{"id":116,"date":"2024-06-11T01:11:37","date_gmt":"2024-06-11T01:11:37","guid":{"rendered":"https:\/\/catero.esai.sv\/?page_id=116"},"modified":"2024-06-30T02:52:20","modified_gmt":"2024-06-30T02:52:20","slug":"de-ciberseguridad","status":"publish","type":"page","link":"https:\/\/catero.esai.sv\/index.php\/de-ciberseguridad\/","title":{"rendered":"De Ciberseguridad"},"content":{"rendered":"\n<div class=\"wp-block-stackable-heading alignfull stk-block-heading stk-block-heading--v2 stk-block stk-ada1ee0 stk-block-background stk--has-background-overlay\" id=\"directorado-de-ciberseguridad\" data-block-id=\"ada1ee0\"><style>.stk-ada1ee0{background-color:radial-gradient(circle 248px at center,#16d9e3 0%,#30c7ec 47%,#46aef7 100%) !important;min-height:200px !important;align-items:flex-end !important;display:flex !important}.stk-ada1ee0:before{background-image:radial-gradient(circle 248px at center,#16d9e3 0%,#30c7ec 47%,#46aef7 100%) !important}<\/style><h1 class=\"stk-block-heading__text has-text-align-center\">Directorado de Ciberseguridad<\/h1><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns alignfull stk-block-columns stk-block stk-69426c1\" data-block-id=\"69426c1\"><style>.stk-69426c1{padding-top:80px !important;padding-bottom:80px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-69426c1-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-c92eebc\" data-v=\"4\" data-block-id=\"c92eebc\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-c92eebc-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-c92eebc-inner-blocks\">\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-ffc4bfc\" data-block-id=\"ffc4bfc\"><style>.stk-ffc4bfc{margin-bottom:48px !important}.stk-ffc4bfc .stk-block-text__text{font-size:20px !important;color:#000000 !important}@media screen and (max-width:1023px){.stk-ffc4bfc .stk-block-text__text{font-size:20px !important}}<\/style><p class=\"stk-block-text__text has-text-color has-text-align-center\">El Directorado se enfoca en la interrelaci\u00f3n entre inform\u00e1tica y telem\u00e1tica, abarcando aspectos cr\u00edticos como software (bases de datos, metadatos, archivos), hardware, redes de computadoras y el uso global del Internet. Este \u00e1mbito incluye el an\u00e1lisis de las amenazas de ciberseguridad que enfrentan las organizaciones, destacando los riesgos asociados a la informaci\u00f3n confidencial y el peligro que representa su posible exposici\u00f3n a personas no autorizadas. Adem\u00e1s, se presentan los avances en el modelo Web 3.0, t\u00e9cnicas de Inteligencia Artificial (IA) e innovaciones tecnol\u00f3gicas que permiten emular y mejorar la obtenci\u00f3n de conocimiento.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-40a0c85\" data-block-id=\"40a0c85\"><style>.stk-40a0c85-column{--stk-column-gap:10px !important}<\/style><div class=\"stk-row stk-inner-blocks stk-block-content stk-content-align stk-40a0c85-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-f1604e2\" data-v=\"4\" data-block-id=\"f1604e2\"><style>.stk-f1604e2-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important}.stk-f1604e2{box-shadow:0px 70px 90px -20px #4849794d !important}@media screen and (min-width:768px) and (max-width:1023px){.stk-f1604e2{flex:var(--stk-flex-grow,1) 1 calc(50% - var(--stk-column-gap,0px) * 1 \/ 2 ) !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-f1604e2-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-f1604e2-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-2627ea6 is-style-default\" data-v=\"2\" data-block-id=\"2627ea6\"><style>.stk-2627ea6{box-shadow:none !important}<\/style><div class=\"stk--no-padding stk-container stk-2627ea6-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-488\" src=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mati-5952738-scaled.jpg\" width=\"1709\" height=\"2560\" srcset=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mati-5952738-scaled.jpg 1709w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mati-5952738-200x300.jpg 200w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mati-5952738-684x1024.jpg 684w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mati-5952738-768x1150.jpg 768w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mati-5952738-1025x1536.jpg 1025w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mati-5952738-1367x2048.jpg 1367w\" sizes=\"auto, (max-width: 1709px) 100vw, 