{"id":23152,"date":"2026-05-04T08:11:38","date_gmt":"2026-05-04T08:11:38","guid":{"rendered":"https:\/\/esi.uclm.es\/?page_id=23152"},"modified":"2026-05-07T18:28:55","modified_gmt":"2026-05-07T18:28:55","slug":"salidas-laborares-ciberseguridad","status":"publish","type":"page","link":"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/","title":{"rendered":"Salidas laborares: Ciberseguridad"},"content":{"rendered":"\n<style>\n  .esi-ciber {\n    --esi-blue: #0397d8;\n    --esi-blue-deep: #006fa3;\n    --esi-ink: #0a1a2a;\n    --esi-ink-soft: #3a4a5c;\n    --esi-muted: #6b7a8a;\n    --esi-line: #e5ecf3;\n    --esi-paper: #fafcfe;\n    font-family: inherit;\n    color: var(--esi-ink);\n    max-width: 1180px;\n    margin: 0 auto;\n    padding: 32px 20px 48px;\n    line-height: 1.5;\n  }\n\n  \/* HERO *\/\n  .esi-ciber-hero {\n    display: grid;\n    grid-template-columns: minmax(0, 1.4fr) minmax(240px, 1fr);\n    gap: 48px;\n    align-items: center;\n    padding: 56px 0 64px;\n    border-bottom: 1px solid var(--esi-line);\n  }\n\n  .esi-ciber-eyebrow {\n    display: inline-flex;\n    align-items: center;\n    gap: 10px;\n    font-size: 0.78rem;\n    font-weight: 500;\n    letter-spacing: 0.18em;\n    text-transform: uppercase;\n    color: var(--esi-blue);\n    margin-bottom: 28px;\n  }\n\n  .esi-ciber-eyebrow::before {\n    content: \"\";\n    width: 28px;\n    height: 1.5px;\n    background: var(--esi-blue);\n  }\n\n  .esi-ciber-title {\n    margin: 0 0 28px;\n    font-size: clamp(2.4rem, 5.2vw, 4.6rem);\n    line-height: 1.02;\n    letter-spacing: -0.035em;\n    font-weight: 500;\n    color: var(--esi-ink);\n  }\n\n  .esi-ciber-title em {\n    font-style: italic;\n    font-family: Georgia, \"Times New Roman\", serif;\n    font-weight: 400;\n    color: var(--esi-blue);\n  }\n\n  .esi-ciber-lead {\n    margin: 0;\n    max-width: 560px;\n    font-size: clamp(1.08rem, 1.4vw, 1.22rem);\n    line-height: 1.6;\n    color: var(--esi-ink-soft);\n  }\n\n  .esi-ciber-card-wrap {\n    display: flex;\n    justify-content: center;\n    align-items: center;\n  }\n\n  .esi-ciber-card-img {\n    width: min(100%, 300px);\n    border-radius: 18px;\n    transform: rotate(3deg);\n    box-shadow: 0 24px 60px rgba(10, 26, 42, 0.18);\n    transition: transform 0.3s ease;\n  }\n\n  .esi-ciber-card-img:hover {\n    transform: rotate(1deg) scale(1.02);\n  }\n\n  \/* MANIFIESTO *\/\n  .esi-ciber-manifesto {\n    padding: 72px 0;\n    border-bottom: 1px solid var(--esi-line);\n    display: grid;\n    grid-template-columns: 180px minmax(0, 1fr);\n    gap: 48px;\n    align-items: start;\n  }\n\n  .esi-ciber-manifesto-label {\n    font-size: 0.78rem;\n    font-weight: 500;\n    letter-spacing: 0.18em;\n    text-transform: uppercase;\n    color: var(--esi-muted);\n    padding-top: 12px;\n  }\n\n  .esi-ciber-manifesto-list {\n    list-style: none;\n    padding: 0;\n    margin: 0;\n    display: flex;\n    flex-direction: column;\n    gap: 32px;\n  }\n\n  .esi-ciber-manifesto-item {\n    display: grid;\n    grid-template-columns: 56px minmax(0, 1fr);\n    gap: 24px;\n    align-items: baseline;\n  }\n\n  .esi-ciber-manifesto-num {\n    font-family: Georgia, \"Times New Roman\", serif;\n    font-style: italic;\n    font-size: 2rem;\n    color: var(--esi-blue);\n    font-weight: 400;\n    line-height: 1;\n  }\n\n  .esi-ciber-manifesto-text {\n    margin: 0;\n    font-size: clamp(1.18rem, 1.7vw, 1.52rem);\n    line-height: 1.42;\n    letter-spacing: -0.012em;\n    color: var(--esi-ink);\n    font-weight: 400;\n  }\n\n  .esi-ciber-manifesto-text strong {\n    font-weight: 500;\n    color: var(--esi-blue-deep);\n  }\n\n  \/* STATS *\/\n  .esi-ciber-stats {\n    padding: 72px 0;\n    border-bottom: 1px solid var(--esi-line);\n  }\n\n  .esi-ciber-section-head {\n    display: grid;\n    grid-template-columns: 180px minmax(0, 1fr);\n    gap: 48px;\n    margin-bottom: 56px;\n    align-items: start;\n  }\n\n  .esi-ciber-section-label {\n    font-size: 0.78rem;\n    font-weight: 500;\n    letter-spacing: 0.18em;\n    