[{"id":"1367","link":"https:\/\/informaticayredes.incuve.es\/ut-4-aplicaciones-de-ofimatica\/","name":"ut-4-aplicaciones-de-ofimatica","thumbnail":{"url":false,"alt":false},"title":"UT-4 APLICACIONES DE OFIMATICA","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Dic 4, 2025","dateGMT":"2025-12-04 20:41:51","modifiedDate":"2025-12-11 21:56:19","modifiedDateGMT":"2025-12-11 20:56:19","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","content":""},{"id":"1365","link":"https:\/\/informaticayredes.incuve.es\/ut-5-aplicaciones-web-de-escritorio\/","name":"ut-5-aplicaciones-web-de-escritorio","thumbnail":{"url":false,"alt":false},"title":"UT-5 APLICACIONES WEB DE ESCRITORIO","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Dic 4, 2025","dateGMT":"2025-12-04 20:40:12","modifiedDate":"2025-12-11 21:57:09","modifiedDateGMT":"2025-12-11 20:57:09","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","content":""},{"id":"1361","link":"https:\/\/informaticayredes.incuve.es\/ut-3-servicio-de-gestion-de-archivos\/","name":"ut-3-servicio-de-gestion-de-archivos","thumbnail":{"url":false,"alt":false},"title":"UT-3 NEXTCLOUD SGEST ARCHIVOS","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Dic 4, 2025","dateGMT":"2025-12-04 20:38:44","modifiedDate":"2026-01-08 21:10:37","modifiedDateGMT":"2026-01-08 20:10:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":0},"status":"publish","content":""},{"id":"1357","link":"https:\/\/informaticayredes.incuve.es\/ut-2-sistemas-de-gestion\/","name":"ut-2-sistemas-de-gestion","thumbnail":{"url":false,"alt":false},"title":"UT-2 MOODLE LMS","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Dic 4, 2025","dateGMT":"2025-12-04 20:36:38","modifiedDate":"2026-01-08 21:01:43","modifiedDateGMT":"2026-01-08 20:01:43","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":51},"status":"publish","content":"UT2 \u2013 Sistemas de gesti\u00f3n de aprendizaje a distancia (LMS) \u00bfQu\u00e9 es un LMS? Plataforma que permite gestionar el aprendizaje en l\u00ednea. Facilita el acceso"},{"id":"1354","link":"https:\/\/informaticayredes.incuve.es\/ut-1-gestor-de-contenidos\/","name":"ut-1-gestor-de-contenidos","thumbnail":{"url":false,"alt":false},"title":"UT-1 GESTOR DE CONTENIDOS","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Dic 4, 2025","dateGMT":"2025-12-04 20:35:17","modifiedDate":"2025-12-16 13:16:03","modifiedDateGMT":"2025-12-16 12:16:03","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/aplicaciones-web-apw\/\" rel=\"category tag\">Aplicaciones Web APW<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":4,"sec":14},"status":"publish","content":"1. Preparaci\u00f3n del entorno XAMPP Iniciamos XAMPP y encendemos los m\u00f3dulos Apache y MySQL 2. Preparamos la BD para nuestro WP Creamos la BD en"},{"id":"1347","link":"https:\/\/informaticayredes.incuve.es\/tema-4-acceso-remoto\/","name":"tema-4-acceso-remoto","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/1568667753141.jpg","alt":""},"title":"Tema 4 ACCESO REMOTO","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 18:42:24","modifiedDate":"2025-12-11 21:50:37","modifiedDateGMT":"2025-12-11 20:50:37","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":17},"status":"publish","content":"Tema: Herramientas de Acceso Remoto 1. Concepto de acceso remoto El acceso remoto permite controlar o gestionar un ordenador a distancia, como si se estuviera"},{"id":"1338","link":"https:\/\/informaticayredes.incuve.es\/1338-2\/","name":"1338-2","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/malware.jpg","alt":""},"title":"TEMA 4 MALWARE Y CRIPTOGRAFIA","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 17:47:59","modifiedDate":"2025-12-11 21:53:35","modifiedDateGMT":"2025-12-11 20:53:35","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/seguridad-informatica-sgf\/\" rel=\"category tag\">Seguridad Informatica SGF<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/seguridad-informatica-sgf\/\" rel=\"category tag\">Seguridad Informatica SGF<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":16},"status":"publish","content":"Resumen \u2013 Unidad 4: Malware y