{"id":5380,"date":"2024-01-30T12:37:34","date_gmt":"2024-01-30T10:37:34","guid":{"rendered":"https:\/\/wawiwa-tech.com\/?page_id=5380"},"modified":"2026-03-11T15:39:26","modified_gmt":"2026-03-11T13:39:26","slug":"cybersecurity-protection-of-organizations","status":"publish","type":"page","link":"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/","title":{"rendered":"Prote\u00e7\u00e3o da seguran\u00e7a cibern\u00e9tica das organiza\u00e7\u00f5es"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5380\" class=\"elementor elementor-5380\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f4a0206 elementor-section-height-min-height elementor-section-content-middle custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3f4a0206\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-412f2665\" data-id=\"412f2665\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee71bcf elementor-widget elementor-widget-heading\" data-id=\"ee71bcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Prote\u00e7\u00e3o da seguran\u00e7a cibern\u00e9tica das organiza\u00e7\u00f5es<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25af809d elementor-widget elementor-widget-heading\" data-id=\"25af809d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Curso de aperfei\u00e7oamento, 28 horas acad\u00eamicas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2115c2 elementor-widget elementor-widget-heading\" data-id=\"5c2115c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Desenvolver o conhecimento dos princ\u00edpios de seguran\u00e7a na arena digital<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8f6122 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c8f6122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">N\u00edvel: Introdut\u00f3rio<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4265929f custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4265929f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fd066a7\" data-id=\"3fd066a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2db18b9b elementor-widget elementor-widget-text-editor\" data-id=\"2db18b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Os ataques cibern\u00e9ticos est\u00e3o aumentando em todos os lugares, o que torna a compreens\u00e3o e o controle das amea\u00e7as cibern\u00e9ticas cada vez mais importantes para garantir a resili\u00eancia das organiza\u00e7\u00f5es em todos os n\u00edveis.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-53fec5fa\" data-id=\"53fec5fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50cac22b elementor-widget elementor-widget-text-editor\" data-id=\"50cac22b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Este curso oferece uma <strong>Introdu\u00e7\u00e3o geral aos conceitos, m\u00e9todos, padr\u00f5es e pr\u00e1ticas recomendadas de defesa de seguran\u00e7a cibern\u00e9tica, com o objetivo de desenvolver uma base s\u00f3lida de conhecimento.<\/strong>\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6167863 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6167863\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f66c6ff\" data-id=\"f66c6ff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3348bf6 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"3348bf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_scale_effect&quot;:&quot;yes&quot;,&quot;motion_fx_scale_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;motion_fx_scale_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_scale_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:20,&quot;end&quot;:80}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tAo se inscrever neste curso, voc\u00ea aprender\u00e1 a lidar com incidentes de seguran\u00e7a comuns, a se familiarizar com ferramentas de seguran\u00e7a comuns e a se aprofundar em metodologias de defesa cibern\u00e9tica, incluindo a Cyber Kill Chain. Al\u00e9m disso, o curso fornece insights cruciais sobre governan\u00e7a, gerenciamento de riscos e princ\u00edpios de conformidade vitais para qualquer organiza\u00e7\u00e3o.\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-11dd455 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"11dd455\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b381644 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"b381644\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-409ef1c e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"409ef1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbfa227 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cbfa227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero oferecer este curso<br>em minha institui\u00e7\u00e3o<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0fb50f e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"f0fb50f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-b76dc31 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"b76dc31\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2eada0d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2eada0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero participar deste curso<br>ou inscrever minha equipe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-d3e9905 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"d3e9905\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-781ae5b elementor-widget elementor-widget-video\" data-id=\"781ae5b\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/www.youtube.com\\\/watch?v=24oFpE9gOfI&amp;feature=youtu.be&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78cdcfbe custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78cdcfbe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3e7f7d99\" data-id=\"3e7f7d99\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96d1ca3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"96d1ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-user-check\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-463414b0 elementor-widget elementor-widget-heading\" data-id=\"463414b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Quem deve participar?