{"id":16722,"date":"2021-03-02T19:11:38","date_gmt":"2021-03-02T19:11:38","guid":{"rendered":"https:\/\/cenedcursos.com.br\/posgraduacao\/?post_type=product&#038;p=16722"},"modified":"2022-10-06T18:45:00","modified_gmt":"2022-10-06T18:45:00","slug":"seguranca-da-informacao","status":"publish","type":"product","link":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/","title":{"rendered":"Seguran\u00e7a da Informa\u00e7\u00e3o"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong><span style=\"font-size: 140%;\">P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o<\/span><\/strong><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o fornecer\u00e1 aos alunos habilidades sobre como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para prevenir e remediar sistemas de informa\u00e7\u00e3o e problemas relacionados \u00e0 rede, prevenindo poss\u00edveis amea\u00e7as.<\/span><\/p>\n<h4 id=\"ui-id-3\" class=\"qodef-accordion-title ui-accordion-header ui-state-default ui-accordion-header-active ui-state-active ui-corner-top ui-state-hover\" style=\"text-align: justify;\" tabindex=\"0\" role=\"tab\" aria-controls=\"ui-id-4\" aria-selected=\"true\" aria-expanded=\"true\"><span style=\"color: #000000;\"><strong><span class=\"qodef-tab-title\">Objetivo<\/span><\/strong><\/span><\/h4>\n<div id=\"ui-id-4\" class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" style=\"text-align: justify;\" role=\"tabpanel\" aria-labelledby=\"ui-id-3\" aria-hidden=\"false\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element \">\n<div class=\"wpb_wrapper\"><span style=\"color: #000000;\">Fornecer ao profissional a compreens\u00e3o e habilidades para atuar na \u00e1rea de seguran\u00e7a da informa\u00e7\u00e3o.<\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<h4 id=\"ui-id-5\" class=\"qodef-accordion-title ui-accordion-header ui-state-default ui-corner-all ui-state-focus\" style=\"text-align: justify;\" tabindex=\"-1\" role=\"tab\" aria-controls=\"ui-id-6\" aria-selected=\"false\" aria-expanded=\"false\"><span style=\"color: #000000;\"><strong><span class=\"qodef-tab-title\">P\u00fablico Alvo<\/span><\/strong><\/span><\/h4>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Esta P\u00f3s-Gradua\u00e7\u00e3o \u00e9 destinada a profissionais graduados na \u00e1rea tecnologia da informa\u00e7\u00e3o (TI). E tamb\u00e9m para profissionais que j\u00e1 trabalham com esta metodologia e desejam se atualizar ou detalhar mais seus conhecimento.<\/span><\/p>\n<table style=\"border-collapse: collapse; width: 100%;\">\n<tbody>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">M\u00d3DULO<\/span><\/th>\n<th style=\"width: 88.3918%;\"><span style=\"color: #000000;\">DISCIPLINA<\/span><\/th>\n<th style=\"width: 3.38573%;\"><span style=\"color: #000000;\">CH<\/span><\/th>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">1<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Doc\u00eancia no Ensino Superior<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">O ensino superior no Brasil. A Universidade na sociedade. Legisla\u00e7\u00e3o da Educa\u00e7\u00e3o Superior. A pr\u00e1tica docente no contexto da LDB (Lei n.\u00ba 9.394\/96). As teorias pedag\u00f3gicas. A did\u00e1tica: defini\u00e7\u00e3o e import\u00e2ncia no ensino superior. Planejamento do ensino. Elabora\u00e7\u00e3o de planos de ensino e pr\u00e1tica docente. Avalia\u00e7\u00e3o educacional. Ambiente virtual de aprendizagem e tecnologias para o ensino. Intera\u00e7\u00f5es em sala de aula EAD e Presencial: o papel dos professores e dos alunos.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">2<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Metodologia do Trabalho Cient\u00edfico<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Conceitos de ci\u00eancia, m\u00e9todo cient\u00edfico, hip\u00f3teses, vari\u00e1veis, probabilidade, validade, fidedignidade, amostragem; delineamentos de pesquisa; metodologia qualitativa e quantitativa; aplica\u00e7\u00e3o de question\u00e1rio em pesquisas; caracteriza\u00e7\u00e3o da linguagem cient\u00edfica e do sistema de produ\u00e7\u00e3o cient\u00edfico; elabora\u00e7\u00e3o de pesquisa acad\u00eamico-cient\u00edfica; \u00e9tica na pesquisa; t\u00e9cnicas de apresenta\u00e7\u00e3o. Resumo cient\u00edfico, artigo cient\u00edfico, ficha catalogr\u00e1fica, pr\u00e9 projeto de pesquisa, resenha, relat\u00f3rios de pesquisa, fichamento.