text-transform: uppercase;\n    color: var(--esi-muted);\n    padding-top: 8px;\n  }\n\n  .esi-ciber-section-title {\n    margin: 0;\n    font-size: clamp(1.6rem, 2.6vw, 2.2rem);\n    line-height: 1.15;\n    letter-spacing: -0.025em;\n    font-weight: 500;\n    max-width: 640px;\n  }\n\n  .esi-ciber-section-title em {\n    font-style: italic;\n    font-family: Georgia, \"Times New Roman\", serif;\n    font-weight: 400;\n    color: var(--esi-blue);\n  }\n\n  .esi-ciber-stats-grid {\n    display: grid;\n    grid-template-columns: repeat(4, minmax(0, 1fr));\n    gap: 0;\n  }\n\n  .esi-ciber-stat {\n    padding: 24px 24px 24px 0;\n    border-left: 1px solid var(--esi-line);\n    padding-left: 24px;\n  }\n\n  .esi-ciber-stat:first-child {\n    border-left: none;\n    padding-left: 0;\n  }\n\n  .esi-ciber-stat-number {\n    display: block;\n    font-size: clamp(2.2rem, 4vw, 3.4rem);\n    font-weight: 500;\n    letter-spacing: -0.045em;\n    line-height: 1;\n    color: var(--esi-blue);\n    margin-bottom: 16px;\n  }\n\n  .esi-ciber-stat-text {\n    display: block;\n    font-size: 0.95rem;\n    color: var(--esi-ink-soft);\n    line-height: 1.5;\n  }\n\n  .esi-ciber-stat-source {\n    display: block;\n    margin-top: 10px;\n    font-size: 0.78rem;\n    color: var(--esi-muted);\n    font-weight: 500;\n    letter-spacing: 0.04em;\n  }\n\n  \/* WHY + TAGS *\/\n  .esi-ciber-why {\n    padding: 72px 0;\n    border-bottom: 1px solid var(--esi-line);\n    display: grid;\n    grid-template-columns: 180px minmax(0, 1fr);\n    gap: 48px;\n    align-items: start;\n  }\n\n  .esi-ciber-why-body p {\n    margin: 0 0 28px;\n    font-size: 1.08rem;\n    line-height: 1.65;\n    color: var(--esi-ink-soft);\n    max-width: 680px;\n  }\n\n  .esi-ciber-tags {\n    display: flex;\n    flex-wrap: wrap;\n    gap: 8px;\n  }\n\n  .esi-ciber-tag {\n    font-size: 0.88rem;\n    font-weight: 500;\n    color: var(--esi-blue-deep);\n    background: transparent;\n    border: 1px solid var(--esi-line);\n    padding: 8px 14px;\n    border-radius: 999px;\n    transition: all 0.2s ease;\n  }\n\n  .esi-ciber-tag:hover {\n    border-color: var(--esi-blue);\n    background: var(--esi-paper);\n  }\n\n  \/* \u00c1MBITOS *\/\n  .esi-ciber-apps {\n    padding: 72px 0;\n    border-bottom: 1px solid var(--esi-line);\n  }\n\n  .esi-ciber-apps-grid {\n    display: grid;\n    grid-template-columns: repeat(3, minmax(0, 1fr));\n    gap: 0;\n    border-top: 1px solid var(--esi-line);\n  }\n\n  .esi-ciber-app {\n    padding: 36px 32px;\n    border-bottom: 1px solid var(--esi-line);\n    border-right: 1px solid var(--esi-line);\n    display: flex;\n    flex-direction: column;\n    gap: 18px;\n    transition: background 0.25s ease;\n  }\n\n  .esi-ciber-app:nth-child(3n+1) {\n    padding-left: 0;\n  }\n\n  .esi-ciber-app:nth-child(3n) {\n    border-right: none;\n    padding-right: 0;\n  }\n\n  .esi-ciber-app:hover {\n    background: var(--esi-paper);\n  }\n\n  .esi-ciber-app:nth-child(n+4):not(:nth-child(n+7)) {\n    border-bottom: none;\n  }\n\n  .esi-ciber-app-icon {\n    width: 36px;\n    height: 36px;\n    color: var(--esi-blue);\n    flex-shrink: 0;\n  }\n\n  .esi-ciber-app-title {\n    margin: 0;\n    font-size: 1.08rem;\n    font-weight: 500;\n    color: var(--esi-ink);\n    letter-spacing: -0.01em;\n  }\n\n  .esi-ciber-app-desc {\n    margin: 0;\n    font-size: 0.94rem;\n    line-height: 1.55;\n    color: var(--esi-muted);\n  }\n\n  \/* CTA *\/\n  .esi-ciber-cta {\n    padding: 80px 0 24px;\n    text-align: center;\n  }\n\n  .esi-ciber-cta-title {\n    margin: 0 0 20px;\n    font-size: clamp(2rem, 4vw, 3.2rem);\n    line-height: 1.05;\n    letter-spacing: -0.035em;\n    font-weight: 500;\n    max-width: 800px;\n    margin-left: auto;\n    margin-right: auto;\n  }\n\n  .esi-ciber-cta-title em {\n    font-style: italic;\n    font-family: Georgia, \"Times New Roman\", serif;\n    font-weight: 400;\n    color: var(--esi-blue);\n  }\n\n  .esi-ciber-cta-lead {\n    margin: 0 auto 24px;\n    max-width: 580px;\n    font-size: 1.1rem;\n    