{"id":6399,"date":"2023-06-19T18:21:48","date_gmt":"2023-06-19T23:21:48","guid":{"rendered":"https:\/\/sitios.udla.edu.ec\/fica\/?page_id=6399"},"modified":"2025-02-24T17:39:48","modified_gmt":"2025-02-24T22:39:48","slug":"cybersecurity-engineering-2","status":"publish","type":"page","link":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/","title":{"rendered":"Cybersecurity Engineering"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"6399\" class=\"elementor elementor-6399\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-8c98c7b elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8c98c7b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-1143449 elementor-hidden-mobile\" data-id=\"1143449\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-61476b5 elementor-hidden-mobile\" data-id=\"61476b5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-f0b54ca elementor-hidden-mobile\" data-id=\"f0b54ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-70db243 elementor-hidden-mobile\" data-id=\"70db243\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-abb89fc elementor-hidden-mobile\" data-id=\"abb89fc\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-93d41a1 elementor-hidden-mobile\" data-id=\"93d41a1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-14 elementor-top-column elementor-element elementor-element-4ef3c4c\" data-id=\"4ef3c4c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-429873c elementor-widget elementor-widget-button\" data-id=\"429873c\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/sitios.udla.edu.ec\/fica\/ingenieria-en-ciberseguridad\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Espa\u00f1ol <img decoding=\"async\" src=\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png\" width=\"20\" alt=\"\"><\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1974ffd elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1974ffd\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-66 elementor-top-column elementor-element elementor-element-8aae675\" data-id=\"8aae675\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-793467d elementor-widget elementor-widget-video\" data-id=\"793467d\" data-element_type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/FjAvzzvTToI&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-723c390 elementor-widget elementor-widget-text-editor\" data-id=\"723c390\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: left;\"><strong>Title:<\/strong> Bachelor in Cybersecurity Engineering.<\/p><p style=\"text-align: left;\"><strong>Duration: <\/strong>9 semesters<\/p><p><strong>Modality: <\/strong>On site<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9b94f92 elementor-widget elementor-widget-button\" data-id=\"9b94f92\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/academico.udla.edu.ec\/mallas\/reportV2\/UDLA1P070\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">PLAN OF STUDY<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-11d9fdf elementor-widget elementor-widget-text-editor\" data-id=\"11d9fdf\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>** The curriculum may be subject to changes.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6afee9c elementor-widget elementor-widget-eael-adv-accordion\" data-id=\"6afee9c\" data-element_type=\"widget\" data-widget_type=\"eael-adv-accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div class=\"eael-adv-accordion\" id=\"eael-adv-accordion-6afee9c\" data-scroll-on-click=\"no\" data-scroll-speed=\"300\" data-accordion-id=\"6afee9c\" data-accordion-type=\"accordion\" data-toogle-speed=\"300\">\n    <div class=\"eael-accordion-list\">\n                <div id=\"program-description\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"1\" aria-controls=\"elementor-tab-content-1121\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Program Description<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1121\" class=\"eael-accordion-content clearfix\" data-tab=\"1\" aria-labelledby=\"program-description\"><p>As a Bachelor in Cybersecurity Engineering, you will be at the forefront of the field, capable of applying your technical and business skills to effectively participate in problem-solving, analysis, and project management activities necessary for implementing cybersecurity solutions that protect an organization&#8217;s information assets.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"advantages\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"2\" aria-controls=\"elementor-tab-content-1122\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Advantages<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1122\" class=\"eael-accordion-content clearfix\" data-tab=\"2\" aria-labelledby=\"advantages\"><ul><li>Through our academies and educational alliances: CISCO Networking Academy, EC-Council Academy, Red Hat Academy, VMWare Academy, Fortinet Academy, Microsoft Academy, and Oracle Academy, students will receive professional certification courses as part of our plan of study.