{"id":87,"count":1,"description":"","link":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/","name":"Ciberseguridad","slug":"ciberseguridad-cursos","taxonomy":"category","parent":78,"meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ciberseguridad archivos - Editorial Focyl<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ciberseguridad archivos - Editorial Focyl\" \/>\n<meta property=\"og:url\" content=\"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/\" \/>\n<meta property=\"og:site_name\" content=\"Editorial Focyl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"CollectionPage\",\"@id\":\"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/\",\"url\":\"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/\",\"name\":\"Ciberseguridad archivos - Editorial Focyl\",\"isPartOf\":{\"@id\":\"https:\/\/editorial.focyl.com\/#website\"},\"breadcrumb\":{\"@id\":\"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/#breadcrumb\"},\"inLanguage\":\"es\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/editorial.focyl.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cursos\",\"item\":\"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/editorial.focyl.com\/#website\",\"url\":\"https:\/\/editorial.focyl.com\/\",\"name\":\"Editorial Focyl\",\"description\":\"Editorial Focyl\",\"alternateName\":\"Editorial Focyl\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/editorial.focyl.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ciberseguridad archivos - Editorial Focyl","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/","og_locale":"es_ES","og_type":"article","og_title":"Ciberseguridad archivos - Editorial Focyl","og_url":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/","og_site_name":"Editorial Focyl","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"CollectionPage","@id":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/","url":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/","name":"Ciberseguridad archivos - Editorial Focyl","isPartOf":{"@id":"https:\/\/editorial.focyl.com\/#website"},"breadcrumb":{"@id":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/#breadcrumb"},"inLanguage":"es"},{"@type":"BreadcrumbList","@id":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/ciberseguridad-cursos\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/editorial.focyl.com\/"},{"@type":"ListItem","position":2,"name":"Cursos","item":"https:\/\/editorial.focyl.com\/index.php\/category\/cursos\/"},{"@type":"ListItem","position":3,"name":"Ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/editorial.focyl.com\/#website","url":"https:\/\/editorial.focyl.com\/","name":"Editorial Focyl","description":"Editorial Focyl","alternateName":"Editorial Focyl","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/editorial.focyl.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es"}]}},"_links":{"self":[{"href":"https:\/\/editorial.focyl.com\/index.php\/wp-json\/wp\/v2\/categories\/87","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/editorial.focyl.com\/index.php\/wp-json\/wp\/v2\/categories"}],"about":[{"href":"https:\/\/editorial.focyl.com\/index.php\/wp-json\/wp\/v2\/taxonomies\/category"}],"up":[{"embeddable":true,"href":"https:\/\/editorial.focyl.com\/index.php\/wp-json\/wp\/v2\/categories\/78"}],"wp:post_type":[{"href":"https:\/\/editorial.focyl.com\/index.php\/wp-json\/wp\/v2\/posts?categories=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}