{"id":568,"date":"2025-04-07T11:02:17","date_gmt":"2025-04-07T09:02:17","guid":{"rendered":"http:\/\/catedra.us.es\/ciberbeonesec\/?p=568"},"modified":"2025-09-28T12:06:41","modified_gmt":"2025-09-28T10:06:41","slug":"curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones","status":"publish","type":"post","link":"http:\/\/catedra.us.es\/ciberbeonesec\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/","title":{"rendered":"Curso de Microcredencial &#8211; La DarkNet: fundamentos y aplicaciones"},"content":{"rendered":"[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb column_border_radius=\u00bbnone\u00bb column_link_target=\u00bb_self\u00bb column_position=\u00bbdefault\u00bb gradient_direction=\u00bbleft_to_right\u00bb overlay_strength=\u00bb0.3&#8243; width=\u00bb1\/1&#8243; tablet_width_inherit=\u00bbdefault\u00bb animation_type=\u00bbdefault\u00bb bg_image_animation=\u00bbnone\u00bb border_type=\u00bbsimple\u00bb column_border_width=\u00bbnone\u00bb column_border_style=\u00bbsolid\u00bb trp_param_show_language=\u00bbes_ES\u00bb trp_param_show=\u00bbtrue\u00bb column_padding_type=\u00bbdefault\u00bb gradient_type=\u00bbdefault\u00bb][vc_column_text]\r\n<h2 class=\"wp-block-heading\"><strong>Objetivos<\/strong><\/h2>\r\n<p>\r\n\r\nEste curso tiene como objetivo proporcionar al estudiante un conocimiento s\u00f3lido sobre el funcionamiento de las redes oscuras (DarkNets) como Tor, FreeNet e I2P, fomentando una visi\u00f3n cr\u00edtica que le permita evaluar su uso para fines leg\u00edtimos, comprendiendo tanto sus ventajas como sus limitaciones. Se abordar\u00e1n tambi\u00e9n los mecanismos de censura y anticensura com\u00fanmente utilizados, y se ense\u00f1ar\u00e1 el uso pr\u00e1ctico de estas redes tanto desde la perspectiva del usuario final como del proveedor de servicios.<\/p>\r\n<p class=\"wp-block-paragraph\"><br \/><\/p>\r\n<h2 class=\"wp-block-heading\"><strong>Contenidos<\/strong><\/h2>\r\n<p><br \/><\/p>\r\n<ul class=\"wp-block-list\">\r\n<li style=\"list-style-type: none;\">\r\n<ul class=\"wp-block-list\">\r\n<li>Fundamentos de Sistemas Peer-to-Peer (2h)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p><br \/><\/p>\r\n<ul class=\"wp-block-list\">\r\n<li style=\"list-style-type: none;\">\r\n<ul class=\"wp-block-list\">\r\n<li>Fundamentos de Servidores Proxy (1h)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p><br \/><\/p>\r\n<ul class=\"wp-block-list\">\r\n<li style=\"list-style-type: none;\">\r\n<ul class=\"wp-block-list\">\r\n<li>Concepto de DarkNet (1h)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p><br \/><\/p>\r\n<ul class=\"wp-block-list\">\r\n<li style=\"list-style-type: none;\">\r\n<ul class=\"wp-block-list\">\r\n<li>Red Tor (2h)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p><br \/><\/p>\r\n<ul class=\"wp-block-list\">\r\n<li style=\"list-style-type: none;\">\r\n<ul class=\"wp-block-list\">\r\n<li>Otras DarkNets (2h)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p><br \/><\/p>\r\n<ul class=\"wp-block-list\">\r\n<li style=\"list-style-type: none;\">\r\n<ul class=\"wp-block-list\">\r\n<li>Aplicaci\u00f3n de conceptos al Trabajo de curso (2h)<\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n<p><\/p>\r\n<p><br \/><\/p>\r\n<h2 class=\"wp-block-heading\"><strong>P\u00fablico<\/strong><\/h2>\r\n<p>\r\n\r\nEstudiantes y profesores de la Universidad de Sevilla.<\/p>\r\n<p class=\"wp-block-paragraph\"><br \/><\/p>\r\n<h2 class=\"wp-block-heading\"><strong>Coste del Curso<\/strong><\/h2>\r\n<p>\r\n\r\n12 \u20ac de tasas de secretar\u00eda. El coste del curso est\u00e1 completamente Subvencionado por la C\u00e1tedra de Ciberseguridad y Ciberinteligencia BeOneSec.<\/p>\r\n<p class=\"wp-block-paragraph\"><br \/><\/p>\r\n<h2 class=\"wp-block-heading\"><strong>Horario<\/strong><\/h2>\r\n<p>\r\n\r\nLos d\u00edas 10,12,17,18 y 19 de junio de 9:00 a 11:00 horas en el Laboratorio de Ingener\u00eda Telem\u00e1tica (Edificio de Talleres y Laboratorios de la ETSI) L3 &#8211; 1\u00aa Planta.