1709px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-2627ea6-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-455e634\" id=\"font-mstmutation-1-msttexthash-713492-msthash-4482-font-mstmutation-1-msttexthash-1202591-msthash-4395-tecnicas-basicas-de-hacking-etico-font-font\" data-block-id=\"455e634\"><style>.stk-455e634{margin-bottom:117px !important}.stk-455e634 .stk-block-heading__text{color:#000000 !important}<\/style><h3 class=\"stk-block-heading__text has-text-color has-text-align-center\"><font _mstmutation=\"1\" _msttexthash=\"713492\" _msthash=\"4482\"><font _mstmutation=\"1\" _msttexthash=\"1202591\" _msthash=\"4395\">T\u00c9CNICAS BASICAS DE HACKING \u00c9TICO<\/font><\/font><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-7cb79eb\" data-block-id=\"7cb79eb\"><style>.stk-7cb79eb{margin-bottom:75px !important}<\/style><p class=\"stk-block-text__text has-text-align-justify\">En este curso, los estudiantes aprenden los fundamentos del hacking \u00e9tico, incluyendo m\u00e9todos de exploraci\u00f3n de vulnerabilidades, t\u00e9cnicas de penetraci\u00f3n y an\u00e1lisis forense digital b\u00e1sico para evaluar y fortalecer la seguridad de sistemas inform\u00e1ticos.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-875dbd5\" data-block-id=\"875dbd5\"><div class=\"stk-row stk-inner-blocks has-text-align-center stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button has-text-align-center stk-block stk-6c0aae5\" data-block-id=\"6c0aae5\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/learning.esai.sv\/\"><span class=\"stk-button__inner-text\">Comprar<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-269cdf0\" data-v=\"4\" data-block-id=\"269cdf0\"><style>.stk-269cdf0-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important}.stk-269cdf0{box-shadow:0px 70px 90px -20px #4849794d !important}@media screen and (min-width:768px) and (max-width:1023px){.stk-269cdf0{flex:var(--stk-flex-grow,1) 1 calc(50% - var(--stk-column-gap,0px) * 1 \/ 2 ) !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-269cdf0-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-269cdf0-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-e55a407 is-style-default\" data-v=\"2\" data-block-id=\"e55a407\"><style>.stk-e55a407{box-shadow:none !important}<\/style><div class=\"stk--no-padding stk-container stk-e55a407-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-489\" src=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mikhail-nilov-6963944-scaled.jpg\" width=\"2560\" height=\"1735\" srcset=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mikhail-nilov-6963944-scaled.jpg 2560w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mikhail-nilov-6963944-300x203.jpg 300w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mikhail-nilov-6963944-1024x694.jpg 1024w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mikhail-nilov-6963944-768x520.jpg 768w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mikhail-nilov-6963944-1536x1041.jpg 1536w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-mikhail-nilov-6963944-2048x1388.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-e55a407-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-2985007\" id=\"font-mstmutation-1-msttexthash-713492-msthash-4482-font-mstmutation-1-msttexthash-713492-msthash-4482-font-mstmutation-1-msttexthash-1202591-msthash-4395-tecnicas-avanzadas-de-hacking-etico-font-font-font\" data-block-id=\"2985007\"><style>.stk-2985007{margin-bottom:69px !important}.stk-2985007 .stk-block-heading__text{color:#000000 !important}<\/style><h3 class=\"stk-block-heading__text has-text-color has-text-align-center\"><font _mstmutation=\"1\" _msttexthash=\"713492\" _msthash=\"4482\"><font _mstmutation=\"1\" _msttexthash=\"713492\" _msthash=\"4482\"><font _mstmutation=\"1\" _msttexthash=\"1202591\" _msthash=\"4395\">T\u00c9CNICAS AVANZADAS DE HACKING \u00c9TICO<\/font><\/font><\/font><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-9ce5e28\" data-block-id=\"9ce5e28\"><style>.stk-9ce5e28{margin-bottom:79px !important}<\/style><p class=\"stk-block-text__text has-text-align-justify\">Dise\u00f1ado para profesionales con experiencia en seguridad, este curso profundiza en t\u00e9cnicas avanzadas de hacking \u00e9tico, como explotaci\u00f3n de vulnerabilidades complejas, an\u00e1lisis de malware, ingenier\u00eda inversa y defensa contra t\u00e9cnicas de evasi\u00f3n.