<\/li><li>Students will visit the facilities and technological infrastructure of several companies in the country. In addition, they will be part of community outreach projects where they will support the improvement of society&#8217;s cybersecurity awareness by putting their knowledge into practice.<\/li><li>Students will have at hand certification laboratories with cutting-edge technology where they can practice at all program levels. They will have access to an Experimental Data Center for specialized hands-on workshops, a Cybersecurity Lab where they will learn attack, defense, and cybernetic monitoring techniques, and a Technological Innovation Unit (UITEC, for its initials in Spanish) where they will develop innovative projects with complete creative freedom.<\/li><li>Our faculty members are experienced and certified in different areas of cybersecurity and data intelligence, with extensive professional experience in renowned companies in the country.<\/li><li>Thanks to the university&#8217;s agreements, students will have access to pre-professional internships in leading companies and institutions related to the field of cybersecurity and data intelligence.<\/li><li>Students will be part of mirror classes where they will share experiences with academic peers from universities in other countries. They can also participate in exchange programs at international institutions of higher learning.<\/li><li>Students will have chosen a fast-paced program with a great global projection that responds to new technological trends. The professional and academic training offered will open doors to postgraduate programs of different sorts, both nationally and internationally.<\/li><\/ul><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"skills-and-abilities\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"3\" aria-controls=\"elementor-tab-content-1123\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Skills and abilities<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1123\" class=\"eael-accordion-content clearfix\" data-tab=\"3\" aria-labelledby=\"skills-and-abilities\"><ul><li>Learn about the elements of data networks and the norms and standards that govern them.<\/li><li>Acquire knowledge about databases, their management, and how they support decision-making processes in companies.<\/li><li>Understand the different types of threats and attacks faced by technological infrastructures to respond promptly with protection measures at an individual, organizational, or industrial level.<\/li><li>Apply regulations, standards, and best practices related to cybersecurity, technology management, and data intelligence.<\/li><li>Design and manage cybersecurity projects that protect the information assets and technological infrastructure of organizations.<\/li><li>Implement techniques of forensic analysis, cryptography, reverse engineering, ethical hacking, and computer auditing.<\/li><li>Have an educational model based on practice, which allows students to shine in the professional world.<\/li><li>Develop skills to think critically, innovatively, and creatively while having a global vision.<\/li><\/ul><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"employability\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"4\" aria-controls=\"elementor-tab-content-1124\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Employability<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1124\" class=\"eael-accordion-content clearfix\" data-tab=\"4\" aria-labelledby=\"employability\"><p>The employability for a cybersecurity engineer is currently very high and is expected to continue to grow in the future. With the constant increase in cyber threats and the importance of protecting information systems, cybersecurity skills are in high demand across a wide range of industries. Cybersecurity engineers are professionals specialized in protecting information and systems against cyberattacks, as well as developing strategies and policies to prevent and mitigate risks. His knowledge spans areas such as risk analysis, network security, application security, and regulatory compliance. In addition, every organization requires professionals in this field.<\/p><p>\u00a0<\/p><p>A cybersecurity professional can hold many positions depending on their experience, skills, and level of responsibility. Some of the common positions in the field of cybersecurity are:<\/p><p>\u00a0<\/p><ul><li>Security analist<\/li><li>Network security engineer<\/li><li>Application security engineer<\/li><li>Security architect<\/li><li>Information security manager<\/li><li>Cybersecurity consultant<\/li><li>Pentester<\/li><li>Digital Forensic Investigator<\/li><\/ul><p>\u00a0<\/p><p>These are just some of the common positions in the field of cybersecurity, but the field is vast and constantly evolving. Also, as experience is gained and additional certifications are obtained, it is possible to access positions of greater responsibility and leadership in the field of cybersecurity.