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32e3c9b2 elementor-widget elementor-widget-text-editor\" data-id=\"32e3c9b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Tomadores de decis\u00f5es organizacionais\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Funcion\u00e1rios voltados para a tecnologia<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Equipes de tecnologia e TI\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Equipes de seguran\u00e7a\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Estudantes STEM\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Graduados em Administra\u00e7\u00e3o de Empresas<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58d8fb79 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"58d8fb79\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5e02c07\" data-id=\"5e02c07\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a0dc02b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2a0dc02b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-target-arrow\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77be9cb4 elementor-widget elementor-widget-heading\" data-id=\"77be9cb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objetivos de aprendizagem<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d9f828f elementor-widget elementor-widget-text-editor\" data-id=\"1d9f828f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compreender as ferramentas de monitoramento e preven\u00e7\u00e3o da seguran\u00e7a cibern\u00e9tica\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Desenvolver um entendimento dos planos e metodologias de resposta a incidentes\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Familiarize-se com o processo de gerenciamento de vulnerabilidades e corre\u00e7\u00f5es\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Saiba mais sobre os diferentes tipos de ataques, incluindo t\u00e1ticas e t\u00e9cnicas<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Obter uma vis\u00e3o geral dos ambientes SIEM e SOAR\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Adquirir experi\u00eancia com processos de investiga\u00e7\u00e3o, incluindo an\u00e1lise de malware e per\u00edcia digital<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compreender o conceito de seguran\u00e7a \"Zero Trust\" <\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c9e0117 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c9e0117\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4168f5c8\" data-id=\"4168f5c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58fa2b16 elementor-widget elementor-widget-heading\" data-id=\"58fa2b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que voc\u00ea receber\u00e1...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-722dba0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"722dba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Apresenta\u00e7\u00e3o do curso como um arquivo PDF<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Folhas de dicas e documenta\u00e7\u00e3o \u00fatil<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">5 a 8 horas de experi\u00eancia de aprendizado pr\u00e1tico por meio de atividades pr\u00e1ticas<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Um certificado Wawiwa ap\u00f3s a conclus\u00e3o bem-sucedida do curso<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-131f25b9 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"131f25b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3321e838\" data-id=\"3321e838\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66f56654 elementor-widget elementor-widget-heading\" data-id=\"66f56654\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Supervisor e instrutores profissionais<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dedad4a elementor-widget elementor-widget-heading\" data-id=\"dedad4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">A supervis\u00e3o de todos os cursos cibern\u00e9ticos da Wawiwa \u00e9 feita pelo Sr. Nadav Nachmias, diretor de programas de seguran\u00e7a cibern\u00e9tica da Wawiwa.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77938287 elementor-widget elementor-widget-heading\" data-id=\"77938287\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Os instrutores do curso s\u00e3o profissionais de seguran\u00e7a cibern\u00e9tica com experi\u00eancia pr\u00e1tica e habilidades de treinamento. O n\u00edvel t\u00e9cnico do curso pode ser ajustado de acordo com o p\u00fablico.