{"id":22,"date":"2026-03-24T16:26:25","date_gmt":"2026-03-24T16:26:25","guid":{"rendered":"https:\/\/certificacion.ciberdefensapersonal.com\/?page_id=22"},"modified":"2026-03-24T17:05:54","modified_gmt":"2026-03-24T17:05:54","slug":"capacitacion-estafas-de-correo-phishing","status":"publish","type":"page","link":"https:\/\/certificacion.ciberdefensapersonal.com\/","title":{"rendered":"Capacitacion: Estafas de Correo (Phishing)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"22\" class=\"elementor elementor-22\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-67549f37 e-flex e-con-boxed e-con e-parent\" data-id=\"67549f37\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e388d2 elementor-widget elementor-widget-text-editor\" data-id=\"e388d2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t\t\t\t\t\t\n<p class=\"wp-block-paragraph\">Leccion 1: Introduccion al Phishing. Estaremos creando el contenido aqui.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-05db6ff e-flex e-con-boxed e-con e-parent\" data-id=\"05db6ff\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-0ddd1d5 elementor-widget elementor-widget-button\" data-id=\"0ddd1d5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/certificacion.ciberdefensapersonal.com\/?page_id=25\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Empezar Curso<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Leccion 1: Introduccion al Phishing. Estaremos creando el contenido aqui. Empezar Curso<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-22","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=\/wp\/v2\/pages\/22","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=22"}],"version-history":[{"count":8,"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=\/wp\/v2\/pages\/22\/revisions"}],"predecessor-version":[{"id":33,"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=\/wp\/v2\/pages\/22\/revisions\/33"}],"wp:attachment":[{"href":"https:\/\/certificacion.ciberdefensapersonal.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=22"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}