{"id":115988,"date":"2025-07-07T17:20:39","date_gmt":"2025-07-07T23:20:39","guid":{"rendered":"https:\/\/ucenfotec.ac.cr\/ecommerce\/?post_type=product&#038;p=115988"},"modified":"2026-02-27T07:52:09","modified_gmt":"2026-02-27T13:52:09","slug":"tactical-cyber-intelligence","status":"publish","type":"product","link":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/","title":{"rendered":"Tactical Cyber Intelligence"},"content":{"rendered":"<div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:1216.8px;margin-left: calc(-4% \/ 2 );margin-right: calc(-4% \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-spacing-right-large:1.92%;--awb-margin-bottom-large:0px;--awb-spacing-left-large:1.92%;--awb-width-medium:100%;--awb-spacing-right-medium:1.92%;--awb-spacing-left-medium:1.92%;--awb-width-small:100%;--awb-spacing-right-small:1.92%;--awb-spacing-left-small:1.92%;\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><p>La ciberinteligencia es el proceso sistem\u00e1tico de recopilaci\u00f3n, an\u00e1lisis y difusi\u00f3n de informaci\u00f3n relacionada con amenazas en el ciberespacio, con el objetivo de anticipar riesgos y apoyar la toma de decisiones de seguridad y que se basa en el uso de fuentes abiertas, herramientas especializadas y modelos de amenazas para identificar indicadores de compromiso, patrones de ataque y actores maliciosos.<\/p>\n<p>Las principales tem\u00e1ticas del curso incluyen los fundamentos de la inteligencia de amenazas cibern\u00e9ticas, la recolecci\u00f3n y an\u00e1lisis de indicadores de compromiso (IoC), la atribuci\u00f3n de amenazas y actores maliciosos y la producci\u00f3n de informes de ciberinteligencia.<\/p>\n<p>El curso est\u00e1 dise\u00f1ado por competencias y alineado con el marco global de habilidades y competencias para un mundo digital SFIA, por lo que se propone que los estudiantes logren responder a un nivel de responsabilidad 3, de manera que realizan tareas rutinarias de recopilaci\u00f3n de inteligencia de amenazas.<\/p>\n<hr \/>\n<p><strong>Contenidos<\/strong><\/p>\n<p><span data-sheets-root=\"1\">1. Fundamentos de la inteligencia de amenazas cibern\u00e9ticas.<br \/>\n2. Recolecci\u00f3n y an\u00e1lisis de Indicadores de Compromiso (IoC).<br \/>\n3. Atribuci\u00f3n de amenazas y actores maliciosos.<br \/>\n4. Producci\u00f3n de informes de ciberinteligencia.<\/span><\/p>\n<hr \/>\n<p><strong>Certificado e Insignia Digital<\/strong><\/p>\n<p>Al finalizar el curso el estudiante obtiene un t\u00edtulo e Insignia digital, socializable en tiempo real basada en tecnolog\u00eda blockchain que permite una vista m\u00e1s completa tras el logro alcanzado por el estudiante al poderla vincular con evidencias del resultado del aprendizaje en su perfil profesional. Es una certificaci\u00f3n segura.<\/p>\n<p><a href=\"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence.png\"><img decoding=\"async\" class=\"lazyload aligncenter wp-image-299292 size-full\" src=\"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence.png\" data-orig-src=\"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence.png\" alt=\"CIB-968 Tactical Cyber Intelligence - Universidad CENFOTEC\" width=\"300\" height=\"300\" srcset=\"data:image\/svg+xml,%3Csvg%20xmlns%3D%27http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%27%20width%3D%27300%27%20height%3D%27300%27%20viewBox%3D%270%200%20300%20300%27%3E%3Crect%20width%3D%27300%27%20height%3D%27300%27%20fill-opacity%3D%220%22%2F%3E%3C%2Fsvg%3E\" data-srcset=\"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence-66x66.png 66w, https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence-100x100.png 100w, https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence-150x150.png 150w, https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence-200x200.png 200w, https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2025\/07\/CIB-968-Tactical-Cyber-Intelligence.png 300w\" data-sizes=\"auto\" data-orig-sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<hr \/>\n<\/div><\/div><\/div><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p class=\"ai-optimize-25\"><span data-sheets-root=\"1\">Este curso proporciona una visi\u00f3n t\u00e1ctica de la ciberinteligencia, enfocada en la identificaci\u00f3n, recolecci\u00f3n y an\u00e1lisis de amenazas mediante herramientas OSINT, IoC y marcos especializados como MISP para apoyar decisiones estrat\u00e9gicas.<\/span><\/p>\n","protected":false},"featured_media":53376,"template":"","meta":{"_relevanssi_hide_post":"on","_relevanssi_hide_content":"on","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"WooCommerce Yoast SEO Relevanssi index exclude"},"product_brand":[],"product_cat":[1087,655],"product_tag":[2800,729,2574,2799,2572,2573,755,2801],"class_list":{"0":"post-115988","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-agotado","7":"product_cat-ciberseguridad","8":"product_tag-actores-maliciosos","9":"product_tag-amenazas","10":"product_tag-analisis-tactico","11":"product_tag-atribucion-de-amenazas","12":"product_tag-ciberinteligencia","13":"product_tag-indicadores-de-compromiso","14":"product_tag-inteligencia-de-amenazas","15":"product_tag-produccion-de-informes","17":"first","18":"outofstock","19":"virtual","20":"sold-individually","21":"taxable","22":"product-type-simple"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Tactical Cyber Intelligence<\/title>\n<meta name=\"description\" content=\"Aprenda a identificar, recolectar y analizar amenazas cibern\u00e9ticas usando herramientas OSINT, IoC y marcos como MISP para una defensa estrat\u00e9gica.