<\/p>\r\n<p class=\"wp-block-paragraph\"><br \/><\/p>\r\n<h2 class=\"wp-block-heading\"><strong>Acreditaci\u00f3n<\/strong><\/h2>\r\n<p>\r\n\r\nDe la realizaci\u00f3n del curso mediante un Certificado expedido por la Universidad de Sevilla <em>(Centro de Formaci\u00f3n Permanente)<\/em>.<\/p>\r\n<p class=\"wp-block-paragraph\">\r\n\r\n<br \/><em><strong>M\u00e1s informaci\u00f3n<\/strong>:<\/em> <a href=\"https:\/\/cfp.us.es\/cursos\/mc\/la-darknet-fundamentos-y-aplicaciones\/4871\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cfp.us.es\/cursos\/mc\/la-darknet-fundamentos-y-aplicaciones\/4871\/<\/a><\/p>\r\n<p class=\"wp-block-paragraph\"><br \/>[\/vc_column_text][\/vc_column][\/vc_row]","protected":false},"excerpt":{"rendered":"<p>[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb&#8230;<\/p>\n","protected":false},"author":1,"featured_media":572,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6,4],"tags":[],"class_list":["post-568","post","type-post","status-publish","format-standard","has-post-thumbnail","category-formacion","category-noticia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Curso de Microcredencial - La DarkNet: fundamentos y aplicaciones<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/catedra.us.es\/ciberbeonesec\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:locale:alternate\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Curso de Microcredencial - La DarkNet: fundamentos y aplicaciones\" \/>\n<meta property=\"og:description\" content=\"[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb...\" \/>\n<meta property=\"og:url\" content=\"http:\/\/catedra.us.es\/ciberbeonesec\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/\" \/>\n<meta property=\"og:site_name\" content=\"C\u00e1tedra de Ciberseguridad y Ciberinteligencia BeOneSec\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-07T09:02:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-28T10:06:41+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/catedra.us.es\/ciberbeonesec\/wp-content\/uploads\/2025\/04\/DarkNet.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1536\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin_ciberbeonesec\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin_ciberbeonesec\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/#article\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/\"},\"author\":{\"name\":\"admin_ciberbeonesec\",\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/#\\\/schema\\\/person\\\/84870bc8f27dd411a44767d2583195a0\"},\"headline\":\"Curso de Microcredencial &#8211; La DarkNet: fundamentos y aplicaciones\",\"datePublished\":\"2025-04-07T09:02:17+00:00\",\"dateModified\":\"2025-09-28T10:06:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/\"},\"wordCount\":790,\"image\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DarkNet.png\",\"articleSection\":[\"Formaci\u00f3n\",\"Noticias\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/\",\"url\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/\",\"name\":\"Curso de Microcredencial - La DarkNet: fundamentos y aplicaciones\",\"isPartOf\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/#primaryimage\"},\"image\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DarkNet.png\",\"datePublished\":\"2025-04-07T09:02:17+00:00\",\"dateModified\":\"2025-09-28T10:06:41+00:00\",\"author\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/#\\\/schema\\\/person\\\/84870bc8f27dd411a44767d2583195a0\"},\"breadcrumb\":{\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/#primaryimage\",\"url\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DarkNet.png\",\"contentUrl\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/wp-content\\\/uploads\\\/2025\\\/04\\\/DarkNet.png\",\"width\":1536,\"height\":1024},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/2025\\\/04\\\/07\\\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microcredential Course \u2013 The