{"id":102582,"date":"2026-03-18T14:31:42","date_gmt":"2026-03-18T13:31:42","guid":{"rendered":"https:\/\/eiposgrados.com\/?p=102582"},"modified":"2026-03-20T13:11:11","modified_gmt":"2026-03-20T12:11:11","slug":"cybersecurity-where-do-you-fit-in","status":"publish","type":"post","link":"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/cybersecurity-where-do-you-fit-in\/","title":{"rendered":"Cybersecurity: Where do you fit in?"},"content":{"rendered":"<p>Cybersecurity is one of the fastest-growing sectors with the most job opportunities. But... do you need to know how to program? What other roles are available beyond the technical one?<\/p>\n\n\n\n<p>In this workshop you will discover, in a practical and realistic way, how the professional cybersecurity ecosystem works and what role might suit you.<\/p>\n\n\n\n<p>\ud83d\udca1 We will talk about:<br>\u2714 Blue Team: defense and monitoring<br>\u2714 Red Team: offensive security and ethical hacking<br>\u2714 Regulations, compliance and legislation<\/p>\n\n\n\n<p>\ud83d\udc69\u200d\ud83d\udcbb <strong>Taught by:<\/strong> Martha Padilla<br>Cyber Threat Intelligence Manager at JTI and lecturer in the Master&#039;s in Cybersecurity at EIP<\/p>\n\n\n\n<p>\ud83d\udcc5 <strong>Date:<\/strong> March 24<br>\u23f0 <strong>Hour:<\/strong> 4:15 PM<br>\ud83d\udccd <strong>Place:<\/strong> Innovation BOX Room \u2013 FYCMA<br>5th Cybersecurity Congress of Andalusia<\/p>\n\n\n\n<p>\ud83d\udd17 Check the workshop schedule:<br><a href=\"https:\/\/app.congresociberseguridadandalucia.es\/congreso_ciberseguridad_26\/es\/agenda\/index?cod=T&amp;idev=149721\" target=\"_blank\" rel=\"noopener\">https:\/\/app.congresociberseguridadandalucia.es\/congreso_ciberseguridad_26\/es\/agenda\/index?cod=T&amp;idev=149721<\/a><\/p>\n\n\n\n<p>\ud83c\udf10 More information about the congress and registration:<br><a href=\"https:\/\/www.juntadeandalucia.es\/congresociberseguridadandalucia\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.juntadeandalucia.es\/congresociberseguridadandalucia\/<\/a><\/p>\n\n\n\n<p>If you&#039;re considering making the leap into the industry, this workshop is for you.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"819\" height=\"1024\" src=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-819x1024.png\" alt=\"\" class=\"wp-image-102583\" title=\"\" srcset=\"https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-819x1024.png 819w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-240x300.png 240w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-768x960.png 768w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-132x165.png 132w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-123x154.png 123w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-10x12.png 10w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-160x200.png 160w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-500x625.png 500w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2-800x1000.png 800w, https:\/\/eiposgrados.com\/wp-content\/uploads\/2026\/03\/i-2.png 1080w\" sizes=\"(max-width: 819px) 100vw, 819px\" \/><\/figure>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is one of the fastest-growing sectors with the most job opportunities. But\u2026 do you need to know how to program? What other roles are available beyond the technical one? <a title=\"Cybersecurity: Where do you fit in?\" class=\"read-more\" href=\"https:\/\/eiposgrados.com\/eng\/cybersecurity-blog\/cybersecurity-where-do-you-fit-in\/\" aria-label=\"Read more about Cybersecurity: Where do you fit in?\">Read more<\/a><\/p>","protected":false},"author":4343,"featured_media":102599,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[332],"tags":[1525],"class_list":["post-102582","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-ciberseguridad","tag-ciberseguridad"],"acf":[],"_links":{"self":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/102582","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/users\/4343"}],"replies":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/comments?post=102582"}],"version-history":[{"count":0,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/posts\/102582\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media\/102599"}],"wp:attachment":[{"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/media?parent=102582"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/categories?post=102582"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eiposgrados.com\/eng\/wp-json\/wp\/v2\/tags?post=102582"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}