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"degree-profile\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"5\" aria-controls=\"elementor-tab-content-1125\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Degree Profile<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1125\" class=\"eael-accordion-content clearfix\" data-tab=\"5\" aria-labelledby=\"degree-profile\"><p>The Cybersecurity Engineer from Universidad de las Americas is a competent professional with an entrepreneurial spirit and multidisciplinary vision that will render him capable of both applying technical and business skills to become a trusted advisor to upper management, anticipating cybersecurity challenges, and developing future-focused solutions aligned with business goals.<\/p><p>Graduates will analyze, design, implement best managerial practices, and evaluate solutions to protect the confidentiality, availability, and integrity of information and the security of information systems that support modern organizations. They will be able to effectively communicate proposals that assess risks and defend against several modern-day threats by designing cybersecurity controls to protect information assets in companies using best practices, methodologies, and standards of cybersecurity and computer science. They will also be able to investigate data breaches, and cyber-attacks and build robust cybersecurity systems and long-term strategies to meet organizational objectives and generate value through good management and governance practices in the adoption of new technological trends. Likewise, they will apply the acquired knowledge and different strategies to self-regulate their learning.<\/p><p>The Cybersecurity Engineer from UDLA is expected to lead diverse multidisciplinary work teams in national and international contexts and to conduct themselves in an ethical, creative, proactive, and responsible manner, always respecting all legal frameworks while being committed to the country\u2019s cybersecurity development process for the benefit of society.<\/p><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"program-educational-objectives\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"6\" aria-controls=\"elementor-tab-content-1126\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Program educational objectives<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1126\" class=\"eael-accordion-content clearfix\" data-tab=\"6\" aria-labelledby=\"program-educational-objectives\"><ul><li>Manage cybersecurity initiatives that identify, prevent, and treat cyberattacks to support the organization\u2019s line of business continuity and preservation.<\/li><li>Work collaboratively and across disciplines to protect organizations\u2019 vital technological infrastructures and manage cyber risk.<\/li><li>Strengthen integral skills and lifelong technological adaptability through ongoing training and updating.<\/li><li>Add value to organizations by exercising the profession with values and ethical principles.<\/li><\/ul><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"student-outcomes\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"7\" aria-controls=\"elementor-tab-content-1127\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Student outcomes<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1127\" class=\"eael-accordion-content clearfix\" data-tab=\"7\" aria-labelledby=\"student-outcomes\"><p>A graduate of the Cybersecurity Engineering program will be able to:<\/p><ul><li>Identify, formulate, and solve complex engineering problems by applying principles of engineering, science, and mathematics.<\/li><li>Apply engineering design to produce solutions that meet specific needs with consideration of public health, safety, and welfare, as well as global, cultural, social, environmental, and economic factors.<\/li><li>Communicate effectively with a range of audiences within the field.<\/li><li>Recognize ethical and professional responsibilities in engineering situations and make informed judgments, which must consider the impact of engineering solutions in global, economic, environmental, and societal contexts.<\/li><li>Work effectively in a team whose members, together, exercise leadership, create a collaborative and inclusive environment, set goals, plan tasks, and accomplish objectives.<\/li><li>Develop and conduct appropriate experimentation, analyze, and interpret data, and use engineering judgment to draw conclusions.<\/li><li>Acquire and apply new knowledge as needed, using appropriate learning strategies.