line-height: 1.6;\n    color: var(--esi-ink-soft);\n  }\n\n  .esi-ciber-cta-plazas {\n    display: inline-flex;\n    align-items: baseline;\n    gap: 10px;\n    margin: 0 auto 36px;\n    padding: 14px 22px;\n    border: 1px solid var(--esi-line);\n    border-radius: 999px;\n    background: var(--esi-paper);\n  }\n\n  .esi-ciber-cta-plazas strong {\n    font-size: 1.25rem;\n    font-weight: 500;\n    color: var(--esi-blue);\n    letter-spacing: -0.01em;\n  }\n\n  .esi-ciber-cta-plazas span {\n    font-size: 0.95rem;\n    color: var(--esi-ink-soft);\n  }\n\n  .esi-ciber-buttons {\n    display: flex;\n    flex-wrap: wrap;\n    gap: 12px;\n    justify-content: center;\n  }\n\n  .esi-ciber-btn {\n    display: inline-flex;\n    align-items: center;\n    gap: 8px;\n    min-height: 50px;\n    padding: 14px 26px;\n    border-radius: 999px;\n    text-decoration: none;\n    font-weight: 500;\n    font-size: 0.98rem;\n    transition: all 0.25s ease;\n    white-space: nowrap;\n  }\n\n  .esi-ciber-btn-primary {\n    background: var(--esi-blue);\n    color: #ffffff;\n  }\n\n  .esi-ciber-btn-primary:hover {\n    background: var(--esi-blue-deep);\n    transform: translateY(-2px);\n  }\n\n  .esi-ciber-btn-secondary {\n    background: transparent;\n    color: var(--esi-blue-deep);\n    border: 1px solid var(--esi-line);\n  }\n\n  .esi-ciber-btn-secondary:hover {\n    border-color: var(--esi-blue);\n    background: var(--esi-paper);\n  }\n\n  .esi-ciber-btn-arrow {\n    width: 16px;\n    height: 16px;\n    transition: transform 0.25s ease;\n  }\n\n  .esi-ciber-btn:hover .esi-ciber-btn-arrow {\n    transform: translateX(3px);\n  }\n\n  .esi-ciber-source {\n    margin-top: 56px;\n    padding-top: 24px;\n    border-top: 1px solid var(--esi-line);\n    font-size: 0.82rem;\n    color: var(--esi-muted);\n    line-height: 1.6;\n  }\n\n  .esi-ciber-source a {\n    color: var(--esi-blue-deep);\n    text-decoration: none;\n    border-bottom: 1px solid var(--esi-line);\n  }\n\n  .esi-ciber-source a:hover {\n    border-bottom-color: var(--esi-blue);\n  }\n\n  \/* RESPONSIVE *\/\n  @media (max-width: 900px) {\n    .esi-ciber-hero,\n    .esi-ciber-manifesto,\n    .esi-ciber-section-head,\n    .esi-ciber-why {\n      grid-template-columns: 1fr;\n      gap: 24px;\n    }\n\n    .esi-ciber-stats-grid {\n      grid-template-columns: repeat(2, 1fr);\n      gap: 32px 24px;\n    }\n\n    .esi-ciber-stat {\n      border-left: none;\n      padding-left: 0;\n      border-top: 1px solid var(--esi-line);\n      padding-top: 24px;\n    }\n\n    .esi-ciber-stat:nth-child(-n+2) {\n      border-top: none;\n      padding-top: 0;\n    }\n\n    .esi-ciber-apps-grid {\n      grid-template-columns: repeat(2, 1fr);\n    }\n\n    .esi-ciber-app {\n      padding: 28px 24px !important;\n      border-right: none !important;\n    }\n\n    .esi-ciber-app:nth-child(2n+1) {\n      border-right: 1px solid var(--esi-line) !important;\n      padding-left: 0 !important;\n    }\n\n    .esi-ciber-app:nth-child(2n) {\n      padding-right: 0 !important;\n    }\n  }\n\n  @media (max-width: 560px) {\n    .esi-ciber {\n      padding: 16px 14px 32px;\n    }\n\n    .esi-ciber-hero {\n      padding: 32px 0 40px;\n    }\n\n    .esi-ciber-manifesto,\n    .esi-ciber-stats,\n    .esi-ciber-why,\n    .esi-ciber-apps {\n      padding: 48px 0;\n    }\n\n    .esi-ciber-cta {\n      padding: 56px 0 16px;\n    }\n\n    .esi-ciber-stats-grid,\n    .esi-ciber-apps-grid {\n      grid-template-columns: 1fr;\n    }\n\n    .esi-ciber-app {\n      border-right: none !important;\n      padding: 28px 0 !important;\n    }\n\n    .esi-ciber-stat:not(:first-child) {\n      border-top: 1px solid var(--esi-line);\n      padding-top: 24px;\n    }\n\n    .esi-ciber-stat:first-child {\n      border-top: none;\n    }\n\n    .esi-ciber-manifesto-item {\n      grid-template-columns: 40px minmax(0, 1fr);\n      gap: 16px;\n    }\n\n    .esi-ciber-btn {\n      width: 100%;\n      justify-content: center;\n    }\n\n    .esi-ciber-cta-plazas {\n      flex-direction: column;\n      align-items: center;\n      gap: 4px;\n      text-align: center;\n    }\n  }\n<\/style>\n\n<section class=\"esi-ciber\" aria-label=\"Landing promocional de Ciberseguridad ESI\">\n\n  <!