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a817760 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a817760\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-461ea04d\" data-id=\"461ea04d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e1bd641 elementor-widget elementor-widget-image\" data-id=\"3e1bd641\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/wawiwa-team\/nadav-nachmias\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"982\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg\" class=\"attachment-large size-large wp-image-5376\" alt=\"Nadav Nachmias Diretor de Programas de Seguran\u00e7a Cibern\u00e9tica\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg 834w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-244x300.jpeg 244w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-768x943.jpeg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias.jpeg 1043w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2158571a elementor-widget elementor-widget-heading\" data-id=\"2158571a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Nadav Nachmias<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720fc5c1 elementor-widget elementor-widget-text-editor\" data-id=\"720fc5c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Chefe de programas de seguran\u00e7a cibern\u00e9tica<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-104e10f9 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"104e10f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9a810aa\" data-id=\"9a810aa\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12d75dc elementor-widget elementor-widget-text-editor\" data-id=\"12d75dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nadav \u00e9 um especialista em seguran\u00e7a cibern\u00e9tica com mais de 15 anos de experi\u00eancia, com foco em estrat\u00e9gias de seguran\u00e7a cibern\u00e9tica, arquitetura e capacita\u00e7\u00e3o da for\u00e7a de trabalho. Sua experi\u00eancia pr\u00e1tica tornou intuitivo o desenvolvimento de diversos programas e materiais de treinamento em v\u00e1rios campos da seguran\u00e7a cibern\u00e9tica (incluindo gerenciamento de seguran\u00e7a cibern\u00e9tica, tratamento e resposta a incidentes e per\u00edcia cibern\u00e9tica).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-335d926 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"335d926\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08c1ebb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08c1ebb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fb4226\" data-id=\"0fb4226\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54123b9 elementor-widget elementor-widget-heading\" data-id=\"54123b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que os graduados t\u00eam a dizer?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e78f81c elementor-testimonial--skin-default elementor-testimonial--layout-image_inline elementor-testimonial--align-center elementor-arrows-yes elementor-pagination-type-bullets elementor-widget elementor-widget-testimonial-carousel\" data-id=\"e78f81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;autoplay_speed&quot;:10000,&quot;show_arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;autoplay&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"testimonial-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Sempre tive interesse em seguran\u00e7a cibern\u00e9tica. Eu tinha uma paix\u00e3o por esse campo enorme que est\u00e1 sempre evoluindo. Procurei cursos on-line e descobri que a maioria deles \u00e9 muito pr\u00e1tica, um v\u00eddeo em um site. Ent\u00e3o, encontrei o programa de seguran\u00e7a cibern\u00e9tica da Wawiwa. Registrei-me e, ao longo do programa, fiquei ansioso pelas aulas. \u00c9 uma sess\u00e3o ao vivo, com muito trabalho pr\u00e1tico, trabalhando com ferramentas cibern\u00e9ticas da vida real e experimentando o que elas podem fazer. Os instrutores t\u00eam hist\u00f3rias reais e exemplos do campo para transmitir seus pontos de vista. Isso torna o programa realmente empolgante!\"\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-testimonial__footer\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/John-Hamilton-Cyber-CTIA2.jpeg\" alt=\"John Hamilton\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">John Hamilton<\/span><span class=\"elementor-testimonial__title\">Analista de seguran\u00e7a cibern\u00e9tica<\/span><\/cite>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f7ee1d2 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"f7ee1d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47686b9 elementor-widget elementor-widget-heading\" data-id=\"47686b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Programa do curso<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-959e363 elementor-widget elementor-widget-heading\" data-id=\"959e363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Li\u00e7\u00e3o 1: Introdu\u00e7\u00e3o \u00e0 seguran\u00e7a cibern\u00e9tica (5 horas)\n\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95186a7 elementor-widget elementor-widget-text-editor\" data-id=\"95186a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Introdu\u00e7\u00e3o \u00e0 defesa cibern\u00e9tica: Estudos de caso de estrat\u00e9gias ineficazes<\/li><li>O papel fundamental da educa\u00e7\u00e3o e do treinamento: Construindo Firewalls Humanos<\/li><li>Terminologia comum de seguran\u00e7a cibern\u00e9tica<\/li><li>Princ\u00edpios b\u00e1sicos de seguran\u00e7a cibern\u00e9tica<\/li><li>Tecnologias de seguran\u00e7a cibern\u00e9tica<\/li><li>A tr\u00edade da CIA<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39a8903 elementor-widget elementor-widget-heading\" data-id=\"39a8903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Li\u00e7\u00e3o 2: Introdu\u00e7\u00e3o \u00e0 resposta a incidentes e engenharia social (5 horas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00fa54a elementor-widget