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-17afa8d\" data-block-id=\"17afa8d\"><div class=\"stk-row stk-inner-blocks has-text-align-center stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button has-text-align-center stk-block stk-3fbfaad\" data-block-id=\"3fbfaad\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/learning.esai.sv\/\"><span class=\"stk-button__inner-text\">Comprar<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-a8b37ae\" data-v=\"4\" data-block-id=\"a8b37ae\"><style>.stk-a8b37ae-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important}.stk-a8b37ae{box-shadow:0px 70px 90px -20px #4849794d !important}@media screen and (min-width:768px) and (max-width:1023px){.stk-a8b37ae{flex:var(--stk-flex-grow,1) 1 calc(100% - var(--stk-column-gap,0px) * 0 \/ 1 ) !important}}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-a8b37ae-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-a8b37ae-inner-blocks\">\n<div class=\"wp-block-stackable-card stk-block-card stk-block stk-295c105 is-style-default\" data-v=\"2\" data-block-id=\"295c105\"><style>.stk-295c105{box-shadow:none !important}.stk-295c105 .stk-block-card__content{padding-top:32px !important;padding-right:32px !important;padding-bottom:32px !important;padding-left:32px !important}<\/style><div class=\"stk--no-padding stk-container stk-295c105-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-490\" src=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-markusspiske-177598-scaled.jpg\" width=\"2560\" height=\"1707\" srcset=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-markusspiske-177598-scaled.jpg 2560w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-markusspiske-177598-300x200.jpg 300w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-markusspiske-177598-1024x683.jpg 1024w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-markusspiske-177598-768x512.jpg 768w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-markusspiske-177598-1536x1024.jpg 1536w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-markusspiske-177598-2048x1365.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-295c105-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-01279af\" id=\"font-mstmutation-1-msttexthash-1232972-msthash-4563-inteligencia-artificial-para-la-ciberseguridad-font\" data-block-id=\"01279af\"><style>.stk-01279af .stk-block-heading__text{color:#000000 !important}<\/style><h3 class=\"stk-block-heading__text has-text-color has-text-align-center\"><font _mstmutation=\"1\" _msttexthash=\"1232972\" _msthash=\"4563\">INTELIGENCIA ARTIFICIAL PARA LA CIBERSEGURIDAD<\/font><\/h3><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-3e5747b\" data-block-id=\"3e5747b\"><style>.stk-3e5747b{margin-bottom:105px !important}<\/style><p class=\"stk-block-text__text has-text-align-justify\">Este curso explora c\u00f3mo la inteligencia artificial se aplica a la ciberseguridad, cubriendo t\u00e9cnicas como el aprendizaje autom\u00e1tico y el procesamiento de lenguaje natural para detectar y prevenir amenazas cibern\u00e9ticas avanzadas.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-d53cc2d\" data-block-id=\"d53cc2d\"><div class=\"stk-row stk-inner-blocks has-text-align-center stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-aefeb12\" data-block-id=\"aefeb12\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/learning.esai.sv\/\"><span class=\"stk-button__inner-text\">Comprar<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-columns stk-block-columns stk-block stk-f90c29d\" data-block-id=\"f90c29d\"><div class=\"stk-row stk-inner-blocks has-text-align-left stk-block-content stk-content-align stk-f90c29d-column\">\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-95ffd02\" data-v=\"4\" data-block-id=\"95ffd02\"><style>.stk-95ffd02-container{margin-top:0px !important;margin-right:0px !important;margin-bottom:0px !important;margin-left:0px !important}.stk-95ffd02{box-shadow:0px 70px 90px -20px #4849794d !important}<\/style><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-95ffd02-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-95ffd02-inner-blocks\">\n<div class=\"wp-block-stackable-card aligncenter stk-block-card stk-block stk-ac2bc6e is-style-default\" data-v=\"2\" data-block-id=\"ac2bc6e\"><div class=\"stk--no-padding stk-container stk-ac2bc6e-container stk-hover-parent\"><figure class=\"stk-block-card__image