{"id":1,"name":"Yago Hansen","url":"http:\/\/yagohansen.com","description":"Yago Hansen is a recognized authority in IT &amp; cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense).\r\n\r\nEthical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies.\r\n\r\nHe successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT.\r\n\r\nHe is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.","link":"https:\/\/yagohansen.com\/es\/author\/yagohansen_8aizst\/","slug":"yagohansen_8aizst","avatar_urls":{"24":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-24x24.png","48":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-48x48.png","96":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-96x96.png"},"meta":[],"simple_local_avatar":{"media_id":4434,"full":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo.png","96":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-96x96.png","64":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-64x64.png","26":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-26x26.png","80":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-80x80.png","24":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-24x24.png","32":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-32x32.png","128":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-128x128.png","52":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-52x52.png","48":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-48x48.png","160":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-160x160.png","500":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo.png"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Yago Hansen CV<\/title>\n<meta name=\"description\" content=\"Yago Hansen is a recognized authority in IT &amp; cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/yagohansen.com\/es\/author\/yagohansen_8aizst\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"profile\" \/>\n<meta property=\"og:title\" content=\"Yago Hansen CV\" \/>\n<meta property=\"og:description\" content=\"Yago Hansen is a recognized authority in IT &amp; cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/\" \/>\n<meta property=\"og:site_name\" content=\"Yago Hansen CV\" \/>\n<meta property=\"og:image\" content=\"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"ProfilePage\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/author\\\/yagohansen_8aizst\\\/\",\"url\":\"https:\\\/\\\/yagohansen.com\\\/author\\\/yagohansen_8aizst\\\/\",\"name\":\"Yago Hansen CV\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/yagohansen.com\\\/#website\"},\"description\":\"Yago Hansen is a recognized authority in IT & cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/yagohansen.com\\\/author\\\/yagohansen_8aizst\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/yagohansen.com\\\/author\\\/yagohansen_8aizst\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/author\\\/yagohansen_8aizst\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/yagohansen.com\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Archives for Yago Hansen\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/#website\",\"url\":\"https:\\\/\\\/yagohansen.com\\\/\",\"name\":\"Yago Hansen CV\",\"description\":\"Yago Hansen Curriculum Vitae and background experience\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/yagohansen.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/#\\\/schema\\\/person\\\/c0e98c3353ff64de461c88b606b2ee6f\",\"name\":\"Yago Hansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/yagohansen.com\\\/wp-content\\\/uploads\\\/avatar-capucha-V9-circulo-96x96.png\",\"url\":\"https:\\\/\\\/yagohansen.com\\\/wp-content\\\/uploads\\\/avatar-capucha-V9-circulo-96x96.png\",\"contentUrl\":\"https:\\\/\\\/yagohansen.com\\\/wp-content\\\/uploads\\\/avatar-capucha-V9-circulo-96x96.png\",\"caption\":\"Yago Hansen\"},\"description\":\"Yago Hansen is a recognized authority in IT &amp; cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.\",\"sameAs\":[\"http:\\\/\\\/yagohansen.com\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/yadox\\\/\",\"https:\\\/\\\/x.com\\\/yadox\"],\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/yagohansen.com\\\/author\\\/yagohansen_8aizst\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Yago Hansen CV","description":"Yago Hansen is a recognized authority in IT & cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/yagohansen.com\/es\/author\/yagohansen_8aizst\/","og_locale":"es_ES","og_type":"profile","og_title":"Yago Hansen CV","og_description":"Yago Hansen is a recognized authority in IT & cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.","og_url":"https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/","og_site_name":"Yago Hansen CV","og_image":[{"url":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"ProfilePage","@id":"https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/","url":"https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/","name":"Yago Hansen CV","isPartOf":{"@id":"https:\/\/yagohansen.com\/#website"},"description":"Yago Hansen is a recognized authority in IT & cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.","breadcrumb":{"@id":"https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/yagohansen.com\/es\/"},{"@type":"ListItem","position":2,"name":"Archives for Yago Hansen"}]},{"@type":"WebSite","@id":"https:\/\/yagohansen.com\/#website","url":"https:\/\/yagohansen.com\/","name":"Yago Hansen CV","description":"Yago Hansen Curriculum Vitae and background experience","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/yagohansen.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Person","@id":"https:\/\/yagohansen.com\/#\/schema\/person\/c0e98c3353ff64de461c88b606b2ee6f","name":"Yago Hansen","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-96x96.png","url":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-96x96.png","contentUrl":"https:\/\/yagohansen.com\/wp-content\/uploads\/avatar-capucha-V9-circulo-96x96.png","caption":"Yago Hansen"},"description":"Yago Hansen is a recognized authority in IT &amp; cybersecurity topics. He successfully managed projects related to the design of Security technologies and devices for the private corporate (baking, insurance, auditors) and public sectors (government security, defense). Ethical hacker specialized in delivery of infrastructure and network management. During the last years he has focused on wireless and RF technologies, having successfully managed projects in design, architecture, implementation, pentesting and auditing of Wi-Fi wireless networks. He successfully managed hotspot based infrastructure, multi-point and point-to-point-technologies, mesh and other 802.11 based technologies. He successfully managed a lot of projects related to the design of IT security embedded systems (Linux based) IoT. He is an expert trainer for the government security forces, intelligence and defense and he also authored multiple publications and is a frequent speaker in international security conferences and forums. Actually he teaches about offensive hacking and Red Team procedures for the private and public sectors.","sameAs":["http:\/\/yagohansen.com","https:\/\/www.linkedin.com\/in\/yadox\/","https:\/\/x.com\/yadox"],"mainEntityOfPage":{"@id":"https:\/\/yagohansen.com\/author\/yagohansen_8aizst\/"}}]}},"_links":{"self":[{"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/yagohansen.com\/es\/wp-json\/wp\/v2\/users"}]}}