Formación

Seguridad Informática
Electrónica Industrial
Auditor de Ciberseguridad
Certificado Pentester en Hacking Ético PCEH
Certificado Experto Web en Hacking Ético WEHC
Certificado de Iniciación al Hacking Ético FCEH
Pentest Fundamentals: Scanning Networks
The Certfied Ethical Hacker Course
CISPP Certified Information Systems Security Professional ISC2
CNSS Network Security Specialist ICSI International Cybersecurity Institute
Advanced Evimetry Forensic Acquisition
The Evimetry Filesystem Bridge
Autopsy Certificate
Computer Forensics File Formats
CyberArk Certification
Networking fundamentals for security practitioners
CyberArk Privileged Access Security
Fortinet Fortiweb Cloud WAF-as-a-Service
Fortinet Network Security Expert Certification NSE 2
Fortinet Network Security Expert Certification NSE 1
Fortinet Fortigate Cookbook
Tenable.io Vulnerability Management Certificate
Tenable.io Asset Management Certificate
Tenable.io Sensor Deployment Certificate
Tenable.io Container Security Certificate
Tenable.io Web Aplication Scanning Certificate
AZ-104_Microsoft Azure Administrator
AZ-204_Developing Solutions for Azure
AZ-303_Microsoft Azure Architect Technologies
Handling BitLocker and FileValult 2
Evidence Handling
Linux Unhatched
Linux Essentials
Basic Evimetry Deadboot Forensic Acquisition. Wireless Network
Basic Evimetry Deadboot Forensic Acquisition. Wired and Local
Introduccion to Evimetry
Seguridad de red de sistema
Computer Networks
CISCO IT Security Makeover
Intro to Cybersecurity
Cybersecurity Essentials
Introduccion to IT & Cybersecurity
IFCT106PO_Protección de equipos en la red
IFCM002PO Cloud Computing
IFCT114PO Linux
Mobile malware analysis fundamentals
Mobile App Security
Legislación para la economía digital y el emprendimiento
Uso de las redes sociales para la gestión de marca
ADGD067PO Dirección de equipos y Coaching
Técnico mantenimiento Autómatas Programables
General de Seguridad