{"id":63,"date":"2023-02-18T02:29:41","date_gmt":"2023-02-18T02:29:41","guid":{"rendered":"https:\/\/it-sf.com.co\/?page_id=63"},"modified":"2023-02-27T19:59:33","modified_gmt":"2023-02-27T19:59:33","slug":"vision","status":"publish","type":"page","link":"https:\/\/it-sf.com.co\/?page_id=63","title":{"rendered":"Nuestra Visi\u00f3n"},"content":{"rendered":"\r\n<figure class=\"wp-block-image alignwide size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"320\" src=\"https:\/\/it-sf.com.co\/wp-content\/uploads\/2023\/02\/hacking-2-1024x320.jpg\" alt=\"\" class=\"wp-image-206\" srcset=\"https:\/\/it-sf.com.co\/wp-content\/uploads\/2023\/02\/hacking-2-1024x320.jpg 1024w, https:\/\/it-sf.com.co\/wp-content\/uploads\/2023\/02\/hacking-2-300x94.jpg 300w, https:\/\/it-sf.com.co\/wp-content\/uploads\/2023\/02\/hacking-2-768x240.jpg 768w, https:\/\/it-sf.com.co\/wp-content\/uploads\/2023\/02\/hacking-2.jpg 1280w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\r\n\r\n\r\n\r\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\r\n\r\n\r\n\r\n<p class=\"has-medium-font-size\">En cinco a\u00f1os ser l\u00edderes, generando conocimiento mediante los procesos de formaci\u00f3n y capacitaci\u00f3n, as\u00ed como convertirnos en un centro de investigaci\u00f3n cibern\u00e9tica en las l\u00edneas de la inform\u00e1tica forense digital, el an\u00e1lisis de vulnerabilidades y las pruebas de seguridad \u201cEthical Hacking\u201d o \u201cPentesting\u201d, complementando con los servicios de auditor\u00eda de seguridad de la informaci\u00f3n, enmarcados en los est\u00e1ndares y normas internacionales vigentes.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>En cinco a\u00f1os ser l\u00edderes, generando conocimiento mediante los procesos de formaci\u00f3n y capacitaci\u00f3n, as\u00ed como convertirnos en un centro de investigaci\u00f3n cibern\u00e9tica en las l\u00edneas de la inform\u00e1tica forense digital, el an\u00e1lisis de vulnerabilidades y las pruebas de seguridad \u201cEthical Hacking\u201d o \u201cPentesting\u201d, complementando con los servicios de auditor\u00eda de seguridad de la informaci\u00f3n, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"templates\/template-page-full-width.php","meta":{"footnotes":""},"class_list":["post-63","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/it-sf.com.co\/index.php?rest_route=\/wp\/v2\/pages\/63","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/it-sf.com.co\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/it-sf.com.co\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/it-sf.com.co\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/it-sf.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=63"}],"version-history":[{"count":6,"href":"https:\/\/it-sf.com.co\/index.php?rest_route=\/wp\/v2\/pages\/63\/revisions"}],"predecessor-version":[{"id":207,"href":"https:\/\/it-sf.com.co\/index.php?rest_route=\/wp\/v2\/pages\/63\/revisions\/207"}],"wp:attachment":[{"href":"https:\/\/it-sf.com.co\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=63"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}