{"id":76,"date":"2021-06-10T11:13:13","date_gmt":"2021-06-10T11:13:13","guid":{"rendered":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/?page_id=76"},"modified":"2022-10-10T16:37:45","modified_gmt":"2022-10-10T16:37:45","slug":"masterclases","status":"publish","type":"page","link":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/masterclases\/","title":{"rendered":"Masterclasses"},"content":{"rendered":"<p>[vc_row][vc_column][vc_column_text]<\/p>\n<h2 style=\"text-align: center;font-weight: 500\">Masterclasses<\/h2>\n<p>[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">PROGRAMACI\u00d3N CU\u00c1NTICA CON QISKIT<\/h4>\n<p>Daniel Esc\u00e1nez Exp\u00f3sito (CryptULL)<br \/>\n21\/11\/2022[\/vc_column_text][vc_empty_space height=\u00bb8px\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">INTRODUCCI\u00d3N A LA COMPUTACI\u00d3N CU\u00c1NTICA (SIN LA F\u00cdSICA)<\/h4>\n<p>Eduardo S\u00e1enz de Cabez\u00f3n (Universidad de La Rioja)<br \/>\n16\/11\/2022 y 17\/11\/2022[\/vc_column_text][vc_empty_space height=\u00bb8px\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">CAPTURE THE FLAG<\/h4>\n<p>Javier Correa Marichal (OSEP | OSCP | OSWP | eWPTXv2 | CPHE)<br \/>\n27\/10\/2022[\/vc_column_text][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639426054539{background-color: #f2f2f2 !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">DNIe 4.0, 16 A\u00d1OS MANTENIENDO TU IDENTIDAD DIGITAL SEGURA<\/h4>\n<p>Rames Sarwat (Telef\u00f3nica)<br \/>\n21\/03\/2022[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639426054539{background-color: #f2f2f2 !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">HACKING \u00c9TICO<\/h4>\n<p>Gonzalo Garc\u00eda Le\u00f3n (Innotec Security)<br \/>\n14\/02\/2022[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639426054539{background-color: #f2f2f2 !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">COMUNICACIONES INAL\u00c1MBRICAS DE CORTO ALCANCE<\/h4>\n<p>Alberto P\u00e9rez Reyes (Telef\u00f3nica)<br \/>\n13\/12\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639426041159{background-color: #f2f2f2 !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">BLOCKCHAIN: SEGURIDAD E IDENTIDAD DIGITAL HACIA EL METAVERSO<\/h4>\n<p>Alberto Jim\u00e9nez Merch\u00e1n (Atlantis Technology)<br \/>\n10\/12\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639426017055{background-color: #f2f2f2 !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">AN\u00c1LISIS DE VULNERABILIDADES Y TOMA DE DECISIONES<\/h4>\n<p>Andr\u00e9s Nacimiento Garc\u00eda (Tarlogic)<br \/>\n3\/12\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639425968702{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">THREAT INTELLIGENCE. COMPARTIENDO INFORMACI\u00d3N SOBRE MALWARE Y AMENAZAS PARA MULTIPLICAR LA CAPACIDAD DEL SOC<\/h4>\n<p>Urko Zurutuza Ortega (U. Mondrag\u00f3n)<br \/>\n29\/11\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639426092623{background-color: #f2f2f2 !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">RASTREO DE HUELLAS DIGITALES<\/h4>\n<p>Carlos Rosa Remedios (GSC)<br \/>\n26\/11\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row css=\u00bb.vc_custom_1639425917500{background-color: #f2f2f2 !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">T\u00c9CNICAS DE RED TEAM<\/h4>\n<p>Leonardo Nve Egea (CSA)<br \/>\n22\/11\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">INFORM\u00c1TICA FORENSE<\/h4>\n<p>Alberto P\u00e9rez Reyes (Telef\u00f3nica)<br \/>\n10\/03\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">HACKING<\/h4>\n<p>Gonzalo Garc\u00eda Le\u00f3n (Innotec Security)<br \/>\n01\/03\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">CONFIGURACIONES PROXY PARA RED TEAM Y BLUE TEAM<\/h4>\n<p>Jaime Guimer\u00e1 (Secuora)<br \/>\n08\/01\/2021[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">VPN<\/h4>\n<p>Rafael Fuentes (Voxia Comunicaciones)<br \/>\n18\/12\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">SEGURIDAD EN LA WEB<\/h4>\n<p>Jennifer Torres (Secuora)<br \/>\n16\/12\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">GESTI\u00d3N DE INCIDENTES EN CLOUD<\/h4>\n<p>H\u00e9ctor Rodr\u00edguez B\u00e1ez (Deloitte)<br \/>\n14\/12\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">LDAP<\/h4>\n<p>Jordi Castell\u00e1 Roca (URV)<br \/>\n10\/12\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">ATAQUES