{"id":908,"date":"2017-10-19T22:28:18","date_gmt":"2017-10-19T22:28:18","guid":{"rendered":"http:\/\/localhost\/fares\/?post_type=product&#038;p=908"},"modified":"2024-07-28T01:07:16","modified_gmt":"2024-07-28T01:07:16","slug":"redes-informaticas-i-y-ii","status":"publish","type":"product","link":"https:\/\/prueba.editorialfares.com\/wpcsv\/producto\/redes-informaticas-i-y-ii\/","title":{"rendered":""},"content":{"rendered":"<table border=\"0\">\n<tbody>\n<tr>\n<th scope=\"col\" align=\"center\" valign=\"middle\" bgcolor=\"#E5E7EF\" width=\"512\"><strong style=\"font-family: Segoe, 'Segoe UI', 'DejaVu Sans', 'Trebuchet MS', Verdana, sans-serif; text-align: center; font-size: 20px; color: #202a51;\"> Contenidos conceptuales<\/strong><\/th>\n<th scope=\"col\" align=\"center\" valign=\"middle\" bgcolor=\"#ECF6F7\" width=\"513\"><strong style=\"font-family: Segoe, 'Segoe UI', 'DejaVu Sans', 'Trebuchet MS', Verdana, sans-serif; text-align: center; font-size: 20px; color: #202a51;\">Contenidos procedimentales <\/strong><\/th>\n<th scope=\"col\" align=\"center\" valign=\"middle\" bgcolor=\"#FAF2E0\" width=\"513\"><strong style=\"font-family: Segoe, 'Segoe UI', 'DejaVu Sans', 'Trebuchet MS', Verdana, sans-serif; text-align: center; font-size: 20px; color: #202a51;\">Contenidos actitudinales <\/strong><\/th>\n<\/tr>\n<tr>\n<td>\n<ul>\n<li><span style=\"color: #202a51;\">Introducci\u00f3n a las redes<\/span><\/li>\n<li><span style=\"color: #202a51;\">Tipos de redes inform\u00e1ticas<\/span><\/li>\n<li><span style=\"color: #202a51;\">Elementos de una red<\/span><\/li>\n<li><span style=\"color: #202a51;\">Internet de las cosas (loT)<\/span><\/li>\n<li><span style=\"color: #202a51;\">Modelos en capa<\/span><\/li>\n<li><span style=\"color: #202a51;\">Ethernet<\/span><\/li>\n<li><span style=\"color: #202a51;\">Capa f\u00edsica<\/span><\/li>\n<li><span style=\"color: #202a51;\">Cables de red<\/span><\/li>\n<li><span style=\"color: #202a51;\">Direccionamiento de la red<\/span><\/li>\n<li><span style=\"color: #202a51;\">Tipos de direcciones IP<\/span><\/li>\n<li><span style=\"color: #202a51;\">Estrategia para asignar direcciones IP<\/span><\/li>\n<li><span style=\"color: #202a51;\">Subneteo<\/span><\/li>\n<li><span style=\"color: #202a51;\">Puerta de enlace (Gateway)<\/span><\/li>\n<li><span style=\"color: #202a51;\">Comandos de red<\/span><\/li>\n<li><span style=\"color: #202a51;\">Redes inal\u00e1mbricas (WLAN)<\/span><\/li>\n<li><span style=\"color: #202a51;\">Configuraci\u00f3n de routers<\/span><\/li>\n<li><span style=\"color: #202a51;\">Servidor<\/span><\/li>\n<li><span style=\"color: #202a51;\">Active directory<\/span><\/li>\n<li><span style=\"color: #202a51;\">Unidades organizativas<\/span><\/li>\n<li><span style=\"color: #202a51;\">Cisco packet tracer 8.2.0<\/span><\/li>\n<li><span style=\"color: #202a51;\">VirtualBox<\/span><\/li>\n<li><span style=\"color: #202a51;\">Seguridad inform\u00e1tica<\/span><\/li>\n<li><span style=\"color: #202a51;\">Malware<\/span><\/li>\n<li><span style=\"color: #202a51;\">Ingenier\u00eda social<\/span><\/li>\n<li><span style=\"color: #202a51;\">Virus inform\u00e1tico<\/span><\/li>\n<li><span style=\"color: #202a51;\">Antivirus<\/span><\/li>\n<\/ul>\n<\/td>\n<td>\n<ul>\n<li><span style=\"color: #202a51;\">Preparar un cable de ethernet par trenzado.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Compartir recursos en red con Windows 11.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Ver los dispositivos compartidos en la red.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Compartir carpetas en red con Windows 11.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Configurar impresora en red.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Configurar router nexxt nebula 300 plus en modo WISP.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Conectar equipos a una red inal\u00e1mbrica basada en infraestructura.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Instalar Windows server 2022.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Crear dominio, instalar y configurar controlador de dominio de Active directory.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Instalar Ubuntu server 22.04 LTS.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Instalaci\u00f3n y configuraci\u00f3n del servidor DHCP en Ubuntu server.<\/span><\/li>\n<\/ul>\n<\/td>\n<td>\n<ul>\n<li><span style=\"color: #202a51;\">Participa activamente en la instalaci\u00f3n de redes LAN.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Valoraci\u00f3n a los procedimientos necesarios para crear una red en las pr\u00e1cticas de laboratorio.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Es consciente que la seguridad inform\u00e1tica protege el acceso, el uso e integridad de la red y datos corporativos.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Realizaci\u00f3n de las estrategias de aprendizaje.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Disposici\u00f3n al trabajo en equipo.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Respeto a normas de convivencia.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Creatividad para la distribuci\u00f3n de las redes, cables, computadoras.<\/span><\/li>\n<li><span style=\"color: #202a51;\">Utilizaci\u00f3n de la l\u00f3gica y pensamiento racional.<\/span><\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"<p><strong style=\"font-family: Segoe, 'Segoe UI', 'DejaVu Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 20px;\">Programas<\/strong><\/p>\n<ul>\n<li>VirtualBox<\/li>\n<li>Windows Server 2022<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong style=\"font-family: Segoe, 'Segoe UI', 'DejaVu Sans', 'Trebuchet MS', Verdana, sans-serif; font-size: 20px;\">Unidades en que se divide el libro<\/strong><\/p>\n<ul>\n<li>Unidad did\u00e1ctica 1: <strong>Conceptos b\u00e1sicos de redes y Dispositivos de red<\/strong><\/li>\n<li>Unidad did\u00e1ctica 2: <strong>Instalaci\u00f3n y administraci\u00f3n de redes LAN<\/strong><\/li>\n<li>Unidad did\u00e1ctica 3: <strong>Redes inal\u00e1mbricas y Servidores<\/strong><\/li>\n<li>Unidad did\u00e1ctica 4: <strong>M\u00e1quinas virtuales y Seguridad inform\u00e1tica<\/strong><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"featured_media":1504,"comment_status":"open","ping_status":"closed","template":"","meta":{"pagelayer_contact_templates":[],"_pagelayer_content":""},"product_brand":[],"product_cat":[29,20,49,46],"product_tag":[],"class_list":{"0":"post-908","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-iii-bachillerato-tecnico-profesional-en-informatica","7":"product_cat-todos","8":"product_cat-bookslider","9":"product_cat-redes","11":"first","12":"instock","13":"shipping-taxable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/product\/908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/comments?post=908"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/media\/1504"}],"wp:attachment":[{"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/media?parent=908"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/product_brand?post=908"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/product_cat?post=908"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/prueba.editorialfares.com\/wpcsv\/wp-json\/wp\/v2\/product_tag?post=908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}