Criptograf\u00eda 4.1 Introducci\u00f3n El uso masivo de las TIC exige garantizar seguridad y confianza en los sistemas. La criptograf\u00eda"},{"id":"1335","link":"https:\/\/informaticayredes.incuve.es\/tema-3-seg-logica\/","name":"tema-3-seg-logica","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/seglog.jpg","alt":""},"title":"TEMA 3 SEG LOGICA","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 17:44:10","modifiedDate":"2025-12-11 21:52:58","modifiedDateGMT":"2025-12-11 20:52:58","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/seguridad-informatica-sgf\/\" rel=\"category tag\">Seguridad Informatica SGF<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/seguridad-informatica-sgf\/\" rel=\"category tag\">Seguridad Informatica SGF<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":4},"status":"publish","content":"UNIDAD 3: SEGURIDAD L\u00d3GICA 3.1 Introducci\u00f3n Amenaza: condici\u00f3n (persona, m\u00e1quina o suceso) que puede violar la seguridad (confidencialidad, integridad o disponibilidad). Ataque = materializaci\u00f3n de"},{"id":"1330","link":"https:\/\/informaticayredes.incuve.es\/tema-3-ftp-src\/","name":"tema-3-ftp-src","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/ftp-herramientas.png","alt":""},"title":"TEMA 3 FTP (SRC)","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 16:22:21","modifiedDate":"2025-12-11 21:50:06","modifiedDateGMT":"2025-12-11 20:50:06","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":8,"sec":23},"status":"publish","content":"Qu\u00e9 es (idea general) Servicio que permite mover o copiar ficheros entre equipos en red. Incluye protocolos (formas de comunicaci\u00f3n), servidores (software que atiende peticiones)"},{"id":"1326","link":"https:\/\/informaticayredes.incuve.es\/tema-2-dns-src\/","name":"tema-2-dns-src","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/Que-es-un-servidor-DNS-scaled.jpg","alt":""},"title":"TEMA 2 DNS (SRC)","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 16:03:30","modifiedDate":"2025-12-11 21:49:33","modifiedDateGMT":"2025-12-11 20:49:33","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":45},"status":"publish","content":"\u00bfQu\u00e9 es lo importante de este tema? DNS es el servicio que convierte nombres de m\u00e1quina legibles (ej. www.ejemplo.com) en direcciones IP (ej. 93.184.216.34) y"},{"id":"1321","link":"https:\/\/informaticayredes.incuve.es\/tema-2-principios-seg-y-disp\/","name":"tema-2-principios-seg-y-disp","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/seg.webp","alt":""},"title":"TEMA 1 y 2 PRINCIPIOS SEG Y NORMAS","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 2, 2025","dateGMT":"2025-10-02 17:47:58","modifiedDate":"2025-12-11 21:52:33","modifiedDateGMT":"2025-12-11 20:52:33","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/seguridad-informatica-sgf\/\" rel=\"category tag\">Seguridad Informatica SGF<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/seguridad-informatica-sgf\/\" rel=\"category tag\">Seguridad Informatica SGF<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":50},"status":"publish","content":"CAP\u00cdTULO 1 \u00b7 Principios de seguridad y alta disponibilidad Objetivo del cap\u00edtulo: entender la problem\u00e1tica de la seguridad, los principios que la sustentan, el concepto"},{"id":"1308","link":"https:\/\/informaticayredes.incuve.es\/que-es-el-servicio-dhcp\/","name":"que-es-el-servicio-dhcp","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2024\/09\/red-LAN2-e1539806574511.jpg","alt":""},"title":"SERVICIO DHCP","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Sep 22, 2025","dateGMT":"2025-09-22 18:21:45","modifiedDate":"2025-12-11 21:48:53","modifiedDateGMT":"2025-12-11 20:48:53","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/servicios-en-red-src\/\" rel=\"category tag\">Servicios en Red SRC<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":31},"status":"publish","content":" Tema 01: Protocolo DHCP (Configuraci\u00f3n Din\u00e1mica de Host) \u00bfQu\u00e9 es el DHCP? El DHCP (Dynamic Host Configuration Protocol) es un protocolo que asigna autom\u00e1ticamente direcciones IP"}]