elementor-widget-text-editor\" data-id=\"00fa54a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Centro de opera\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica (SOC) <\/span><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ativos cr\u00edticos\u00a0<\/span><\/li><li aria-level=\"1\"><span style=\"font-weight: 400;\">Introdu\u00e7\u00e3o aos ataques cibern\u00e9ticos<\/span><\/li><li aria-level=\"1\">Atores de amea\u00e7a<\/li><li aria-level=\"1\">Eventos vs. Incidentes<\/li><li aria-level=\"1\">Fases de resposta a incidentes (IR)<\/li><li aria-level=\"1\">Cadeia de destrui\u00e7\u00e3o cibern\u00e9tica\u00a0<\/li><li aria-level=\"1\">Introdu\u00e7\u00e3o \u00e0 engenharia social<\/li><li aria-level=\"1\"><span style=\"font-weight: 400;\">Contramedidas e pr\u00e1ticas recomendadas de engenharia social<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-340757f elementor-widget elementor-widget-heading\" data-id=\"340757f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Li\u00e7\u00e3o 3: SIEM e SOAR (5 horas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8525407 elementor-widget elementor-widget-text-editor\" data-id=\"8525407\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conceitos de SIEM\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\">Funcionalidade e principais recursos do SIEM<\/li><li aria-level=\"1\">Principais tecnologias SIEM<\/li><li aria-level=\"1\">SOAR: conceito e funcionalidade<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5331238 elementor-widget elementor-widget-heading\" data-id=\"5331238\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Li\u00e7\u00e3o 4: Criptografia e controles cibern\u00e9ticos (5 horas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9c3b0 elementor-widget elementor-widget-text-editor\" data-id=\"5e9c3b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Introdu\u00e7\u00e3o \u00e0 criptografia - Terminologias comuns<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No\u00e7\u00f5es b\u00e1sicas de criptografia - Como funciona, Algoritmos de hash\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">O conceito de \"confian\u00e7a\" na criptografia\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Defini\u00e7\u00e3o de controles de seguran\u00e7a cibern\u00e9tica<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Controles de seguran\u00e7a de endpoints - Sistemas operacionais<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Controles de seguran\u00e7a de rede - Firewalls, IDPS, controle de acesso \u00e0 rede<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Recursos de controle avan\u00e7ado - IA\/ML, contexto e an\u00e1lise de comportamento<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8054e elementor-widget elementor-widget-heading\" data-id=\"4a8054e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Li\u00e7\u00e3o 5: Prote\u00e7\u00e3o de dados e servi\u00e7os, seguran\u00e7a como um processo e governan\u00e7a, gerenciamento de riscos e conformidade (GRC) (5 horas)\n<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2ea9944 elementor-widget elementor-widget-text-editor\" data-id=\"2ea9944\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li>Seguran\u00e7a de base: Prote\u00e7\u00e3o de dados e servi\u00e7os<\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Preven\u00e7\u00e3o contra perda de dados (DLP)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Seguran\u00e7a de aplicativos e ciclo de vida de desenvolvimento de software seguro (SSDLC)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gerenciamento e governan\u00e7a de identidades<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Planejamento de recupera\u00e7\u00e3o de desastres<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Estrat\u00e9gias de continuidade dos neg\u00f3cios<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Seguran\u00e7a como um processo: Melhoria cont\u00ednua e ferramentas de monitoramento<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Confian\u00e7a zero: Hist\u00f3rias de casos<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e83c6a4 elementor-widget elementor-widget-heading\" data-id=\"e83c6a4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Li\u00e7\u00e3o 6: Recapitula\u00e7\u00e3o do curso e teste final\n\n (3 horas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-843a1c2 elementor-widget elementor-widget-text-editor\" data-id=\"843a1c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Revis\u00e3o abrangente do conte\u00fado do curso<\/span><\/li><li aria-level=\"1\">Avalia\u00e7\u00e3o final: Abrangendo todos os t\u00f3picos<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8dc2662 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"8dc2662\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de9a086 elementor-widget elementor-widget-heading\" data-id=\"de9a086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">D\u00ea \u00e0 sua equipe a vantagem de que ela precisa para ter sucesso com nossos cursos abrangentes, adaptados \u00e0s suas necessidades espec\u00edficas. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e334b elementor-widget elementor-widget-heading\" data-id=\"94e334b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Interessado em mais detalhes?\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d9715 elementor-widget elementor-widget-text-editor\" data-id=\"c1d9715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Teremos o maior prazer em responder a todas as suas perguntas!