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">3<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Empreendedorismo Pessoal<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">O emprego do futuro; Habilidades do profissional do futuro: Flexibilidade cognitiva, Negocia\u00e7\u00e3o, Orienta\u00e7\u00e3o para servir, Julgamento e tomada de decis\u00f5es, Autocontrole e Intelig\u00eancia emocional, Coordena\u00e7\u00e3o com os outros, Gest\u00e3o de pessoas, Criatividade e Vis\u00e3o inovadora, Pensamento Critico, Resolu\u00e7\u00e3o de problemas, Busca constante de conhecimento, Lideran\u00e7a pelo exemplo, Conex\u00f5es interpessoais, Determina\u00e7\u00e3o e Flexibilidade, Assumindo Riscos, Investimento de recursos; Proatividade; Planejamento estrat\u00e9gico; Gest\u00e3o do Tempo; Gest\u00e3o de Recursos Pessoais; Gest\u00e3o do conhecimento; Gest\u00e3o motivacional.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">4<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Meios Digitais e o Profissional do Futuro<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">O que \u00e9 transforma\u00e7\u00e3o digital?; Quais s\u00e3o as tend\u00eancias da transforma\u00e7\u00e3o digital?; Intelig\u00eancia Artificial: trabalha com a cria\u00e7\u00e3o de m\u00e1quinas inteligentes que executam fun\u00e7\u00f5es de maneira semelhante aos humanos; Realidade Virtual: cria uma situa\u00e7\u00e3o similar \u00e0 real usando artif\u00edcios digitais e tecnol\u00f3gicos; Business Intelligence: a utiliza\u00e7\u00e3o de informa\u00e7\u00f5es e dados para gerar intelig\u00eancia que pode ser aplicada na tomada de decis\u00e3o de um neg\u00f3cio; Automa\u00e7\u00e3o de Marketing: usa a tecnologia para diminuir o trabalho manual e garantir a assertividade das a\u00e7\u00f5es de marketing de uma empresa; Data Science: a ci\u00eancia que analisa os dados para possibilitar decis\u00f5es mais assertivas; Como a transforma\u00e7\u00e3o digital afeta sua carreira?; Como se preparar profissionalmente?; Estude muito; Pense no cliente; Conhe\u00e7a seus concorrentes; Analise seus dados; Crie propostas de valor; Tente inovar; Como a revolu\u00e7\u00e3o digital influencia na escolha da carreira?; Carreiras digitais: minha profiss\u00e3o vai morrer?<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">5<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Marketing Pessoal<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Marketing Inteligente. Portif\u00f3lios de produtos. Marketing pessoal profissional. Promo\u00e7\u00e3o pessoal, da imagem e comunica\u00e7\u00e3o. Personal Branding.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">6<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Introdu\u00e7\u00e3o \u00e0 Seguran\u00e7a da Informa\u00e7\u00e3o<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Fundamentos da Seguran\u00e7a da Informa\u00e7\u00e3o. Principais Leis, Normas e Padr\u00f5es de Seguran\u00e7a da Informa\u00e7\u00e3o. Os principais pilares da Seguran\u00e7a da Informa\u00e7\u00e3o: Confidenciabilidade, Integridade e Disponibilidade.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">7<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Seguran\u00e7a da Informa\u00e7\u00e3o: Riscos, Amea\u00e7as e Vulnerabilidades<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Principais Riscos \u00e0 Seguran\u00e7a de Informa\u00e7\u00e3o: Roubo e Sequestro de dados, Espionagem industrial e Softwares desatualizados. Pol\u00edticas de Seguran\u00e7a de Informa\u00e7\u00e3o.Tipos de amea\u00e7as: Scan, Worm, Rootkit, DDoS (nega\u00e7\u00e3o de servi\u00e7o), Ransomware, V\u00edrus de resgate, Antiv\u00edrus falsos e Phishing. Fatores que tornam a Empresa vulner\u00e1vel: Vulnerabilidade de armazenamento, comunica\u00e7\u00e3o, infraestrutura e de pessoas.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">8<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Ethical Hacking<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Defini\u00e7\u00e3o. Aspectos legais da pr\u00e1tica do Ethical Hacking. Termo de responsabilidade e confiabilidade. A import\u00e2ncia do profissional no mercado de trabalho. PenTest: objetivos principais.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">9<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Estudo sobre Redes de Computadores e Forense Computacional<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Introdu\u00e7\u00e3o \u00e0 rede de computadores. Arquitetura e classifica\u00e7\u00e3o. Principais Padr\u00f5es de Redes. Interliga\u00e7\u00e3o, protocolos e projetos de redes. Computa\u00e7\u00e3o Forense: introdu\u00e7\u00e3o e conceitos. Procedimentos de Investiga\u00e7\u00e3o: identifica\u00e7\u00e3o e preserva\u00e7\u00e3o de evid\u00eancias. Principais erros na investiga\u00e7\u00e3o. Uso e aplica\u00e7\u00e3o de ferramentas Forense.