-- HERO -->\n  <header class=\"esi-ciber-hero\">\n    <div>\n      <div class=\"esi-ciber-eyebrow\">Ciberseguridad \u00b7 Grado en Ingenier\u00eda Inform\u00e1tica<\/div>\n      <h1 class=\"esi-ciber-title\">Quien protege la infraestructura digital<br>protege <em>todo lo dem\u00e1s<\/em>.<\/h1>\n      <p class=\"esi-ciber-lead\">\n        Bancos, hospitales, redes el\u00e9ctricas, administraciones p\u00fablicas y empresas de todos los tama\u00f1os operan hoy sobre sistemas digitales. Detr\u00e1s de cada uno hay ingenieros que dise\u00f1an, auditan y defienden la infraestructura que los hace posibles. La ciberseguridad es una de las salidas m\u00e1s estrat\u00e9gicas \u2014 y peor cubiertas \u2014 de la ingenier\u00eda inform\u00e1tica.\n      <\/p>\n    <\/div>\n\n    <div class=\"esi-ciber-card-wrap\">\n      <img decoding=\"async\"\n        class=\"esi-ciber-card-img\"\n        src=\"http:\/\/esi.uclm.es\/assets\/uploads\/2026\/05\/1_Card2_ciberseguridad.png\"\n        alt=\"Tarjeta promocional de ciberseguridad de la ESI\"\n      \/>\n    <\/div>\n  <\/header>\n\n  <!-- MANIFIESTO -->\n  <section class=\"esi-ciber-manifesto\">\n    <div class=\"esi-ciber-manifesto-label\">Manifiesto<\/div>\n    <ol class=\"esi-ciber-manifesto-list\">\n      <li class=\"esi-ciber-manifesto-item\">\n        <span class=\"esi-ciber-manifesto-num\">i.<\/span>\n        <p class=\"esi-ciber-manifesto-text\">\n          La superficie de ataque crece cada a\u00f1o: m\u00e1s dispositivos conectados, m\u00e1s servicios en la nube, m\u00e1s datos sensibles en circulaci\u00f3n. <strong>Cada nueva tecnolog\u00eda que se despliega abre frentes que alguien tiene que cerrar<\/strong>, y ese alguien es un ingeniero formado para hacerlo.\n        <\/p>\n      <\/li>\n      <li class=\"esi-ciber-manifesto-item\">\n        <span class=\"esi-ciber-manifesto-num\">ii.<\/span>\n        <p class=\"esi-ciber-manifesto-text\">\n          La IA, la nube y los datos no funcionan sin una capa de seguridad s\u00f3lida que los respalde. <strong>Dise\u00f1ar esa capa es una de las decisiones de ingenier\u00eda m\u00e1s cr\u00edticas de cualquier sistema moderno<\/strong> y exige perfiles capaces de pensar en ataque y defensa al mismo tiempo.\n        <\/p>\n      <\/li>\n      <li class=\"esi-ciber-manifesto-item\">\n        <span class=\"esi-ciber-manifesto-num\">iii.<\/span>\n        <p class=\"esi-ciber-manifesto-text\">\n          La Agencia Europea de Ciberseguridad alerta de que la demanda de profesionales especializados crece m\u00e1s r\u00e1pido que la oferta de talento disponible. <strong>Pocas especialidades de la ingenier\u00eda inform\u00e1tica presentan un d\u00e9ficit estructural tan favorable para quien se forma a tiempo<\/strong>.\n        <\/p>\n      <\/li>\n    <\/ol>\n  <\/section>\n\n  <!-- STATS -->\n  <section class=\"esi-ciber-stats\">\n    <div class=\"esi-ciber-section-head\">\n      <div class=\"esi-ciber-section-label\">Por los n\u00fameros<\/div>\n      <h2 class=\"esi-ciber-section-title\">Un sector que <em>no para de crecer<\/em>, en Espa\u00f1a y en el mundo.<\/h2>\n    <\/div>\n\n    <div class=\"esi-ciber-stats-grid\">\n      <div class=\"esi-ciber-stat\">\n        <span class=\"esi-ciber-stat-number\">165k<\/span>\n        <span class=\"esi-ciber-stat-text\">profesionales trabajan ya en ciberseguridad en Espa\u00f1a.<\/span>\n        <span class=\"esi-ciber-stat-source\">INCIBE \/ CONETIC<\/span>\n      <\/div>\n\n      <div class=\"esi-ciber-stat\">\n        <span class=\"esi-ciber-stat-number\">6.351 M\u20ac<\/span>\n        <span class=\"esi-ciber-stat-text\">de facturaci\u00f3n anual del sector en Espa\u00f1a.<\/span>\n        <span class=\"esi-ciber-stat-source\">INCIBE \/ CONETIC<\/span>\n      <\/div>\n\n      <div class=\"esi-ciber-stat\">\n        <span class=\"esi-ciber-stat-number\">282k<\/span>\n        <span class=\"esi-ciber-stat-text\">empleos previstos en Espa\u00f1a para 2029.