\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t01\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bef5fcd elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"5bef5fcd\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFundamentals of artificial intelligence\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Introduction to AI: history, evolution, and current state.<\/li>\n<li>Machine learning paradigms.<\/li>\n<li>Neural networks and deep learning.<\/li>\n<li>Natural Language Processing (NLP).<\/li>\n<li>Computer vision and pattern recognition.<\/li>\n<li>Ethics and responsibility in the use of AI.<\/li>\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc1d560 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"fc1d560\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t03\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fe3024c elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"fe3024c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAI Applied to Cybersecurity\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>AI-based intrusion detection and prevention systems.<\/li>\n<li>Predictive threat analysis and anomaly detection.<\/li>\n<li>Machine learning for automated cyber defense.<\/li>\n<li>NLP applications in malware and phishing analysis.<\/li>\n<li>Use of AI in Security Operation Centers (SOCs).<\/li>\n<li>Limitations and vulnerabilities of AI in critical environments.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08bbbe4 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"08bbbe4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t05\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9896898 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"9896898\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLegal, ethical, and strategic aspects\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>AI regulation and legal liability.<\/li>\n<li>Technology risk management and algorithm auditing.<\/li>\n<li>Protection of personal data and algorithmic privacy.<\/li>\n<li>Governments, national defense, and cyber intelligence.<\/li>\n<li>Ethical framework for safe and responsible AI.<\/li>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5a016e6 e-con-full e-flex e-con e-child\" data-id=\"5a016e6\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-876638f elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"876638f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t02\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c103203 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"c103203\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCybersecurity: Principles and technologies\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Fundamentals of information security.<\/li>\n<li>Encryption and applied cryptography.<\/li>\n<li>Network security and protocols.<\/li>\n<li>Authentication, access control, and identity management.<\/li>\n<li>International regulations (GDPR, ISO\/IEC 27001, NIST).<\/li>\n<li>Cloud security and Zero Trust.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6f6dc05 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"6f6dc05\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t04\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-156efd7 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"156efd7\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAdvanced Threats and Security of Intelligent Systems\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Cyberattacks on autonomous systems (adversarial AI).<\/li>\n<li>Deepfakes, malicious bots, and algorithmic manipulation.<\/li>\n<li>Security in IoT devices and embedded systems.<\/li>\n<li>Reverse engineering and forensic analysis with AI tools.<\/li>\n<li>Blockchain and decentralized cybersecurity.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61b13e4 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"61b13e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t06\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7f1c571 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"7f1c571\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFinal expert project\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Proposal and design of a real case or simulation.<\/li>\n<li>Implementation of a solution combining AI + Cybersecurity.<\/li>\n<li>Presentation, defense, and critical evaluation.<\/li>\n<li>Recommendations for implementation or real scalability.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb251ce e-con-full elementor-hidden-desktop elementor-hidden-tablet e-flex e-con e-parent\" data-id=\"cb251ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-9cfa277 e-con-full e-flex e-con e-child\" data-id=\"9cfa277\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3a4946d elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"3a4946d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t01\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9720dc6 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"9720dc6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFundamentals of artificial intelligence\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Introduction to AI: history, evolution, and current state.<\/li>\n<li>Machine learning paradigms.<\/li>\n<li>Neural networks and deep learning.<\/li>\n<li>Natural Language Processing (NLP).<\/li>\n<li>Computer vision and pattern recognition.<\/li>\n<li>Ethics and responsibility in the use of AI.<\/li>\n\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2b6abb6 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"2b6abb6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t02\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-661e59c elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"661e59c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tCybersecurity: Principles and technologies\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Fundamentals of information security.<\/li>\n<li>Encryption and applied cryptography.<\/li>\n<li>Network security and protocols.<\/li>\n<li>Authentication, access control, and identity management.<\/li>\n<li>International regulations (GDPR, ISO\/IEC 27001, NIST).<\/li>\n<li>Cloud security and Zero Trust.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-543065f elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"543065f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t03\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0e750c elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"a0e750c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAI Applied to Cybersecurity\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>AI-based intrusion detection and prevention systems.<\/li>\n<li>Predictive threat analysis and anomaly detection.<\/li>\n<li>Machine learning for automated cyber defense.<\/li>\n<li>NLP applications in malware and phishing analysis.<\/li>\n<li>Use of AI in Security Operation Centers (SOCs).<\/li>\n<li>Limitations and vulnerabilities of AI in critical environments.