DarkNet: Fundamentals and Applications\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/#website\",\"url\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/\",\"name\":\"C\u00e1tedra de Ciberseguridad y Ciberinteligencia BeOneSec\",\"description\":\"La C\u00e1tedra de Ciberseguridad y Ciberinteligencia, creada en colaboraci\u00f3n entre la Universidad de Sevilla y BeOneSec, se enmarca en una estrategia de cooperaci\u00f3n entre la universidad y el sector privado. \\u2028\\u2028Nuestro principal objetivo es fomentar la investigaci\u00f3n, divulgaci\u00f3n y promoci\u00f3n de talento en ciberseguridad, aportando valor tanto al \u00e1mbito acad\u00e9mico como al sector empresarial.\u00a0\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Person\",\"@id\":\"http:\\\/\\\/catedra.us.es\\\/ciberbeonesec\\\/#\\\/schema\\\/person\\\/84870bc8f27dd411a44767d2583195a0\",\"name\":\"admin_ciberbeonesec\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3def1154246018e763a4a698dbb309c0960c9ace661ac99b246730962e0501e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3def1154246018e763a4a698dbb309c0960c9ace661ac99b246730962e0501e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f3def1154246018e763a4a698dbb309c0960c9ace661ac99b246730962e0501e?s=96&d=mm&r=g\",\"caption\":\"admin_ciberbeonesec\"},\"sameAs\":[\"http:\\\/\\\/localhost\\\/BeOneSec\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Curso de Microcredencial - La DarkNet: fundamentos y aplicaciones","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/catedra.us.es\/ciberbeonesec\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/","og_locale":"es_ES","og_type":"article","og_title":"[:es]Curso de Microcredencial - La DarkNet: fundamentos y aplicaciones[:en]Microcredential Course \u2013 The DarkNet: Fundamentals and Applications[:] - C\u00e1tedra de Ciberseguridad y Ciberinteligencia BeOneSec","og_description":"[vc_row type=\u00bbin_container\u00bb full_screen_row_position=\u00bbmiddle\u00bb column_margin=\u00bbdefault\u00bb column_direction=\u00bbdefault\u00bb column_direction_tablet=\u00bbdefault\u00bb column_direction_phone=\u00bbdefault\u00bb scene_position=\u00bbcenter\u00bb text_color=\u00bbdark\u00bb text_align=\u00bbleft\u00bb row_border_radius=\u00bbnone\u00bb row_border_radius_applies=\u00bbbg\u00bb overflow=\u00bbvisible\u00bb overlay_strength=\u00bb0.3&#8243; gradient_direction=\u00bbleft_to_right\u00bb shape_divider_position=\u00bbbottom\u00bb bg_image_animation=\u00bbnone\u00bb][vc_column column_padding=\u00bbno-extra-padding\u00bb column_padding_tablet=\u00bbinherit\u00bb column_padding_phone=\u00bbinherit\u00bb column_padding_position=\u00bball\u00bb column_element_direction_desktop=\u00bbdefault\u00bb column_element_spacing=\u00bbdefault\u00bb desktop_text_alignment=\u00bbdefault\u00bb tablet_text_alignment=\u00bbdefault\u00bb phone_text_alignment=\u00bbdefault\u00bb background_color_opacity=\u00bb1&#8243; background_hover_color_opacity=\u00bb1&#8243; column_backdrop_filter=\u00bbnone\u00bb column_shadow=\u00bbnone\u00bb...","og_url":"http:\/\/catedra.us.es\/ciberbeonesec\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/","og_site_name":"C\u00e1tedra de Ciberseguridad y Ciberinteligencia BeOneSec","article_published_time":"2025-04-07T09:02:17+00:00","article_modified_time":"2025-09-28T10:06:41+00:00","og_image":[{"width":1536,"height":1024,"url":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-content\/uploads\/2025\/04\/DarkNet.png","type":"image\/png"}],"author":"admin_ciberbeonesec","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"admin_ciberbeonesec","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/#article","isPartOf":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/"},"author":{"name":"admin_ciberbeonesec","@id":"http:\/\/catedra.us.es\/ciberbeonesec\/#\/schema\/person\/84870bc8f27dd411a44767d2583195a0"},"headline":"Curso de Microcredencial &#8211; La DarkNet: fundamentos y