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">10<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Opera\u00e7\u00f5es e Pr\u00e1ticas de Seguran\u00e7a da Informa\u00e7\u00e3o<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Princ\u00edpios e Benef\u00edcios do COBIT (Control Objectives for Information and related Technology). A Gest\u00e3o de Controle de TI utilizando COBIT. Defini\u00e7\u00e3o de Centro de Opera\u00e7\u00e3o de Seguran\u00e7a (Security Operation Center). SOC:objetivos e import\u00e2ncia para as empresas.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">11<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Auditoria e Controle de Seguran\u00e7a<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Conceitos b\u00e1sicos de Auditoria de Seguran\u00e7a de Informa\u00e7\u00f5es e Sistemas. Confidenciabilidade e criptografia. Auditoria do Desenvolvimento e Manuten\u00e7\u00e3o de Sistemas. Auditoria da Administra\u00e7\u00e3o e Opera\u00e7\u00e3o de Redes. Auditoria dos Controles de Banco de Dados.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\">12<\/span><\/th>\n<td style=\"width: 88.3918%;\">\n<div class=\"qodef-accordion-holder qodef-ac-default  qodef-toggle clearfix accordion ui-accordion ui-accordion-icons ui-widget ui-helper-reset\">\n<h4 class=\"qodef-accordion-title ui-accordion-header ui-corner-top ui-accordion-header-active ui-state-active ui-state-hover\"><span class=\"qodef-tab-title\" style=\"color: #000000;\">Seguran\u00e7a da Informa\u00e7\u00e3o Aplicada<\/span><\/h4>\n<div class=\"qodef-accordion-content ui-accordion-content ui-helper-reset ui-widget-content ui-corner-bottom ui-accordion-content-active\" role=\"tabpanel\" aria-hidden=\"true\">\n<div class=\"qodef-accordion-content-inner\">\n<div class=\"wpb_text_column wpb_content_element\">\n<div class=\"wpb_wrapper\">\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">Seguran\u00e7a de Infraestrutura em TI: conceito e aplica\u00e7\u00e3o. Introdu\u00e7\u00e3o sobre a computa\u00e7\u00e3o em Nuvem. Tipos de nuvem: p\u00fablica, privada e h\u00edbrida &#8211; vantagens e desvantagens. Pr\u00e1ticas em computa\u00e7\u00e3o em nuvem.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/td>\n<td style=\"width: 3.38573%;\"><span style=\"color: #000000;\">60h<\/span><\/td>\n<\/tr>\n<tr>\n<th style=\"width: 8.10157%;\"><span style=\"color: #000000;\"><strong>TOTAL<\/strong><\/span><\/th>\n<td style=\"width: 91.7775%;\" colspan=\"2\"><span style=\"color: #000000;\"><strong>720h<\/strong><\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div class=\"wpb_text_column wpb_content_element grade\">\n<div class=\"wpb_wrapper\"><\/div>\n<\/div>\n<ul>\n<li class=\"text-icon\"><span style=\"color: #000000;\">\u00a0Curso 100% online, com nota 4 de excel\u00eancia na avalia\u00e7\u00e3o do MEC<\/span><\/li>\n<li class=\"text-icon\"><span style=\"color: #000000;\">\u00a0Certificado reconhecido pelo MEC, igual ao do presencial<\/span><\/li>\n<li class=\"text-icon\"><span style=\"color: #000000;\">\u00a0Certificado enviado a partir de 10 dias \u00fateis<\/span><\/li>\n<li class=\"text-icon\"><span style=\"color: #000000;\">\u00a0Conclus\u00e3o a partir de 6 meses com TCC opcional<\/span><\/li>\n<li class=\"text-icon\"><span style=\"color: #000000;\">\u00a0Cursos homologados pelo CREA\/MG e reconhecidos pelo MEC<\/span><\/li>\n<li class=\"text-icon\"><span style=\"color: #000000;\">\u00a0Estude em qualquer lugar do Brasil<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<h2><\/h2>\n<a data-animate=\"blurIn\" href=\"http:\/\/cenedcursos.com.br\/posgraduacao\/?add-to-cart=16720\" target=\"_self\" class=\"button primary is-larger box-shadow-4 expand\"  >\n    <span>Fa\u00e7a Aqui sua Matr\u00edcula<\/span>\n  <i class=\"icon-shopping-bag\" ><\/i><\/a>\n\n","protected":false},"featured_media":16721,"template":"","meta":{"jetpack_post_was_ever_published":false,"jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"product_brand":[],"product_cat":[264],"product_tag":[265,266],"class_list":{"0":"post-16722","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-gestao-ti-negocios","7":"product_tag-tecnologia","8":"product_tag-ti","10":"first","11":"instock","12":"sale","13":"featured","14":"shipping-taxable","15":"product-type-simple"},"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC<\/title>\n<meta name=\"description\" content=\"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC\" \/>\n<meta property=\"og:description\" content=\"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/\" \/>\n<meta property=\"og:site_name\" content=\"P\u00f3s-Gradua\u00e7\u00e3o \u00e0 Dist\u00e2ncia...Reconhecidos pelo MEC\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-06T18:45:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"971\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC\" \/>\n<meta