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c14e59 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"0c14e59\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3260b11 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"3260b11\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfd0e5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3bfd0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero oferecer este curso<br>em minha institui\u00e7\u00e3o<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-081d346 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"081d346\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab29a81 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ab29a81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero participar deste curso<br>ou inscrever minha equipe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53dc31e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53dc31e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0a84a8\" data-id=\"e0a84a8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b46e040 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b46e040\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-79e3365\" data-id=\"79e3365\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-422aa51 elementor-widget elementor-widget-heading\" data-id=\"422aa51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Fa\u00e7a uma parceria com a Wawiwa para oferecer programas de treinamento tecnol\u00f3gico em menos de 6 meses!<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9970554 elementor-widget elementor-widget-text-editor\" data-id=\"9970554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA Wawiwa preenche a lacuna de habilidades tecnol\u00f3gicas ao requalificar pessoas para profiss\u00f5es tecnol\u00f3gicas de alta demanda. H\u00e1 milh\u00f5es de vagas em tecnologia e n\u00e3o h\u00e1 profissionais de tecnologia suficientes com o conhecimento e as habilidades relevantes para preench\u00ea-las. O que o setor precisa dos funcion\u00e1rios n\u00e3o \u00e9 ensinado em longos cursos acad\u00eamicos. A Wawiwa ajuda parceiros em todo o mundo a requalificar e aprimorar as habilidades de pessoas para empregos em tecnologia por meio de centros ou programas locais de treinamento em tecnologia. A empresa utiliza uma metodologia de treinamento comprovada, conte\u00fado de ponta, plataformas digitais para aprendizado e avalia\u00e7\u00e3o, al\u00e9m de s\u00f3lidas rela\u00e7\u00f5es com o setor, para oferecer programas de treinamento que resultam em maior empregabilidade e satisfa\u00e7\u00e3o dos formandos. Isso, por sua vez, tamb\u00e9m cria uma marca de treinamento forte e um neg\u00f3cio sustent\u00e1vel para os parceiros da Wawiwa.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71a3895 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"71a3895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Entre em contato conosco<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Este curso oferece uma introdu\u00e7\u00e3o geral aos conceitos, m\u00e9todos, padr\u00f5es e pr\u00e1ticas recomendadas de defesa de seguran\u00e7a cibern\u00e9tica, com o objetivo de desenvolver uma base s\u00f3lida de conhecimento. O curso ensina como lidar com incidentes de seguran\u00e7a comuns, introduzindo ferramentas de seguran\u00e7a comuns e uma metodologia aprofundada de defesa cibern\u00e9tica, como a Cyber Kill Chain, al\u00e9m de princ\u00edpios de governan\u00e7a, gerenciamento de riscos e conformidade que s\u00e3o essenciais para qualquer organiza\u00e7\u00e3o.<\/p>","protected":false},"author":13,"featured_media":5381,"parent":5475,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5380","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Protection of Organizations<\/title>\n<meta name=\"description\" content=\"This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. The course teaches you how to handle common security incidents, introducing common security tools and in-depth cyber defense methodology - such as the Cyber Kill Chain - as well as governance, risk management, and compliance principles that are critical for any organization.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Protection of Organizations\" \/>\n<meta property=\"og:description\" content=\"This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. The course teaches you how to handle common security incidents, introducing common security tools and in-depth cyber defense methodology - such as the Cyber Kill Chain - as well as governance, risk management, and compliance principles that are critical for any organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/\" \/>\n<meta property=\"og:site_name\" content=\"Wawiwa Tech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wawiwatech\/\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T13:39:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO-1024x574.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"574\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@WawiwaTech\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/\",\"name\":\"Cybersecurity Protection of Organizations\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/CPO.png\",\"datePublished\":\"2024-01-30T10:37:34+00:00\",\"dateModified\":\"2026-03-11T13:39:26+00:00\",\"description\":\"This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. The course teaches you how to handle common security incidents, introducing common security tools and in-depth cyber defense methodology - such as the Cyber Kill Chain - as well as governance, risk management, and compliance principles that are critical for any organization.