aplicaciones","datePublished":"2025-04-07T09:02:17+00:00","dateModified":"2025-09-28T10:06:41+00:00","mainEntityOfPage":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/"},"wordCount":790,"image":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/#primaryimage"},"thumbnailUrl":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-content\/uploads\/2025\/04\/DarkNet.png","articleSection":["Formaci\u00f3n","Noticias"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/","url":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/","name":"Curso de Microcredencial - La DarkNet: fundamentos y aplicaciones","isPartOf":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/#website"},"primaryImageOfPage":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/#primaryimage"},"image":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/#primaryimage"},"thumbnailUrl":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-content\/uploads\/2025\/04\/DarkNet.png","datePublished":"2025-04-07T09:02:17+00:00","dateModified":"2025-09-28T10:06:41+00:00","author":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/#\/schema\/person\/84870bc8f27dd411a44767d2583195a0"},"breadcrumb":{"@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/#primaryimage","url":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-content\/uploads\/2025\/04\/DarkNet.png","contentUrl":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-content\/uploads\/2025\/04\/DarkNet.png","width":1536,"height":1024},{"@type":"BreadcrumbList","@id":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/2025\/04\/07\/curso-de-microcredencial-la-darknet-fundamentos-y-aplicaciones\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"http:\/\/catedra.us.es\/ciberbeonesec\/en\/"},{"@type":"ListItem","position":2,"name":"Microcredential Course \u2013 The DarkNet: Fundamentals and Applications"}]},{"@type":"WebSite","@id":"http:\/\/catedra.us.es\/ciberbeonesec\/#website","url":"http:\/\/catedra.us.es\/ciberbeonesec\/","name":"C\u00e1tedra de Ciberseguridad y Ciberinteligencia BeOneSec","description":"La C\u00e1tedra de Ciberseguridad y Ciberinteligencia, creada en colaboraci\u00f3n entre la Universidad de Sevilla y BeOneSec, se enmarca en una estrategia de cooperaci\u00f3n entre la universidad y el sector privado. \u2028\u2028Nuestro principal objetivo es fomentar la investigaci\u00f3n, divulgaci\u00f3n y promoci\u00f3n de talento en ciberseguridad, aportando valor tanto al \u00e1mbito acad\u00e9mico como al sector empresarial.\u00a0","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/catedra.us.es\/ciberbeonesec\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Person","@id":"http:\/\/catedra.us.es\/ciberbeonesec\/#\/schema\/person\/84870bc8f27dd411a44767d2583195a0","name":"admin_ciberbeonesec","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/f3def1154246018e763a4a698dbb309c0960c9ace661ac99b246730962e0501e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f3def1154246018e763a4a698dbb309c0960c9ace661ac99b246730962e0501e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f3def1154246018e763a4a698dbb309c0960c9ace661ac99b246730962e0501e?s=96&d=mm&r=g","caption":"admin_ciberbeonesec"},"sameAs":["http:\/\/localhost\/BeOneSec"]}]}},"_links":{"self":[{"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/posts\/568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/comments?post=568"}],"version-history":[{"count":9,"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/posts\/568\/revisions"}],"predecessor-version":[{"id":883,"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/posts\/568\/revisions\/883"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/media\/572"}],"wp:attachment":[{"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/media?parent=568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/categories?post=568"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/catedra.us.es\/ciberbeonesec\/wp-json\/wp\/v2\/tags?post=568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}