<\/li><\/ul><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"program-advisory-committee\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"8\" aria-controls=\"elementor-tab-content-1128\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Program advisory committee<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1128\" class=\"eael-accordion-content clearfix\" data-tab=\"8\" aria-labelledby=\"program-advisory-committee\"><p>This committee addresses issues related to the fulfillment of educational objectives, degree profile, and other academic aspects linked to the program\u2019s development.<\/p><p><strong>Responsibilities<\/strong><\/p><ul><li>Review the program\u2019s educational objectives, degree profile, student learning outcomes, and plan of study.<\/li><li>Propose changes or recommendations to the program\u2019s educational objectives, degree profile, student learning outcomes, and plan of study.<\/li><\/ul><p><strong>Participants<\/strong><\/p><table width=\"611\"><tbody><tr><td width=\"314\"><p><strong>Title<\/strong><\/p><\/td><td width=\"297\"><p><strong>Name<\/strong><\/p><\/td><\/tr><tr><td width=\"314\"><p>Dean of the College of Engineering and Applied Sciences<\/p><\/td><td width=\"297\"><p>Diego Buena\u00f1o<\/p><\/td><\/tr><tr><td width=\"314\"><p>Program director<\/p><\/td><td width=\"297\"><p>\u00c1ngel Jaramillo<\/p><\/td><\/tr><tr><td width=\"314\"><p>Professor responsible for monitoring alumni<\/p><\/td><td width=\"297\"><p>Iv\u00e1n Ortiz<\/p><\/td><\/tr><tr><td width=\"314\"><p>Curriculum Professor<\/p><\/td><td width=\"297\"><p>Ana Mar\u00eda Pazmi\u00f1o<\/p><\/td><\/tr><tr><td rowspan=\"4\" width=\"314\"><p>Employers\u2019 representatives and\/or representatives of professional associations or guilds<\/p><p>Alumni<\/p><\/td><td width=\"297\"><p>Christian Espinosa (President)<\/p><\/td><\/tr><tr><td width=\"297\"><p>Jorge Guerr\u00f3n<\/p><\/td><\/tr><tr><td width=\"297\"><p>Gerardo Trujillo<\/p><\/td><\/tr><tr><td width=\"297\"><p>Diego Balseca<\/p><\/td><\/tr><tr><td rowspan=\"3\" width=\"314\"><p>Alumni<\/p><\/td><td width=\"297\"><p>Joselin Garc\u00eda<\/p><\/td><\/tr><tr><td width=\"297\"><p>Nicholas Gillespie<\/p><\/td><\/tr><tr><td width=\"297\"><p>Jhosue Villamil<\/p><\/td><\/tr><\/tbody><\/table><\/div>\n                <\/div><div class=\"eael-accordion-list\">\n                <div id=\"enrollment-and-graduation-data\" class=\"elementor-tab-title eael-accordion-header\" tabindex=\"0\" data-tab=\"9\" aria-controls=\"elementor-tab-content-1129\"><span class=\"eael-advanced-accordion-icon-closed\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-plus\"><\/i><\/span><span class=\"eael-advanced-accordion-icon-opened\"><i aria-hidden=\"true\" class=\"fa-accordion-icon fas fa-minus\"><\/i><\/span><span class=\"eael-accordion-tab-title\">Enrollment and graduation data<\/span><i aria-hidden=\"true\" class=\"fa-toggle fas fa-angle-right\"><\/i><\/div><div id=\"elementor-tab-content-1129\" class=\"eael-accordion-content clearfix\" data-tab=\"9\" aria-labelledby=\"enrollment-and-graduation-data\"><p><strong>Bachelor<\/strong><\/p><div class=\"div-table-responsive\"><table class=\"table-responsive\"><tbody><tr><td width=\"132\"><strong>Academic Year<\/strong><\/td><td width=\"85\">2018<\/td><td width=\"85\">2019<\/td><td width=\"85\">2020<\/td><td width=\"80\">2021<\/td><td width=\"80\">2022<\/td><\/tr><tr><td width=\"132\"><strong>Number of Students<\/strong><\/td><td width=\"85\">15<\/td><td width=\"85\">27<\/td><td width=\"85\">43<\/td><td width=\"80\">51<\/td><td width=\"80\">88<\/td><\/tr><\/tbody><\/table><p><strong><span class=\"ui-provider fz b c d e f g h i j k l m n o p q r s t u v w x y z ab ac ae af ag ah ai aj ak\" dir=\"ltr\">Bachelor Degrees Awarded<\/span><\/strong><\/p><div class=\"div-table-responsive\"><table class=\"table-responsive\"><tbody><tr><td width=\"132\"><strong>Academic Year<\/strong><\/td><td width=\"85\">2018<\/td><td width=\"85\">2019<\/td><td width=\"85\">2020<\/td><td width=\"80\">2021<\/td><td width=\"80\">2022<\/td><\/tr><tr><td width=\"132\"><strong>Number of Students<\/strong><\/td><td width=\"85\">0<\/td><td width=\"85\">0<\/td><td width=\"85\">0<\/td><td width=\"80\">0<\/td><td width=\"80\">8<\/td><\/tr><\/tbody><\/table><\/div><\/div><\/div>\n                <\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a793bbb elementor-widget elementor-widget-heading\" data-id=\"a793bbb\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h6 class=\"elementor-heading-title elementor-size-default\">If you are enrolled in another university, you can have your courses recognized through our simulator and study at UDLA.<\/h6>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f288007 elementor-align-left elementor-mobile-align-justify elementor-widget elementor-widget-button\" data-id=\"f288007\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-md elementor-animation-grow\" href=\"https:\/\/simuladordehomologacion.udla.edu.ec\/SolicitudAspirante\/Create\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">\u00a1Switch to UDLA!