<\/span>\n        <span class=\"esi-ciber-stat-source\">INCIBE \/ CONETIC<\/span>\n      <\/div>\n\n      <div class=\"esi-ciber-stat\">\n        <span class=\"esi-ciber-stat-number\">663 B$<\/span>\n        <span class=\"esi-ciber-stat-text\">previsi\u00f3n del mercado mundial para 2033.<\/span>\n        <span class=\"esi-ciber-stat-source\">Grand View Research<\/span>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <!-- WHY -->\n  <section class=\"esi-ciber-why\">\n    <div class=\"esi-ciber-section-label\">Por qu\u00e9 estudiarla<\/div>\n    <div class=\"esi-ciber-why-body\">\n      <p>\n        Porque la ciberseguridad atraviesa todas las capas de un sistema moderno: la red por la que circulan los datos, los sistemas operativos que ejecutan los servicios, las bases de datos que los almacenan, las aplicaciones que los procesan y los protocolos que los conectan. Defender ese conjunto exige una formaci\u00f3n t\u00e9cnica completa, no un barniz superficial. En el grado trabajar\u00e1s los pilares que sostienen la disciplina: programaci\u00f3n, redes de computadores, sistemas operativos, bases de datos, sistemas distribuidos, ingenier\u00eda del software y criptograf\u00eda aplicada. La ESI ofrece adem\u00e1s asignaturas dedicadas a seguridad en cada una de sus tres menciones \u2014 Seguridad de Sistemas Software, Seguridad en Redes y Seguridad en Sistemas Inform\u00e1ticos \u2014 junto con optativas como An\u00e1lisis Forense Inform\u00e1tico que permiten profundizar en la vertiente que m\u00e1s te interese.\n      <\/p>\n\n      <div class=\"esi-ciber-tags\">\n        <span class=\"esi-ciber-tag\">Seguridad de redes<\/span>\n        <span class=\"esi-ciber-tag\">Seguridad de software<\/span>\n        <span class=\"esi-ciber-tag\">Criptograf\u00eda aplicada<\/span>\n        <span class=\"esi-ciber-tag\">Hacking \u00e9tico<\/span>\n        <span class=\"esi-ciber-tag\">An\u00e1lisis forense<\/span>\n        <span class=\"esi-ciber-tag\">Cloud security<\/span>\n        <span class=\"esi-ciber-tag\">IA aplicada a la defensa<\/span>\n        <span class=\"esi-ciber-tag\">Protecci\u00f3n de datos<\/span>\n      <\/div>\n    <\/div>\n  <\/section>\n\n  <!-- \u00c1MBITOS DE APLICACI\u00d3N -->\n  <section class=\"esi-ciber-apps\">\n    <div class=\"esi-ciber-section-head\">\n      <div class=\"esi-ciber-section-label\">D\u00f3nde se aplica<\/div>\n      <h2 class=\"esi-ciber-section-title\">Toda industria conectada<br>necesita ingenieros que la <em>defiendan<\/em>.<\/h2>\n    <\/div>\n\n    <div class=\"esi-ciber-apps-grid\">\n\n      <article class=\"esi-ciber-app\">\n        <svg class=\"esi-ciber-app-icon\" viewBox=\"0 0 36 36\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\">\n          <rect x=\"6\" y=\"11\" width=\"24\" height=\"16\" rx=\"2\"\/>\n          <path d=\"M6 16h24\"\/>\n          <path d=\"M11 22h4\"\/>\n          <circle cx=\"22\" cy=\"22\" r=\"1\"\/>\n        <\/svg>\n        <h3 class=\"esi-ciber-app-title\">Empresas y banca<\/h3>\n        <p class=\"esi-ciber-app-desc\">Protecci\u00f3n de transacciones, identidad digital, auditor\u00edas y prevenci\u00f3n del fraude.<\/p>\n      <\/article>\n\n      <article class=\"esi-ciber-app\">\n        <svg class=\"esi-ciber-app-icon\" viewBox=\"0 0 36 36\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\">\n          <path d=\"M18 30s-10-5.5-10-13.5a6 6 0 0 1 10-4.5 6 6 0 0 1 10 4.5C28 24.5 18 30 18 30z\"\/>\n          <path d=\"M14 18h2.5l1.5-3 2 6 1.5-3H24\"\/>\n        <\/svg>\n        <h3 class=\"esi-ciber-app-title\">Sanidad y datos sensibles<\/h3>\n        <p class=\"esi-ciber-app-desc\">Defensa de historiales cl\u00ednicos, dispositivos conectados y servicios cr\u00edticos.