{"id":1916,"date":"2024-03-07T06:17:51","date_gmt":"2024-03-07T05:17:51","guid":{"rendered":"https:\/\/ciberseguridad.situada.online\/?page_id=1916"},"modified":"2024-04-27T08:22:50","modified_gmt":"2024-04-27T06:22:50","slug":"manual","status":"publish","type":"page","link":"https:\/\/ciberseguridad.situada.online\/en\/proyecto\/manual\/","title":{"rendered":"Resource 2: Manual"},"content":{"rendered":"<div class=\"wp-block-uagb-container uagb-block-3ad17e27 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-advanced-heading uagb-block-8a1eebc0\"><h1 class=\"uagb-heading-text\">Resource 2: Manual<\/h1><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-f8ec2bd3 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-4220334d uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><\/div><p class=\"uagb-ifb-desc\">The user manual offers clear, practical instructions on using the open-source SIEM's key functionalities to detect cyber threats. Examples of use cases and valuable tips help users maximize the tool's effectiveness and ensure continued protection of the organization's critical systems and data.&nbsp;<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-b59ff7ed alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image uagb-block-f5222877 wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-none\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource2.png 1414w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource2-212x300.png 212w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource2-724x1024.png 724w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource2-768x1086.png 768w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource2-1086x1536.png 1086w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource2-8x12.png 8w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/portada_resource2.png\" alt=\"\" class=\"uag-image-2118\" width=\"730\" height=\"1033\" title=\"portada_recurso2\" loading=\"lazy\"\/><\/figure><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-75e5dba5\">\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-06be232d\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-53aba445 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/drive.google.com\/file\/d\/1ja_ec1H8uXeCWJHqc58AlDr3DiNxQwo6\/view?usp=drive_link\" rel=\"follow noopener\" target=\"_blank\"><div class=\"uagb-button__link\">Descarga en Espa\u00f1ol<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-buttons uagb-buttons__outer-wrap uagb-btn__default-btn uagb-btn-tablet__default-btn uagb-btn-mobile__default-btn uagb-block-bbde84e2\"><div class=\"uagb-buttons__wrap uagb-buttons-layout-wrap\">\n<div class=\"wp-block-uagb-buttons-child uagb-buttons__outer-wrap uagb-block-0a45d0e0 wp-block-button\"><div class=\"uagb-button__wrapper\"><a class=\"uagb-buttons-repeater wp-block-button__link\" aria-label=\"\" href=\"https:\/\/drive.google.com\/file\/d\/1Vt5FFFhui8YOQWYGsw0rSArft6A7dy8k\/view?usp=drive_link\" rel=\"follow noopener\" target=\"_blank\"><div class=\"uagb-button__link\">Download in English<\/div><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-b9ead133\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-879b59fa alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-image aligncenter uagb-block-1677c98e wp-block-uagb-image--layout-default wp-block-uagb-image--effect-static wp-block-uagb-image--align-center\"><figure class=\"wp-block-uagb-image__figure\"><img decoding=\"async\" srcset=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1.png 1587w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1-212x300.png 212w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1-724x1024.png 724w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1-768x1086.png 768w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1-1086x1536.png 1086w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1-1448x2048.png 1448w, https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1-8x12.png 8w\" sizes=\"(max-width: 480px) 150px\" src=\"https:\/\/ciberseguridad.situada.online\/wp-content\/uploads\/2024\/04\/cybersecurity_resource2.situada.online1.png\" alt=\"\" class=\"uag-image-2104\" width=\"752\" height=\"1063\" title=\"ciberseguridad_recurso2.situada.online\" loading=\"lazy\"\/><\/figure><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-39b1a2e3\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:url(&quot;data:image\/svg+xml,%3Csvg width='16' height='16' viewBox='0 0 16 16' fill='none' xmlns='http:\/\/www.w3.org\/2000\/svg'%3E%3Cpath d='M6.29312 16.9999L17 6.29302M14.2931 16.9999L17 14.293M-0.707031 15.9999L16.0002 -0.707153M8.00017 -0.707153L-0.706882 7.9999' stroke='black'\/%3E%3C\/svg%3E&quot;)\"><\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-container uagb-block-31af2d26 alignfull uagb-is-root-container\"><div class=\"uagb-container-inner-blocks-wrap\">\n<div class=\"wp-block-uagb-info-box uagb-block-82b50b32 uagb-infobox__content-wrap  uagb-infobox-icon-above-title uagb-infobox-image-valign-top\"><div class=\"uagb-ifb-content\"><div class=\"uagb-ifb-title-wrap\"><h3 class=\"uagb-ifb-title\"><strong>Reference<\/strong><\/h3><\/div><p class=\"uagb-ifb-desc\">Trabajo de Fin de M\u00e1ster (TFM) del Master en Ciberseguridad, titulado \u201cMetodolog\u00eda para la implementaci\u00f3n de un SIEM open-source robusto en organizaciones de la Administraci\u00f3n P\u00fablica\u00bb.<\/p><\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-uagb-separator uagb-block-9bf3dc1b\"><div class=\"wp-block-uagb-separator__inner\" style=\"--my-background-image:\"><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Resource 2: Manual<\/p>","protected":false},"author":1,"featured_media":0,"parent":1324,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_uag_custom_page_level_css":"","site-sidebar-layout":"no-sidebar","site-content-layout":"page-builder","ast-site-content-layout":"full-width-container","site-content-style":"unboxed","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"disabled","ast-breadcrumbs-content":"","ast-featured-img":"disabled","footer-sml-layout":"","theme-transparent-header-meta":"enabled","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"trp-custom-language-flag":false},"uagb_author_info":{"display_name":"ximenamar04","author_link":"https:\/\/ciberseguridad.situada.online\/en\/author\/ximenamar04\/"},"uagb_comment_info":0,"uagb_excerpt":"Recurso 2: Manual","_links":{"self":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1916"}],"collection":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/comments?post=1916"}],"version-history":[{"count":18,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1916\/revisions"}],"predecessor-version":[{"id":2154,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1916\/revisions\/2154"}],"up":[{"embeddable":true,"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/pages\/1324"}],"wp:attachment":[{"href":"https:\/\/ciberseguridad.situada.online\/en\/wp-json\/wp\/v2\/media?parent=1916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}