{"id":19800,"date":"2015-08-24T15:53:04","date_gmt":"2015-08-24T15:53:04","guid":{"rendered":"http:\/\/utel.mx\/blog\/?p=19800"},"modified":"2023-03-10T17:07:09","modified_gmt":"2023-03-10T17:07:09","slug":"que-es-el-ethical-hacking","status":"publish","type":"post","link":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/","title":{"rendered":"\u00bfQu\u00e9 es el ethical hacking?"},"content":{"rendered":"<h2><span style=\"color: #000000;\">Hoy en d\u00eda, existen muchos sistemas que contienen informaci\u00f3n valiosa para las compa\u00f1\u00edas. Las empresas guardan informaci\u00f3n de sus finanzas o datos sensibles de los clientes en computadoras que est\u00e1n generalmente conectadas a la red.<\/span><\/h2>\n<p><span style=\"color: #000000;\">Los expertos en seguridad inform\u00e1tica aplican varios m\u00e9todos y t\u00e9cnicas para proteger a dichos sistemas de cualquier ataque de hackers o crackers malintencionados para evitar que estos roben o borren informaci\u00f3n. Uno de esos m\u00e9todos es el Ethical Hacking.<\/span><\/p>\n<h2><span style=\"color: #000000;\">El uso del Ethical Hacking<\/span><\/h2>\n<p><span style=\"color: #000000;\">El objetivo fundamental del Ethical Hacking es explotar las vulnerabilidades existentes en los sistemas, haciendo pruebas de intrusi\u00f3n, que sirven para verificar y evaluar la seguridad f\u00edsica y l\u00f3gica de los sistemas de informaci\u00f3n, redes de computadoras, aplicaciones web, bases de datos, servidores, etc.<\/span><\/p>\n<p><span style=\"color: #000000;\">Esta t\u00e9cnica logra el acceso y demuestra si un sistema es vulnerable o no. Esta informaci\u00f3n sirve para tomar medidas preventivas en contra de ataques.<\/span><\/p>\n<h3><span style=\"color: #000000;\">El Hacker \u00e9tico<\/span><\/h3>\n<p><span style=\"color: #000000;\">Un Hacker \u00c9tico es una persona que realiza pruebas de penetraci\u00f3n. Es un experto en computadoras y redes de datos cuya funci\u00f3n es atacar los sistemas de seguridad en nombre de los due\u00f1os con la intenci\u00f3n de buscar y encontrar vulnerabilidades actuando de forma igual o al menos similar y utilizan los mismos m\u00e9todos que usar\u00eda un hacker con intenci\u00f3n de atacar el sistema. En pocas palabras vulneran y entran a los sistemas empresariales para reportar vulnerabilidades, en lugar de robarla o borrarla.<\/span><\/p>\n<p><span style=\"color: #000000;\">Las pruebas de penetraci\u00f3n permiten: evaluar vulnerabilidades, analizar y categorizar las debilidades explotadas y proveer recomendaciones en base a las prioridades de la organizaci\u00f3n y, por ultimo, eliminar dichas vulnerabilidades.<\/span><\/p>\n<h3><span style=\"color: #000000;\">Los beneficios que ofrece el Ethical Hacking son:<\/span><\/h3>\n<ul>\n<li><span style=\"color: #000000;\">Otorgar un panorama acerca de las vulnerabilidades encontradas para tomar medidas.<\/span><\/li>\n<li><span style=\"color: #000000;\">Evidencia configuraciones no adecuadas en las aplicaciones instaladas.<\/span><\/li>\n<li><span style=\"color: #000000;\">Identifica a qu\u00e9 sistemas les hacen falta actualizaciones.<\/span><\/li>\n<li><span style=\"color: #000000;\">Disminuir el tiempo y esfuerzo requeridos para afrontar situaciones de riesgo.<\/span><\/li>\n<\/ul>\n<p><span style=\"color: #000000;\">El Ethical Hacking es una herramienta de gran valor para las organizaciones que buscan proteger la informaci\u00f3n alojada en sus sistemas.<\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Referencias.<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\">Alejandro Reyes Plata. (2010). \u00bfQu\u00e9 es el Ethical Hacking?. 2015, de UNAM Sitio web: <span style=\"color: #008a5d;\"><a style=\"color: #008a5d;\" href=\"http:\/\/www.seguridad.unam.mx\/descarga.dsc?arch=2776\">http:\/\/www.seguridad.unam.mx\/descarga.dsc?arch=2776<\/a><\/span><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Cristian David Castro Solorzano<\/strong><\/span><\/p>\n<p><span style=\"color: #000000;\"><strong>Alumno UTEL<\/strong><\/span><\/p>\n<p><a href=\"http:\/\/contacto.utel.edu.mx\/online\/formd\/UTEL\/?utm_source=boton-contacto&amp;utm_medium=blog&amp;utm_campaign=que-es-el-ethical-hacking\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"size-full wp-image-18233 aligncenter\" src=\"http:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/05\/boton_blog.png\" alt=\"Bot\u00f3n contacto\" width=\"232\" height=\"71\"><\/a><\/p>\n<h5><span style=\"color: #000000;\"><strong>Las opiniones y posturas vertidas en los art\u00edculos publicados en el Blog UTEL son de exclusiva responsabilidad del autor o autores de los mismos, y no reflejan necesariamente los puntos de vista de la&nbsp;Universidad Tecnol\u00f3gica Latinoamericana en L\u00ednea.