name=\"twitter:description\" content=\"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/\",\"url\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/\",\"name\":\"Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC\",\"isPartOf\":{\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg\",\"datePublished\":\"2021-03-02T19:11:38+00:00\",\"dateModified\":\"2022-10-06T18:45:00+00:00\",\"description\":\"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para\",\"breadcrumb\":{\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#primaryimage\",\"url\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg\",\"contentUrl\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg\",\"width\":1280,\"height\":971,\"caption\":\"p\u00f3s seguran\u00e7a da informa\u00e7\u00e3o\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cursos\",\"item\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/todos-os-cursos\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Seguran\u00e7a da Informa\u00e7\u00e3o\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/#website\",\"url\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/\",\"name\":\"P\u00f3s-Gradua\u00e7\u00e3o \u00e0 Dist\u00e2ncia...Reconhecidos pelo MEC\",\"description\":\"Diversos Cursos de P\u00f3s-Gradua\u00e7\u00e3o a Dist\u00e2ncia Reconhecidos pelo MEC e certificados pela Universidade C\u00e2ndido Mendes (UCAM)\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cenedcursos.com.br\/posgraduacao\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC","description":"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/","og_locale":"pt_BR","og_type":"article","og_title":"Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC","og_description":"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para","og_url":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/","og_site_name":"P\u00f3s-Gradua\u00e7\u00e3o \u00e0 Dist\u00e2ncia...Reconhecidos pelo MEC","article_modified_time":"2022-10-06T18:45:00+00:00","og_image":[{"width":1280,"height":971,"url":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_title":"Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC","twitter_description":"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para","twitter_image":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg","twitter_misc":{"Est. tempo de leitura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/","url":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/","name":"Seguran\u00e7a da Informa\u00e7\u00e3o - P\u00f3s-Gradua\u00e7\u00e3o Reconhecida pelo MEC","isPartOf":{"@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#primaryimage"},"image":{"@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#primaryimage"},"thumbnailUrl":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg","datePublished":"2021-03-02T19:11:38+00:00","dateModified":"2022-10-06T18:45:00+00:00","description":"A P\u00f3s-Gradua\u00e7\u00e3o em Seguran\u00e7a da Informa\u00e7\u00e3o aborda como calcular efetivamente os riscos de viola\u00e7\u00f5es do sistema, metodologias corretas para","breadcrumb":{"@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#primaryimage","url":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg","contentUrl":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-content\/uploads\/2021\/03\/pos-seguranca-da-informacao.jpg","width":1280,"height":971,"caption":"p\u00f3s seguran\u00e7a da informa\u00e7\u00e3o"},{"@type":"BreadcrumbList","@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/produto\/seguranca-da-informacao\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cenedcursos.com.br\/posgraduacao\/"},{"@type":"ListItem","position":2,"name":"Cursos","item":"https:\/\/cenedcursos.com.br\/posgraduacao\/todos-os-cursos\/"},{"@type":"ListItem","position":3,"name":"Seguran\u00e7a da Informa\u00e7\u00e3o"}]},{"@type":"WebSite","@id":"https:\/\/cenedcursos.com.br\/posgraduacao\/#website","url":"https:\/\/cenedcursos.com.br\/posgraduacao\/","name":"P\u00f3s-Gradua\u00e7\u00e3o \u00e0 Dist\u00e2ncia...Reconhecidos pelo MEC","description":"Diversos Cursos de P\u00f3s-Gradua\u00e7\u00e3o a Dist\u00e2ncia Reconhecidos pelo MEC e certificados pela Universidade C\u00e2ndido Mendes (UCAM)","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cenedcursos.com.br\/posgraduacao\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/product\/16722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/media\/16721"}],"wp:attachment":[{"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/media?parent=16722"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/product_brand?post=16722"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/product_cat?post=16722"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/cenedcursos.com.br\/posgraduacao\/wp-json\/wp\/v2\/product_tag?post=16722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}