<\/p>\n      <\/article>\n\n      <article class=\"esi-ciber-app\">\n        <svg class=\"esi-ciber-app-icon\" viewBox=\"0 0 36 36\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\">\n          <circle cx=\"18\" cy=\"18\" r=\"3\"\/>\n          <path d=\"M18 7v3M18 26v3M7 18h3M26 18h3M10.5 10.5l2 2M23.5 23.5l2 2M10.5 25.5l2-2M23.5 12.5l2-2\"\/>\n        <\/svg>\n        <h3 class=\"esi-ciber-app-title\">Industria 4.0 e IoT<\/h3>\n        <p class=\"esi-ciber-app-desc\">Seguridad en sensores, robots, veh\u00edculos conectados y sistemas de producci\u00f3n.<\/p>\n      <\/article>\n\n      <article class=\"esi-ciber-app\">\n        <svg class=\"esi-ciber-app-icon\" viewBox=\"0 0 36 36\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\">\n          <path d=\"M18 5l11 4v8c0 7-5 11-11 14-6-3-11-7-11-14V9l11-4z\"\/>\n          <path d=\"M14 18l3 3 5-6\"\/>\n        <\/svg>\n        <h3 class=\"esi-ciber-app-title\">Administraci\u00f3n p\u00fablica<\/h3>\n        <p class=\"esi-ciber-app-desc\">Protecci\u00f3n de infraestructuras, servicios digitales y sistemas de informaci\u00f3n.<\/p>\n      <\/article>\n\n      <article class=\"esi-ciber-app\">\n        <svg class=\"esi-ciber-app-icon\" viewBox=\"0 0 36 36\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\">\n          <rect x=\"5\" y=\"11\" width=\"26\" height=\"14\" rx=\"3\"\/>\n          <circle cx=\"12\" cy=\"18\" r=\"1.5\"\/>\n          <circle cx=\"15\" cy=\"18\" r=\"1.5\"\/>\n          <path d=\"M22 16v4M24 18h-4\"\/>\n          <circle cx=\"27\" cy=\"16\" r=\"1\"\/>\n          <circle cx=\"27\" cy=\"20\" r=\"1\"\/>\n        <\/svg>\n        <h3 class=\"esi-ciber-app-title\">Videojuegos y apps<\/h3>\n        <p class=\"esi-ciber-app-desc\">Protecci\u00f3n frente a trampas, robo de cuentas, ingenier\u00eda inversa y abuso de APIs.<\/p>\n      <\/article>\n\n      <article class=\"esi-ciber-app\">\n        <svg class=\"esi-ciber-app-icon\" viewBox=\"0 0 36 36\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.4\" stroke-linecap=\"round\" stroke-linejoin=\"round\" aria-hidden=\"true\">\n          <circle cx=\"18\" cy=\"18\" r=\"4\"\/>\n          <path d=\"M18 4v4M18 28v4M4 18h4M28 18h4\"\/>\n          <path d=\"M8 8l3 3M25 25l3 3M8 28l3-3M25 11l3-3\"\/>\n          <circle cx=\"18\" cy=\"18\" r=\"10\" stroke-dasharray=\"2 3\"\/>\n        <\/svg>\n        <h3 class=\"esi-ciber-app-title\">Investigaci\u00f3n e IA<\/h3>\n        <p class=\"esi-ciber-app-desc\">Detecci\u00f3n autom\u00e1tica de amenazas, an\u00e1lisis de comportamiento y respuesta inteligente.<\/p>\n      <\/article>\n\n    <\/div>\n  <\/section>\n\n  <!-- CTA -->\n  <section class=\"esi-ciber-cta\">\n    <h2 class=\"esi-ciber-cta-title\">Empieza en la ESI.<br>Construye tecnolog\u00eda <em>segura<\/em>.<\/h2>\n    <p class=\"esi-ciber-cta-lead\">\n      La Ingenier\u00eda Inform\u00e1tica te abre la puerta a una profesi\u00f3n con impacto, empleabilidad y futuro.\n    <\/p>\n\n    <div class=\"esi-ciber-cta-plazas\">\n      <strong>160 plazas<\/strong>\n      <span>de nuevo ingreso cada a\u00f1o<\/span>\n    <\/div>\n\n    <div class=\"esi-ciber-buttons\">\n      <a class=\"esi-ciber-btn esi-ciber-btn-primary\" href=\"https:\/\/esi.uclm.es\/index.php\/grado-en-ingenieria-informatica\/plan-de-estudios\/\">\n        Nuestro Grado\n        <svg class=\"esi-ciber-btn-arrow\" viewBox=\"0 0 16 16\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.6\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M3 8h10M9 4l4 4-4 4\"\/><\/svg>\n      <\/a>\n\n      <a class=\"esi-ciber-btn esi-ciber-btn-secondary\" href=\"https:\/\/esi.uclm.es\/index.php\/doble-grado-informatica-ade\/\">\n        Doble Grado Inform\u00e1tica-ADE\n        <svg class=\"esi-ciber-btn-arrow\" viewBox=\"0 0 16 16\" fill=\"none\" stroke=\"currentColor\" stroke-width=\"1.6\" stroke-linecap=\"round\" stroke-linejoin=\"round\"><path d=\"M3 8h10M9 4l4 4-4 4\"\/><\/svg>\n      <\/a>\n\n      <a class=\"esi-ciber-btn esi-ciber-btn-secondary\" href=\"https:\/\/esi.uclm.es\">\n        Web de la ESI\n      <\/a>\n    <\/div>\n\n    <p class=\"esi-ciber-source\">\n      Fuentes:\n      <a href=\"https:\/\/www.incibe.es\/empresas\/blog\/ciberseguridad-en-espana-nuevos-retos-y-estrategias-clave-para-las-empresas\">INCIBE\/CONETIC, Estudio sobre la industria de la ciberseguridad en Espa\u00f1a 2025<\/a>;\n      <a href=\"https:\/\/www.enisa.europa.eu\/publications\/2024-report-on-the-state-of-cybersecurity-in-the-union\">ENISA, 2024 Report on the State of Cybersecurity in the Union<\/a>;\n      <a href=\"https:\/\/www.grandviewresearch.com\/industry-analysis\/cyber-security-market\">Grand View Research, Cybersecurity Market Report 2026-2033<\/a>.