<\/strong><\/span><\/h5>\n<div id=\"advads-2812527305\" class=\"advads-cta-lp-banner-form advads-entity-placement\"><a href=\"https:\/\/utel.mx\/blog\/admisiones-universidad-online\/?utm_source=blog&#038;utm_medium=CTAlink&#038;utm_campaign=MKTseo\" aria-label=\"Universidad en linea\"><img src=\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2025\/04\/universidad-en-linea-1.png\" alt=\"Universidad en linea\"  srcset=\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2025\/04\/universidad-en-linea-1.png 626w, https:\/\/utel.mx\/blog\/wp-content\/uploads\/2025\/04\/universidad-en-linea-1-420x168.png 420w\" sizes=\"(max-width: 626px) 100vw, 626px\" width=\"626\" height=\"250\"   \/><\/a><\/div>","protected":false},"excerpt":{"rendered":"<p> [&hellip;]<\/p>\n","protected":false},"author":40,"featured_media":39611,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[426],"tags":[],"class_list":["post-19800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-menu-profesional"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>\u00bfQu\u00e9 es el ethical hacking? - BLOG | Utel<\/title>\n<meta name=\"description\" content=\"El &quot;ethical hacking&quot; es una pr\u00e1ctica com\u00fan que consiste en hackear los sistemas infomativos propios para reforzar su seguridad.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es el ethical hacking? - BLOG | Utel\" \/>\n<meta property=\"og:description\" content=\"El &quot;ethical hacking&quot; es una pr\u00e1ctica com\u00fan que consiste en hackear los sistemas infomativos propios para reforzar su seguridad.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"BLOG | Utel\" \/>\n<meta property=\"article:published_time\" content=\"2015-08-24T15:53:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-10T17:07:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Invitados UTEL\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Invitados UTEL\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/\"},\"author\":{\"name\":\"Invitados UTEL\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/person\/e5b3d8d918f13bd0b0f4724daa90dd95\"},\"headline\":\"\u00bfQu\u00e9 es el ethical hacking?\",\"datePublished\":\"2015-08-24T15:53:04+00:00\",\"dateModified\":\"2023-03-10T17:07:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/\"},\"wordCount\":432,\"publisher\":{\"@id\":\"https:\/\/utel.mx\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg\",\"articleSection\":[\"Formaci\u00f3n profesional\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/\",\"url\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/\",\"name\":\"\u00bfQu\u00e9 es el ethical hacking? - BLOG | Utel\",\"isPartOf\":{\"@id\":\"https:\/\/utel.mx\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg\",\"datePublished\":\"2015-08-24T15:53:04+00:00\",\"dateModified\":\"2023-03-10T17:07:09+00:00\",\"description\":\"El \\\"ethical hacking\\\" es una pr\u00e1ctica com\u00fan que consiste en hackear los sistemas infomativos propios para reforzar su seguridad.\",\"breadcrumb\":{\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage\",\"url\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg\",\"contentUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg\",\"width\":600,\"height\":300,\"caption\":\"Qu\u00e9 es el Ethical Hacking\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/utel.mx\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es el ethical hacking?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/utel.mx\/blog\/#website\",\"url\":\"https:\/\/utel.mx\/blog\/\",\"name\":\"BLOG | Utel\",\"description\":\"Blog UTEL Universidad en L\u00ednea\",\"publisher\":{\"@id\":\"https:\/\/utel.mx\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/utel.mx\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/utel.mx\/blog\/#organization\",\"name\":\"BLOG | Utel\",\"url\":\"https:\/\/utel.mx\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png\",\"contentUrl\":\"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png\",\"width\":237,\"height\":64,\"caption\":\"BLOG | Utel\"},\"image\":{\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/person\/e5b3d8d918f13bd0b0f4724daa90dd95\",\"name\":\"Invitados UTEL\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/utel.mx\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/781456f1128be5a332ab27ea8b902597?