{"id":75963,"date":"2025-05-27T15:05:34","date_gmt":"2025-05-27T15:05:34","guid":{"rendered":"https:\/\/yachaytech.edu.ec\/?post_type=curso&#038;p=75963"},"modified":"2025-05-27T15:50:15","modified_gmt":"2025-05-27T15:50:15","slug":"cyberseguridad-y-hacking-etico","status":"publish","type":"curso","link":"http:\/\/yachaytech.edu.ec\/en\/curso\/cyberseguridad-y-hacking-etico\/","title":{"rendered":"Cyberseguridad y Hacking \u00c9tico"},"featured_media":0,"parent":0,"template":"","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","inline_featured_image":false},"area-de-curso":[152],"estado-de-vigencia":[],"modalidad":[155],"class_list":["post-75963","curso","type-curso","status-publish","hentry","area-de-curso-ciencias-matematicas-y-computacionales","modalidad-virtual"],"acf":[],"_links":{"self":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/curso\/75963","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/curso"}],"about":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/types\/curso"}],"wp:attachment":[{"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/media?parent=75963"}],"wp:term":[{"taxonomy":"area-de-curso","embeddable":true,"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/area-de-curso?post=75963"},{"taxonomy":"estado-de-vigencia","embeddable":true,"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/estado-de-vigencia?post=75963"},{"taxonomy":"modalidad","embeddable":true,"href":"http:\/\/yachaytech.edu.ec\/en\/wp-json\/wp\/v2\/modalidad?post=75963"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}