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/CPO.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/CPO.png\",\"width\":1456,\"height\":816,\"caption\":\"Cyber Protection for Organizations\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/cybersecurity-protection-of-organizations\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wawiwa\u2019s Upskilling Courses\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Upskilling Courses\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cybersecurity Protection of Organizations\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"name\":\"Wawiwa Tech\",\"description\":\"Reskilling the World to Tech\",\"publisher\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wawiwa-tech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\",\"name\":\"Wawiwa Tech\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"width\":1000,\"height\":425,\"caption\":\"Wawiwa Tech\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/wawiwatech\\\/\",\"https:\\\/\\\/x.com\\\/WawiwaTech\",\"https:\\\/\\\/instagram.com\\\/wawiwatech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wawiwa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCN_ejCsLDqznGifvkX86gzA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Protection of Organizations","description":"This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. The course teaches you how to handle common security incidents, introducing common security tools and in-depth cyber defense methodology - such as the Cyber Kill Chain - as well as governance, risk management, and compliance principles that are critical for any organization.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/","og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity Protection of Organizations","og_description":"This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. The course teaches you how to handle common security incidents, introducing common security tools and in-depth cyber defense methodology - such as the Cyber Kill Chain - as well as governance, risk management, and compliance principles that are critical for any organization.","og_url":"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/","og_site_name":"Wawiwa Tech","article_publisher":"https:\/\/www.facebook.com\/wawiwatech\/","article_modified_time":"2026-03-11T13:39:26+00:00","og_image":[{"width":1024,"height":574,"url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO-1024x574.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@WawiwaTech","twitter_misc":{"Est. tempo de leitura":"5 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/","url":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/","name":"Cybersecurity Protection of Organizations","isPartOf":{"@id":"https:\/\/wawiwa-tech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/#primaryimage"},"image":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/#primaryimage"},"thumbnailUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO.png","datePublished":"2024-01-30T10:37:34+00:00","dateModified":"2026-03-11T13:39:26+00:00","description":"This course provides a general introduction to cybersecurity defense concepts, methods, standards, and best practices, with the goal of developing a solid knowledge base. The course teaches you how to handle common security incidents, introducing common security tools and in-depth cyber defense methodology - such as the Cyber Kill Chain - as well as governance, risk management, and compliance principles that are critical for any organization.","breadcrumb":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/#primaryimage","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO.png","width":1456,"height":816,"caption":"Cyber Protection for Organizations"},{"@type":"BreadcrumbList","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wawiwa-tech.com\/"},{"@type":"ListItem","position":2,"name":"Wawiwa\u2019s Upskilling Courses","item":"https:\/\/wawiwa-tech.com\/upskilling\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Upskilling Courses","item":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Cybersecurity Protection of Organizations"}]},{"@type":"WebSite","@id":"https:\/\/wawiwa-tech.com\/#website","url":"https:\/\/wawiwa-tech.com\/","name":"Wawiwa Tech","description":"Reskilling the World to Tech","publisher":{"@id":"https:\/\/wawiwa-tech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wawiwa-tech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/wawiwa-tech.com\/#organization","name":"Wawiwa Tech","url":"https:\/\/wawiwa-tech.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","width":1000,"height":425,"caption":"Wawiwa Tech"},"image":{"@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wawiwatech\/","https:\/\/x.com\/WawiwaTech","https:\/\/instagram.com\/wawiwatech","https:\/\/www.linkedin.com\/company\/wawiwa\/","https:\/\/www.youtube.com\/channel\/UCN_ejCsLDqznGifvkX86gzA"]}]}},"_links":{"self":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/comments?post=5380"}],"version-history":[{"count":0,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5380\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/media\/5381"}],"wp:attachment":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/media?parent=5380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}