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/781456f1128be5a332ab27ea8b902597?s=96&d=mm&r=g\",\"caption\":\"Invitados UTEL\"},\"description\":\"Invitados . Colaboraciones por parte de invitados de la Comunidad UTEL\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es el ethical hacking? - BLOG | Utel","description":"El \"ethical hacking\" es una pr\u00e1ctica com\u00fan que consiste en hackear los sistemas infomativos propios para reforzar su seguridad.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/","og_locale":"es_ES","og_type":"article","og_title":"\u00bfQu\u00e9 es el ethical hacking? - BLOG | Utel","og_description":"El \"ethical hacking\" es una pr\u00e1ctica com\u00fan que consiste en hackear los sistemas infomativos propios para reforzar su seguridad.","og_url":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/","og_site_name":"BLOG | Utel","article_published_time":"2015-08-24T15:53:04+00:00","article_modified_time":"2023-03-10T17:07:09+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg","type":"image\/jpeg"}],"author":"Invitados UTEL","twitter_misc":{"Written by":"Invitados UTEL","Est. reading time":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#article","isPartOf":{"@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/"},"author":{"name":"Invitados UTEL","@id":"https:\/\/utel.mx\/blog\/#\/schema\/person\/e5b3d8d918f13bd0b0f4724daa90dd95"},"headline":"\u00bfQu\u00e9 es el ethical hacking?","datePublished":"2015-08-24T15:53:04+00:00","dateModified":"2023-03-10T17:07:09+00:00","mainEntityOfPage":{"@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/"},"wordCount":432,"publisher":{"@id":"https:\/\/utel.mx\/blog\/#organization"},"image":{"@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg","articleSection":["Formaci\u00f3n profesional"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/","url":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/","name":"\u00bfQu\u00e9 es el ethical hacking? - BLOG | Utel","isPartOf":{"@id":"https:\/\/utel.mx\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage"},"image":{"@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg","datePublished":"2015-08-24T15:53:04+00:00","dateModified":"2023-03-10T17:07:09+00:00","description":"El \"ethical hacking\" es una pr\u00e1ctica com\u00fan que consiste en hackear los sistemas infomativos propios para reforzar su seguridad.","breadcrumb":{"@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#primaryimage","url":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg","contentUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2015\/08\/Que-es-el-Ethical-Hacking.jpg","width":600,"height":300,"caption":"Qu\u00e9 es el Ethical Hacking"},{"@type":"BreadcrumbList","@id":"https:\/\/utel.mx\/blog\/menu-profesional\/que-es-el-ethical-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/utel.mx\/blog\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es el ethical hacking?"}]},{"@type":"WebSite","@id":"https:\/\/utel.mx\/blog\/#website","url":"https:\/\/utel.mx\/blog\/","name":"BLOG | Utel","description":"Blog UTEL Universidad en L\u00ednea","publisher":{"@id":"https:\/\/utel.mx\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/utel.mx\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/utel.mx\/blog\/#organization","name":"BLOG | Utel","url":"https:\/\/utel.mx\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png","contentUrl":"https:\/\/utel.mx\/blog\/wp-content\/uploads\/2023\/03\/cropped-logo-blog.png","width":237,"height":64,"caption":"BLOG | Utel"},"image":{"@id":"https:\/\/utel.mx\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/utel.mx\/blog\/#\/schema\/person\/e5b3d8d918f13bd0b0f4724daa90dd95","name":"Invitados UTEL","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/utel.mx\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/781456f1128be5a332ab27ea8b902597?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/781456f1128be5a332ab27ea8b902597?s=96&d=mm&r=g","caption":"Invitados UTEL"},"description":"Invitados . Colaboraciones por parte de invitados de la Comunidad UTEL"}]}},"_links":{"self":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts\/19800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/comments?post=19800"}],"version-history":[{"count":2,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts\/19800\/revisions"}],"predecessor-version":[{"id":39612,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/posts\/19800\/revisions\/39612"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/media\/39611"}],"wp:attachment":[{"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/media?parent=19800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/categories?post=19800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/utel.mx\/blog\/wp-json\/wp\/v2\/tags?post=19800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}