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83e4cb9 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"83e4cb9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t04\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-987e02f elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"987e02f\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tAdvanced Threats and Security of Intelligent Systems\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Cyberattacks on autonomous systems (adversarial AI).<\/li>\n<li>Deepfakes, malicious bots, and algorithmic manipulation.<\/li>\n<li>Security in IoT devices and embedded systems.<\/li>\n<li>Reverse engineering and forensic analysis with AI tools.<\/li>\n<li>Blockchain and decentralized cybersecurity.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-13cbd9c elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"13cbd9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t05\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3209930 elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"3209930\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tLegal, ethical, and strategic aspects\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>AI regulation and legal liability.<\/li>\n<li>Technology risk management and algorithm auditing.<\/li>\n<li>Protection of personal data and algorithmic privacy.<\/li>\n<li>Governments, national defense, and cyber intelligence.<\/li>\n<li>Ethical framework for safe and responsible AI.<\/li>\n\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-29bfca6 elementor-widget__width-initial animated-slow elementor-widget-divider--view-line_text elementor-widget-divider--element-align-left elementor-widget-mobile__width-inherit elementor-invisible elementor-widget elementor-widget-divider\" data-id=\"29bfca6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeIn&quot;,&quot;_animation_delay&quot;:&quot;200&quot;}\" data-widget_type=\"divider.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t\t<span class=\"elementor-divider__text elementor-divider__element\">\n\t\t\t\t06\t\t\t\t<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dfb318d elementor-invisible elementor-widget elementor-widget-icon-box\" data-id=\"dfb318d\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"icon-box.default\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-box-wrapper\">\n\n\t\t\t\n\t\t\t\t\t\t<div class=\"elementor-icon-box-content\">\n\n\t\t\t\t\t\t\t\t\t<h3 class=\"elementor-icon-box-title\">\n\t\t\t\t\t\t<span  >\n\t\t\t\t\t\t\tFinal expert project\t\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/h3>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<p class=\"elementor-icon-box-description\">\n\t\t\t\t\t\t<li>Proposal and design of a real case or simulation.<\/li>\n<li>Implementation of a solution combining AI + Cybersecurity.<\/li>\n<li>Presentation, defense, and critical evaluation.<\/li>\n<li>Recommendations for implementation or real scalability.<\/li>\t\t\t\t\t<\/p>\n\t\t\t\t\n\t\t\t<\/div>\n\t\t\t\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-7d45451f e-con-full e-flex e-con e-parent\" data-id=\"7d45451f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t<div class=\"elementor-element elementor-element-1aa7e6b2 e-con-full e-flex e-con e-child\" data-id=\"1aa7e6b2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-32d3cfc5 elementor-widget elementor-widget-heading\" data-id=\"32d3cfc5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Participant profile<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e84659f elementor-widget elementor-widget-text-editor\" data-id=\"1e84659f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t<p data-start=\"1833\" data-end=\"1865\">This program is aimed at:<\/p><ul data-start=\"1866\" data-end=\"2049\"><li data-start=\"1866\" data-end=\"1925\"><p data-start=\"1868\" data-end=\"1925\">Professionals, executives, entrepreneurs, or consultants.<\/p><\/li><li data-start=\"1926\" data-end=\"1997\"><p data-start=\"1928\" data-end=\"1997\">ndividuals interested in leading or facilitating AI and Cybersecurity processes.<\/p><\/li><\/ul><p>No prior technical knowledge is required.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-61ff3ece elementor-widget__width-initial elementor-widget-tablet__width-inherit elementor-widget elementor-widget-image\" data-id=\"61ff3ece\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/perfil_ciberseguridad-1024x683.jpg\" class=\"attachment-large size-large wp-image-958\" alt=\"perfil_ciberseguridad\" srcset=\"https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/perfil_ciberseguridad-1024x683.jpg 1024w, https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/perfil_ciberseguridad-300x200.jpg 300w, https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/perfil_ciberseguridad-768x512.jpg 768w, https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/perfil_ciberseguridad-1536x1025.jpg 1536w, https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/perfil_ciberseguridad-2048x1366.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo experto en inteligencia artificial y ciberseguridad 150 horas | Online Inscribirse Introducci\u00f3n El T\u00edtulo Experto en Inteligencia Artificial y [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1414,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"","ast-site-content-layout":"full-width-container","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"class_list":["post-941","page","type-page","status-publish","has-post-thumbnail","hentry"],"aioseo_notices":[],"_hostinger_reach_plugin_has_subscription_block":false,"_hostinger_reach_plugin_is_elementor":false,"uagb_featured_image_src":{"full":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad.jpg",1280,720,false],"thumbnail":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad-150x150.jpg",150,150,true],"medium":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad-300x169.jpg",300,169,true],"medium_large":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad-768x432.jpg",768,432,true],"large":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad-1024x576.jpg",1024,576,true],"1536x1536":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad.jpg",1280,720,false],"2048x2048":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad.jpg",1280,720,false],"trp-custom-language-flag":["https:\/\/fmubs.com\/wp-content\/uploads\/2025\/09\/Destacada_ciberseguirdad.jpg",18,10,false]},"uagb_author_info":{"display_name":"ledgitweb3@gmail.com","author_link":"https:\/\/fmubs.com\/en\/author\/ledgitweb3gmail-com\/"},"uagb_comment_info":0,"uagb_excerpt":"T\u00edtulo experto en inteligencia artificial y ciberseguridad 150 horas | Online Inscribirse Introducci\u00f3n El T\u00edtulo Experto en Inteligencia Artificial y [&hellip;]","_links":{"self":[{"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/pages\/941","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/comments?post=941"}],"version-history":[{"count":31,"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/pages\/941\/revisions"}],"predecessor-version":[{"id":1508,"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/pages\/941\/revisions\/1508"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/media\/1414"}],"wp:attachment":[{"href":"https:\/\/fmubs.com\/en\/wp-json\/wp\/v2\/media?parent=941"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}