stk-img-wrapper stk-image--shape-stretch\"><img loading=\"lazy\" decoding=\"async\" class=\"stk-img wp-image-491\" src=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-divinetechygirl-1181263-scaled.jpg\" width=\"2560\" height=\"1709\" srcset=\"https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-divinetechygirl-1181263-scaled.jpg 2560w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-divinetechygirl-1181263-300x200.jpg 300w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-divinetechygirl-1181263-1024x684.jpg 1024w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-divinetechygirl-1181263-768x513.jpg 768w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-divinetechygirl-1181263-1536x1025.jpg 1536w, https:\/\/catero.esai.sv\/wp-content\/uploads\/2024\/06\/pexels-divinetechygirl-1181263-2048x1367.jpg 2048w\" sizes=\"auto, (max-width: 2560px) 100vw, 2560px\" \/><\/figure><div class=\"stk-container-padding stk-block-card__content\"><div class=\"stk-block-content stk-inner-blocks stk-ac2bc6e-inner-blocks\">\n<div class=\"wp-block-stackable-heading stk-block-heading stk-block-heading--v2 stk-block stk-8d77614\" id=\"gestion-de-riesgos-y-cumplimiento-en-ciberseguridad\" data-block-id=\"8d77614\"><style>.stk-8d77614 .stk-block-heading__text{color:#000000 !important}<\/style><h2 class=\"stk-block-heading__text has-text-color has-text-align-center\">GESTI\u00d3N DE RIESGOS Y CUMPLIMIENTO EN CIBERSEGURIDAD<\/h2><\/div>\n\n\n\n<div class=\"wp-block-stackable-text stk-block-text stk-block stk-b84730d\" data-block-id=\"b84730d\"><p class=\"stk-block-text__text has-text-align-justify\">Este curso se centra en la gesti\u00f3n estrat\u00e9gica de riesgos y en el cumplimiento de normativas y est\u00e1ndares de seguridad cibern\u00e9tica. Los temas incluyen evaluaci\u00f3n de riesgos, planificaci\u00f3n de continuidad del negocio, auditor\u00eda de seguridad y cumplimiento legal en entornos digitales.<\/p><\/div>\n\n\n\n<div class=\"wp-block-stackable-button-group stk-block-button-group stk-block stk-383cf9c\" data-block-id=\"383cf9c\"><div class=\"stk-row stk-inner-blocks has-text-align-center stk-block-content stk-button-group\">\n<div class=\"wp-block-stackable-button stk-block-button stk-block stk-715da89\" data-block-id=\"715da89\"><a class=\"stk-link stk-button stk--hover-effect-darken\" href=\"https:\/\/learning.esai.sv\/\"><span class=\"stk-button__inner-text\">Comprar<\/span><\/a><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div>\n<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-1e7f737\" data-v=\"4\" data-block-id=\"1e7f737\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-1e7f737-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-1e7f737-inner-blocks\"><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-stackable-column stk-block-column stk-column stk-block stk-5eff703\" data-v=\"4\" data-block-id=\"5eff703\"><div class=\"stk-column-wrapper stk-block-column__content stk-container stk-5eff703-container stk--no-background stk--no-padding\"><div class=\"stk-block-content stk-inner-blocks stk-5eff703-inner-blocks\"><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div><\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Directorado de Ciberseguridad El Directorado se enfoca en la interrelaci\u00f3n entre inform\u00e1tica y telem\u00e1tica, abarcando aspectos cr\u00edticos como software (bases de datos, metadatos, archivos), hardware, redes de computadoras y el uso global del Internet. Este \u00e1mbito incluye el an\u00e1lisis de las amenazas de ciberseguridad que enfrentan las organizaciones, destacando los riesgos asociados a la informaci\u00f3n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-116","page","type-page","status-publish","hentry"],"blocksy_meta":{"has_hero_section":"disabled","vertical_spacing_source":"custom","content_area_spacing":"none","styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/pages\/116","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/comments?post=116"}],"version-history":[{"count":11,"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/pages\/116\/revisions"}],"predecessor-version":[{"id":499,"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/pages\/116\/revisions\/499"}],"wp:attachment":[{"href":"https:\/\/catero.esai.sv\/index.php\/wp-json\/wp\/v2\/media?parent=116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}