{"version":"1.0","provider_name":"Maria Cano - en","provider_url":"https:\/\/www.fumc.edu.co\/en","author_name":"univ3rsid@d","author_url":"https:\/\/www.fumc.edu.co\/en\/author\/univ3rsidd\/","title":"Hacking and web security - Maria Cano - en","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2Px6ni2hP3\"><a href=\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/\">Hacking and web security<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.fumc.edu.co\/en\/formacion-continua\/hacking-seguridad-web\/embed\/#?secret=2Px6ni2hP3\" width=\"600\" height=\"338\" title=\"\u00abHacking and web security\u00bb \u2014 Maria Cano - en\" data-secret=\"2Px6ni2hP3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","description":"[vc_row][vc_column][vc_custom_heading text=\u00bbHacking y seguridad web\u00bb font_container=\u00bbtag:h1|text_align:left\u00bb google_fonts=\u00bbfont_family:Didact%20Gothic%3Aregular|font_style:400%20regular%3A400%3Anormal\u00bb][\/vc_column][\/vc_row][vc_row][vc_column width=\u00bb1\/2&#8243;][vc_single_image image=\u00bb2135&#8243; img_size=\u00bbfull\u00bb][\/vc_column][vc_column width=\u00bb1\/2&#8243;][vc_column_text]The purpose of this Certificate course is to show students associated risks when creating and managing web applications, keeping in mind all aspects related to the security of the applications and the data they manage. Throughout the course, it will be detailed how to carry [&hellip;]"}