AL RSA<\/h4>\n<p>Jorge Rami\u00f3 Aguirre (UPM)<br \/>\n30\/11\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">CIBERSEGURIDAD E INTELIGENCIA DE DATOS<\/h4>\n<p>Carmen Torrano Gim\u00e9nez (Eleven Paths)<br \/>\n27\/11\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">REDES PRIVADAS VIRTUALES<\/h4>\n<p>Aitor Carrera, CTO (Edosoft Factory)<br \/>\n26\/11\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">HACKING<\/h4>\n<p>Alberto P\u00e9rez Reyes (Bankinter)<br \/>\n25\/11\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">AN\u00c1LISIS DE TR\u00c1FICO Y ATAQUES EN REDES IPv4<\/h4>\n<p>\u00c1lvaro N\u00fa\u00f1ez &#8211; Romero Casado (Eleven Paths)<br \/>\n4\/11\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">AUDITOR\u00cdA WEB<\/h4>\n<p>Jos\u00e9 Luis Mart\u00ednez Mart\u00ednez (UCLM)<br \/>\n21\/10\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">C\u00d3MO INVESTIGAR UN BYPASS DE UNA PROTECCI\u00d3N (UAC) EN SISTEMAS<\/h4>\n<p>Pablo Gonz\u00e1lez P\u00e9rez (Eleven Paths)<br \/>\n14\/10\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">HACKING EN BANCA<\/h4>\n<p>Alberto P\u00e9rez Reyes (Bankinter)<br \/>\n09\/03\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">HACKING PR\u00c1CTICO<\/h4>\n<p>Gonzalo Garc\u00eda Le\u00f3n (Entelgy Innotec Security)<br \/>\n17\/02\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">PROGRAMACI\u00d3N SEGURA<\/h4>\n<p>Francisco Mart\u00edn Fern\u00e1ndez (IBM Research)<br \/>\n12\/02\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">COMPUTACI\u00d3N CU\u00c1NTICA<\/h4>\n<p>Francisco Mart\u00edn Fern\u00e1ndez (IBM Research)<br \/>\n10\/02\/2020[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">SEGURIDAD EN IoT<\/h4>\n<p>Alberto P\u00e9rez Reyes (Bankinter)<br \/>\n16\/12\/2019[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">SEGURIDAD EN INTERNET<\/h4>\n<p>Aitor Carrera (Edosoft Factory)<br \/>\n11\/12\/2019[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">OpenLDAP<\/h4>\n<p>Jordi Castell\u00e1 Roca (URV)<br \/>\n29\/11\/2019[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">HACKING \u00c9TICO<\/h4>\n<p>Deepak Daswani (Telef\u00f3nica)<br \/>\n25\/11\/2019[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">LEGISLACI\u00d3N EN CIBERSEGURIDAD<\/h4>\n<p>Noem\u00ed Brito Izquierdo (Ceca Mag\u00e1n Abogados)<br \/>\n20\/11\/2019[\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][\/vc_column][\/vc_row][vc_row content_placement=\u00bbmiddle\u00bb css=\u00bb.vc_custom_1623323624212{background-color: #efefef !important;}\u00bb][vc_column css=\u00bb.vc_custom_1623323715799{margin-top: 0px !important;padding-top: 0px !important;}\u00bb][vc_column_text]<\/p>\n<h4 style=\"color: #5c068c;font-weight: 600 !important\">ATAQUES A CIFRADOS DE CLAVE SECRETA<\/h4>\n<p>Jorge Rami\u00f3 Aguirre (UPM)<br \/>\n17\/10\/2019[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[vc_row][vc_column][vc_column_text] Masterclasses [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column css=\u00bb.vc_custom_1623323972669{margin-top: 0px !important;margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}\u00bb][vc_empty_space height=\u00bb8px\u00bb][vc_column_text] PROGRAMACI\u00d3N CU\u00c1NTICA CON QISKIT Daniel Esc\u00e1nez Exp\u00f3sito (CryptULL) 21\/11\/2022[\/vc_column_text][vc_empty_space height=\u00bb8px\u00bb][vc_column_text] INTRODUCCI\u00d3N A LA COMPUTACI\u00d3N CU\u00c1NTICA (SIN LA F\u00cdSICA) Eduardo S\u00e1enz de Cabez\u00f3n (Universidad de La Rioja) 16\/11\/2022 y 17\/11\/2022[\/vc_column_text][vc_empty_space height=\u00bb8px\u00bb][vc_column_text] CAPTURE THE FLAG Javier Correa Marichal (OSEP | OSCP | OSWP |&#8230;<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-no-title.php","meta":[],"_links":{"self":[{"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/pages\/76"}],"collection":[{"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/comments?post=76"}],"version-history":[{"count":24,"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/pages\/76\/revisions"}],"predecessor-version":[{"id":195,"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/pages\/76\/revisions\/195"}],"wp:attachment":[{"href":"https:\/\/www.ull.es\/catedras\/catedra-ciberseguridad-binter\/wp-json\/wp\/v2\/media?parent=76"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}