<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-top-column elementor-element elementor-element-5c83aa1\" data-id=\"5c83aa1\" data-element_type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-8a82184 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"8a82184\" data-element_type=\"section\" data-settings=\"{&quot;sticky&quot;:&quot;top&quot;,&quot;sticky_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;],&quot;sticky_offset&quot;:90,&quot;sticky_parent&quot;:&quot;yes&quot;,&quot;sticky_effects_offset&quot;:0}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-cab0da3\" data-id=\"cab0da3\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-80f5498 elementor-widget elementor-widget-heading\" data-id=\"80f5498\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Apply here<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83a4199 elementor-widget elementor-widget-html\" data-id=\"83a4199\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<iframe id=\"pardot\" src=\"https:\/\/go.udla.edu.ec\/l\/893551\/2023-06-27\/f4zxg\" width=\"100%\" height=\"500\" type=\"text\/html\" frameborder=\"0\" allowTransparency=\"true\" style=\"border: 0\"><\/iframe>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0c50f9a elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"0c50f9a\" data-element_type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7caccf8\" data-id=\"7caccf8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-20b248a elementor-arrows-position-inside elementor-pagination-position-outside elementor-widget elementor-widget-image-carousel\" data-id=\"20b248a\" data-element_type=\"widget\" data-settings=\"{&quot;navigation&quot;:&quot;both&quot;,&quot;autoplay&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;autoplay_speed&quot;:5000,&quot;infinite&quot;:&quot;yes&quot;,&quot;speed&quot;:500}\" data-widget_type=\"image-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-image-carousel-wrapper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Carrusel de im\u00e1genes\" dir=\"ltr\">\n\t\t\t<div class=\"elementor-image-carousel swiper-wrapper\" aria-live=\"off\">\n\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"1 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ciberseguridad1-scaled.webp\" alt=\"ciberseguridad1\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"2 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ciberseguridad2-scaled.webp\" alt=\"ciberseguridad2\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"3 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ciberseguridad3-scaled.webp\" alt=\"ciberseguridad3\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"4 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ciberseguridad4-scaled.webp\" alt=\"ciberseguridad4\" \/><\/figure><\/div><div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\" aria-label=\"5 of 5\"><figure class=\"swiper-slide-inner\"><img decoding=\"async\" class=\"swiper-slide-image\" src=\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ciberseguridad5-scaled.webp\" alt=\"ciberseguridad5\" \/><\/figure><\/div>\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-prev\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-left\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-swiper-button elementor-swiper-button-next\" role=\"button\" tabindex=\"0\">\n\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"eicon-chevron-right\"><\/i>\t\t\t\t\t<\/div>\n\t\t\t\t\n\t\t\t\t\t\t\t\t\t<div class=\"swiper-pagination\"><\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-d279366 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d279366\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-89b43c9\" data-id=\"89b43c9\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-89220da elementor-widget elementor-widget-html\" data-id=\"89220da\" data-element_type=\"widget\" data-widget_type=\"html.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<script>\r\nwindow.addEventListener(\"load\", (event) => {\r\n  var pardotURI = document.querySelector(\"#pardot\").getAttribute('src');\r\ndocument.querySelector('#pardot').setAttribute('src',pardotURI + \"?\" + window.location.search.slice(1));\r\n});\r\n\r\n<\/script>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Espa\u00f1ol https:\/\/youtu.be\/FjAvzzvTToI Title: Bachelor in Cybersecurity Engineering. Duration: 9 semesters Modality: On site PLAN OF STUDY ** The curriculum may&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-6399","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Engineering - FICA - UDLA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Engineering - FICA - UDLA\" \/>\n<meta property=\"og:description\" content=\"Espa\u00f1ol https:\/\/youtu.be\/FjAvzzvTToI Title: Bachelor in Cybersecurity Engineering. Duration: 9 semesters Modality: On site PLAN OF STUDY ** The curriculum may...