\n    <\/p>\n  <\/section>\n\n<\/section>\n","protected":false},"excerpt":{"rendered":"<p>Ciberseguridad \u00b7 Grado en Ingenier\u00eda Inform\u00e1tica Quien protege la infraestructura digitalprotege todo lo dem\u00e1s. Bancos, hospitales, redes el\u00e9ctricas, administraciones p\u00fablicas y empresas de todos los tama\u00f1os operan hoy sobre sistemas digitales. Detr\u00e1s de cada uno hay ingenieros que dise\u00f1an, auditan y defienden la infraestructura que [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-23152","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Salidas laborares: Ciberseguridad - Escuela Superior de Inform\u00e1tica de UCLM<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Salidas laborares: Ciberseguridad - Escuela Superior de Inform\u00e1tica de UCLM\" \/>\n<meta property=\"og:description\" content=\"Ciberseguridad \u00b7 Grado en Ingenier\u00eda Inform\u00e1tica Quien protege la infraestructura digitalprotege todo lo dem\u00e1s. Bancos, hospitales, redes el\u00e9ctricas, administraciones p\u00fablicas y empresas de todos los tama\u00f1os operan hoy sobre sistemas digitales. Detr\u00e1s de cada uno hay ingenieros que dise\u00f1an, auditan y defienden la infraestructura que [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/\" \/>\n<meta property=\"og:site_name\" content=\"Escuela Superior de Inform\u00e1tica de UCLM\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Escuela-Superior-de-Informtica-543261809027158\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-07T18:28:55+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@esiuclm\" \/>\n<meta name=\"twitter:label1\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data1\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/index.php\\\/salidas-laborares-ciberseguridad\\\/\",\"url\":\"https:\\\/\\\/esi.uclm.es\\\/index.php\\\/salidas-laborares-ciberseguridad\\\/\",\"name\":\"Salidas laborares: Ciberseguridad - Escuela Superior de Inform\u00e1tica de UCLM\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/#website\"},\"datePublished\":\"2026-05-04T08:11:38+00:00\",\"dateModified\":\"2026-05-07T18:28:55+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/index.php\\\/salidas-laborares-ciberseguridad\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/esi.uclm.es\\\/index.php\\\/salidas-laborares-ciberseguridad\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/index.php\\\/salidas-laborares-ciberseguridad\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/esi.uclm.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Salidas laborares: Ciberseguridad\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/#website\",\"url\":\"https:\\\/\\\/esi.uclm.es\\\/\",\"name\":\"Escuela Superior de Inform\u00e1tica de UCLM en Ciudad Real, Castilla-La Mancha\",\"description\":\"La Escuela Superior de Inform\u00e1tica de Ciudad Real (Castilla-La Mancha), Universidad de Castilla-La Mancha es un centro universitario que imparte el ciclo completo de Ingenier\u00eda en Inform\u00e1tica: grado, m\u00e1ster y doctorado.\",\"publisher\":{\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/esi.uclm.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/#organization\",\"name\":\"Escuela Superior de Inform\u00e1tica de UCLM\",\"url\":\"https:\\\/\\\/esi.uclm.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/esi.uclm.es\\\/assets\\\/uploads\\\/2022\\\/03\\\/LogoESI_cabecera-1.png\",\"contentUrl\":\"https:\\\/\\\/esi.uclm.es\\\/assets\\\/uploads\\\/2022\\\/03\\\/LogoESI_cabecera-1.png\",\"width\":460,\"height\":184,\"caption\":\"Escuela Superior de Inform\u00e1tica de UCLM\"},\"image\":{\"@id\":\"https:\\\/\\\/esi.uclm.