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tactical Cyber Intelligence\" \/>\n<meta property=\"og:description\" content=\"Aprenda a identificar, recolectar y analizar amenazas cibern\u00e9ticas usando herramientas OSINT, IoC y marcos como MISP para una defensa estrat\u00e9gica.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Cursos - CENFOTEC\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-27T13:52:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2022\/05\/Cybersecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"650\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/\",\"url\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/\",\"name\":\"Tactical Cyber Intelligence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/05\\\/Cybersecurity.jpg\",\"datePublished\":\"2025-07-07T23:20:39+00:00\",\"dateModified\":\"2026-02-27T13:52:09+00:00\",\"description\":\"Aprenda a identificar, recolectar y analizar amenazas cibern\u00e9ticas usando herramientas OSINT, IoC y marcos como MISP para una defensa estrat\u00e9gica.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/05\\\/Cybersecurity.jpg\",\"contentUrl\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2022\\\/05\\\/Cybersecurity.jpg\",\"width\":500,\"height\":650,\"caption\":\"Ciberseguridad - Universidad CENFOTEC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/producto\\\/tactical-cyber-intelligence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Todos los Cursos\",\"item\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/todos-los-cursos\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tactical Cyber Intelligence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/#website\",\"url\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/\",\"name\":\"Cursos - CENFOTEC\",\"description\":\"Tienda en l\u00ednea de cursos ofrecidos por CENFOTEC\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/ucenfotec.ac.cr\\\/ecommerce\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Tactical Cyber Intelligence","description":"Aprenda a identificar, recolectar y analizar amenazas cibern\u00e9ticas usando herramientas OSINT, IoC y marcos como MISP para una defensa estrat\u00e9gica.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/","og_locale":"es_ES","og_type":"article","og_title":"Tactical Cyber Intelligence","og_description":"Aprenda a identificar, recolectar y analizar amenazas cibern\u00e9ticas usando herramientas OSINT, IoC y marcos como MISP para una defensa estrat\u00e9gica.","og_url":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/","og_site_name":"Cursos - CENFOTEC","article_modified_time":"2026-02-27T13:52:09+00:00","og_image":[{"width":500,"height":650,"url":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2022\/05\/Cybersecurity.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/","url":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/","name":"Tactical Cyber Intelligence","isPartOf":{"@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2022\/05\/Cybersecurity.jpg","datePublished":"2025-07-07T23:20:39+00:00","dateModified":"2026-02-27T13:52:09+00:00","description":"Aprenda a identificar, recolectar y analizar amenazas cibern\u00e9ticas usando herramientas OSINT, IoC y marcos como MISP para una defensa estrat\u00e9gica.","breadcrumb":{"@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/#primaryimage","url":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2022\/05\/Cybersecurity.jpg","contentUrl":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-content\/uploads\/sites\/13\/2022\/05\/Cybersecurity.jpg","width":500,"height":650,"caption":"Ciberseguridad - Universidad CENFOTEC"},{"@type":"BreadcrumbList","@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/producto\/tactical-cyber-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/ucenfotec.ac.cr\/ecommerce\/"},{"@type":"ListItem","position":2,"name":"Todos los Cursos","item":"https:\/\/ucenfotec.ac.cr\/ecommerce\/todos-los-cursos\/"},{"@type":"ListItem","position":3,"name":"Tactical Cyber Intelligence"}]},{"@type":"WebSite","@id":"https:\/\/ucenfotec.ac.cr\/ecommerce\/#website","url":"https:\/\/ucenfotec.ac.cr\/ecommerce\/","name":"Cursos - CENFOTEC","description":"Tienda en l\u00ednea de cursos ofrecidos por CENFOTEC","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ucenfotec.ac.cr\/ecommerce\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/product\/115988","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/media\/53376"}],"wp:attachment":[{"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/media?parent=115988"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/product_brand?post=115988"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/product_cat?post=115988"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/ucenfotec.ac.cr\/ecommerce\/wp-json\/wp\/v2\/product_tag?post=115988"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}