{"id":1903,"date":"2024-03-07T06:02:46","date_gmt":"2024-03-07T05:02:46","guid":{"rendered":"https:\/\/ciberseguridad.situada.online\/?page_id=1903"},"modified":"2024-04-27T08:22:22","modified_gmt":"2024-04-27T06:22:22","slug":"guia","status":"publish","type":"page","link":"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/guia\/","title":{"rendered":"Resource 3: Guide"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-3ad17e27 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a1eebc0\"><h1 class=\"uagb-heading-text\">Resource 3: Guide<\/h1><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f8ec2bd3 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4220334d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">The practical guide is an indispensable tool that provides a step-by-step approach to implementing open-source SIEM in organizations. Through clear instructions and practical examples, the guide helps users define the project, install and configure the software, integrate it with other existing open-source cybersecurity tools, and provide ongoing maintenance. With expert guidance, the guide facilitates an efficient SIEM implementation, ensuring a robust and sustainable solution over time.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b59ff7ed alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image uagb-block-f5222877 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource3-1.png 1414w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource3-1-212x300.png 212w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource3-1-724x1024.png 724w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource3-1-768x1086.png 768w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource3-1-1086x1536.png 1086w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource3-1-8x12.png 8w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource3-1.png\" alt=\"\" class=\"uag-image-2130\" width=\"739\" height=\"1045\" title=\"portada_recurso3\" loading=\"lazy\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-75e5dba5\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-06be232d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-53aba445 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/drive.google.com\/file\/d\/1C-5U1H1iaI2WuPADuehE2tGIpw_9MLvP\/view?usp=drive_link\" rel=\"follow noopener\" target=\"_blank\"><div class=\"uagb-button__link\">Descarga en Espa\u00f1ol<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-bbde84e2\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-0a45d0e0 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/drive.google.com\/file\/d\/1dFw44-8wYwB6q92PxBaPklYib--pazC-\/view?usp=drive_link\" rel=\"follow noopener\" target=\"_blank\"><div class=\"uagb-button__link\">Download in English<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-b9ead133\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-879b59fa alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image aligncenter uagb-block-1677c98e wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1.png 1587w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1-212x300.png 212w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1-724x1024.png 724w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1-768x1086.png 768w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1-1086x1536.png 1086w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1-1448x2048.png 1448w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1-8x12.png 8w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource3.situada.online1.png\" alt=\"\" class=\"uag-image-2110\" width=\"742\" height=\"1049\" title=\"ciberseguridad_recurso3.situada.online\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-39b1a2e3\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-31af2d26 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-82b50b32 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Reference<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Trabajo de Fin de M\u00e1ster (TFM) del Master en Ciberseguridad, titulado \u201cMetodolog\u00eda para la implementaci\u00f3n de un SIEM open-source robusto en organizaciones de la Administraci\u00f3n P\u00fablica\u00bb.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-9bf3dc1b\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Resource 3: Guide<\/p>","protected":false},"author":1,"featured_media":0,"parent":1324,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"ximenamar04","author_link":"https:\/\/ciberseguridad.situada.online\/en\/author\/ximenamar04\/"},"uagb_comment_info":0,"uagb_excerpt":"Recurso 3: Gu\u00eda","_links":{"self":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1903"}],"collection":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/comments?post=1903"}],"version-history":[{"count":23,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1903\/revisions"}],"predecessor-version":[{"id":2153,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1903\/revisions\/2153"}],"up":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/media?parent=1903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}