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/\" \/>\n<meta property=\"og:site_name\" content=\"FICA - UDLA\" \/>\n<meta property=\"article:modified_time\" content=\"2025-02-24T22:39:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/\",\"url\":\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/\",\"name\":\"Cybersecurity Engineering - FICA - UDLA\",\"isPartOf\":{\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png\",\"datePublished\":\"2023-06-19T23:21:48+00:00\",\"dateModified\":\"2025-02-24T22:39:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#primaryimage\",\"url\":\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png\",\"contentUrl\":\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png\",\"width\":100,\"height\":100},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/sitios.udla.edu.ec\/fica\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Engineering\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/#website\",\"url\":\"https:\/\/sitios.udla.edu.ec\/fica\/\",\"name\":\"FICA - UDLA\",\"description\":\"Sitio de la Facultad de Ingenier\u00eda y Ciencias Aplicadas\",\"publisher\":{\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sitios.udla.edu.ec\/fica\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/#organization\",\"name\":\"FICA - UDLA\",\"url\":\"https:\/\/sitios.udla.edu.ec\/fica\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2024\/11\/cropped-cropped-logo-fica-verde-1.jpg\",\"contentUrl\":\"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2024\/11\/cropped-cropped-logo-fica-verde-1.jpg\",\"width\":499,\"height\":109,\"caption\":\"FICA - UDLA\"},\"image\":{\"@id\":\"https:\/\/sitios.udla.edu.ec\/fica\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Engineering - FICA - UDLA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/","og_locale":"es_ES","og_type":"article","og_title":"Cybersecurity Engineering - FICA - UDLA","og_description":"Espa\u00f1ol https:\/\/youtu.be\/FjAvzzvTToI Title: Bachelor in Cybersecurity Engineering. Duration: 9 semesters Modality: On site PLAN OF STUDY ** The curriculum may...","og_url":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/","og_site_name":"FICA - UDLA","article_modified_time":"2025-02-24T22:39:48+00:00","og_image":[{"url":"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Tiempo de lectura":"8 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/","url":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/","name":"Cybersecurity Engineering - FICA - UDLA","isPartOf":{"@id":"https:\/\/sitios.udla.edu.ec\/fica\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#primaryimage"},"image":{"@id":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#primaryimage"},"thumbnailUrl":"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png","datePublished":"2023-06-19T23:21:48+00:00","dateModified":"2025-02-24T22:39:48+00:00","breadcrumb":{"@id":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#primaryimage","url":"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png","contentUrl":"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2023\/06\/ecuador.png","width":100,"height":100},{"@type":"BreadcrumbList","@id":"https:\/\/sitios.udla.edu.ec\/fica\/cybersecurity-engineering-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/sitios.udla.edu.ec\/fica\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Engineering"}]},{"@type":"WebSite","@id":"https:\/\/sitios.udla.edu.ec\/fica\/#website","url":"https:\/\/sitios.udla.edu.ec\/fica\/","name":"FICA - UDLA","description":"Sitio de la Facultad de Ingenier\u00eda y Ciencias Aplicadas","publisher":{"@id":"https:\/\/sitios.udla.edu.ec\/fica\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sitios.udla.edu.ec\/fica\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/sitios.udla.edu.ec\/fica\/#organization","name":"FICA - UDLA","url":"https:\/\/sitios.udla.edu.ec\/fica\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/sitios.udla.edu.ec\/fica\/#\/schema\/logo\/image\/","url":"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2024\/11\/cropped-cropped-logo-fica-verde-1.jpg","contentUrl":"https:\/\/sitios.udla.edu.ec\/fica\/wp-content\/uploads\/2024\/11\/cropped-cropped-logo-fica-verde-1.jpg","width":499,"height":109,"caption":"FICA - UDLA"},"image":{"@id":"https:\/\/sitios.udla.edu.ec\/fica\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/pages\/6399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/comments?post=6399"}],"version-history":[{"count":87,"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/pages\/6399\/revisions"}],"predecessor-version":[{"id":9224,"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/pages\/6399\/revisions\/9224"}],"wp:attachment":[{"href":"https:\/\/sitios.udla.edu.ec\/fica\/wp-json\/wp\/v2\/media?parent=6399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}