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Escuela-Superior-de-Informtica-543261809027158\",\"https:\\\/\\\/x.com\\\/esiuclm\",\"https:\\\/\\\/www.instagram.com\\\/esiuclm\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/esiuclm\",\"https:\\\/\\\/www.twitch.tv\\\/esiuclm\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/12656631\\\/admin\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Salidas laborares: Ciberseguridad - Escuela Superior de Inform\u00e1tica de UCLM","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/","og_locale":"es_ES","og_type":"article","og_title":"Salidas laborares: Ciberseguridad - Escuela Superior de Inform\u00e1tica de UCLM","og_description":"Ciberseguridad \u00b7 Grado en Ingenier\u00eda Inform\u00e1tica Quien protege la infraestructura digitalprotege todo lo dem\u00e1s. Bancos, hospitales, redes el\u00e9ctricas, administraciones p\u00fablicas y empresas de todos los tama\u00f1os operan hoy sobre sistemas digitales. Detr\u00e1s de cada uno hay ingenieros que dise\u00f1an, auditan y defienden la infraestructura que [&hellip;]","og_url":"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/","og_site_name":"Escuela Superior de Inform\u00e1tica de UCLM","article_publisher":"https:\/\/www.facebook.com\/Escuela-Superior-de-Informtica-543261809027158","article_modified_time":"2026-05-07T18:28:55+00:00","twitter_card":"summary_large_image","twitter_site":"@esiuclm","twitter_misc":{"Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/","url":"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/","name":"Salidas laborares: Ciberseguridad - Escuela Superior de Inform\u00e1tica de UCLM","isPartOf":{"@id":"https:\/\/esi.uclm.es\/#website"},"datePublished":"2026-05-04T08:11:38+00:00","dateModified":"2026-05-07T18:28:55+00:00","breadcrumb":{"@id":"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/esi.uclm.es\/index.php\/salidas-laborares-ciberseguridad\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/esi.uclm.es\/"},{"@type":"ListItem","position":2,"name":"Salidas laborares: Ciberseguridad"}]},{"@type":"WebSite","@id":"https:\/\/esi.uclm.es\/#website","url":"https:\/\/esi.uclm.es\/","name":"Escuela Superior de Inform\u00e1tica de UCLM en Ciudad Real, Castilla-La Mancha","description":"La Escuela Superior de Inform\u00e1tica de Ciudad Real (Castilla-La Mancha), Universidad de Castilla-La Mancha es un centro universitario que imparte el ciclo completo de Ingenier\u00eda en Inform\u00e1tica: grado, m\u00e1ster y doctorado.","publisher":{"@id":"https:\/\/esi.uclm.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/esi.uclm.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/esi.uclm.es\/#organization","name":"Escuela Superior de Inform\u00e1tica de UCLM","url":"https:\/\/esi.uclm.es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/esi.uclm.es\/#\/schema\/logo\/image\/","url":"https:\/\/esi.uclm.es\/assets\/uploads\/2022\/03\/LogoESI_cabecera-1.png","contentUrl":"https:\/\/esi.uclm.es\/assets\/uploads\/2022\/03\/LogoESI_cabecera-1.png","width":460,"height":184,"caption":"Escuela Superior de Inform\u00e1tica de UCLM"},"image":{"@id":"https:\/\/esi.uclm.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Escuela-Superior-de-Informtica-543261809027158","https:\/\/x.com\/esiuclm","https:\/\/www.instagram.com\/esiuclm\/","https:\/\/www.youtube.com\/user\/esiuclm","https:\/\/www.twitch.tv\/esiuclm","https:\/\/www.linkedin.com\/company\/12656631\/admin\/"]}]}},"_links":{"self":[{"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/pages\/23152","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/comments?post=23152"}],"version-history":[{"count":7,"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/pages\/23152\/revisions"}],"predecessor-version":[{"id":23298,"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/pages\/23152\/revisions\/23298"}],"wp:attachment":[{"href":"https:\/\/esi.uclm.es\/index.php\/wp-json\/wp\/v2\/media?parent=23152"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}