{"id":5401,"date":"2024-01-31T16:46:05","date_gmt":"2024-01-31T14:46:05","guid":{"rendered":"https:\/\/wawiwa-tech.com\/?page_id=5401"},"modified":"2024-07-15T12:39:25","modified_gmt":"2024-07-15T09:39:25","slug":"certified-penetration-testing","status":"publish","type":"page","link":"https:\/\/wawiwa-tech.com\/pt\/certified-penetration-testing\/","title":{"rendered":"Teste de penetra\u00e7\u00e3o certificado"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5401\" class=\"elementor elementor-5401\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f4a0206 elementor-section-height-min-height elementor-section-content-middle custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3f4a0206\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-412f2665\" data-id=\"412f2665\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee71bcf elementor-widget elementor-widget-heading\" data-id=\"ee71bcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Teste de penetra\u00e7\u00e3o certificado<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25af809d elementor-widget elementor-widget-heading\" data-id=\"25af809d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Curso de aperfei\u00e7oamento, 80 horas acad\u00eamicas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5c2115c2 elementor-widget elementor-widget-heading\" data-id=\"5c2115c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Treinamento abrangente em seguran\u00e7a cibern\u00e9tica com foco em seguran\u00e7a ofensiva<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c8f6122 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"c8f6122\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">N\u00edvel: Intermedi\u00e1rio<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4265929f custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4265929f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-53fec5fa\" data-id=\"53fec5fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50cac22b elementor-widget elementor-widget-text-editor\" data-id=\"50cac22b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); font-size: 1rem;\">Para proteger as redes de computadores e os ativos digitais, \u00e0s vezes \u00e9 preciso partir para o ataque e tentar penetr\u00e1-los para descobrir vulnerabilidades. Este curso abrangente de treinamento em seguran\u00e7a cibern\u00e9tica concentra-se em v\u00e1rios aspectos da seguran\u00e7a ofensiva.\u00a0<\/span><span style=\"font-weight: 400;\">Ele abrange <strong>m\u00e9todos e t\u00e9cnicas de teste de penetra\u00e7\u00e3o de infraestrutura, aplicativos e seguran\u00e7a sem fio<\/strong> que podem ajudar a construir uma carreira em seguran\u00e7a cibern\u00e9tica nas \u00e1reas de <strong>pentesting de sistemas, pentesting de infraestrutura, seguran\u00e7a cibern\u00e9tica, pentesting de aplicativos da Web e opera\u00e7\u00f5es cibern\u00e9ticas. <\/strong><\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6167863 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6167863\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f66c6ff\" data-id=\"f66c6ff\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3348bf6 elementor-blockquote--skin-boxed elementor-widget elementor-widget-blockquote\" data-id=\"3348bf6\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;motion_fx_scale_effect&quot;:&quot;yes&quot;,&quot;motion_fx_scale_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:1,&quot;sizes&quot;:[]},&quot;motion_fx_scale_direction&quot;:&quot;out-in&quot;,&quot;motion_fx_scale_range&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:20,&quot;end&quot;:80}},&quot;motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;]}\" data-widget_type=\"blockquote.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<blockquote class=\"elementor-blockquote\">\n\t\t\t<p class=\"elementor-blockquote__content\">\n\t\t\t\tAo se inscrever neste curso, voc\u00ea explorar\u00e1 todos os caminhos dos testes de penetra\u00e7\u00e3o, obtendo uma vantagem competitiva e desenvolvendo os recursos para realizar v\u00e1rias avalia\u00e7\u00f5es de seguran\u00e7a sem problemas.\t\t\t<\/p>\n\t\t\t\t\t<\/blockquote>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-11dd455 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"11dd455\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-b381644 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"b381644\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-409ef1c e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"409ef1c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cbfa227 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"cbfa227\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero oferecer este curso<br>em minha institui\u00e7\u00e3o<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f0fb50f e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"f0fb50f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-b76dc31 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"b76dc31\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2eada0d elementor-align-center elementor-widget elementor-widget-button\" data-id=\"2eada0d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero participar deste curso<br>ou inscrever minha equipe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-78cdcfbe custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"78cdcfbe\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;gradient&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3e7f7d99\" data-id=\"3e7f7d99\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-96d1ca3 elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"96d1ca3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-user-check\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-463414b0 elementor-widget elementor-widget-heading\" data-id=\"463414b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">A quem se destina esse curso?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-97deeda elementor-widget elementor-widget-text-editor\" data-id=\"97deeda\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Analistas de seguran\u00e7a\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Engenheiros de rede e seguran\u00e7a\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hackers \u00e9ticos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Gerentes de TI\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Investigadores cibern\u00e9ticos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Testadores de penetra\u00e7\u00e3o<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avaliadores de vulnerabilidade<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-82b529e elementor-widget elementor-widget-heading\" data-id=\"82b529e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Pr\u00e9-requisitos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-32e3c9b2 elementor-widget elementor-widget-text-editor\" data-id=\"32e3c9b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conhecimento de TCP\/IP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Conhecimento b\u00e1sico das linhas de comando do Windows e do Linux<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-58d8fb79 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"58d8fb79\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-5e02c07\" data-id=\"5e02c07\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a0dc02b elementor-view-default elementor-widget elementor-widget-icon\" data-id=\"2a0dc02b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-icon-wrapper\">\n\t\t\t<div class=\"elementor-icon\">\n\t\t\t<i aria-hidden=\"true\" class=\"hm hm-target-arrow\"><\/i>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77be9cb4 elementor-widget elementor-widget-heading\" data-id=\"77be9cb4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Objetivos de aprendizagem<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1d9f828f elementor-widget elementor-widget-text-editor\" data-id=\"1d9f828f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compreender os fundamentos da arquitetura e das redes de computadores\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aproveitamento do Linux para pr\u00e1ticas de hacking \u00e9tico\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Aprender sobre privacidade e anonimato\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Familiariza\u00e7\u00e3o com a intelig\u00eancia de c\u00f3digo aberto (OSINT)\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enumera\u00e7\u00f5es e varreduras avan\u00e7adas de protocolos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifica\u00e7\u00e3o e avalia\u00e7\u00e3o de vulnerabilidades\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Quebra de senhas e acesso seguro\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hackear sistemas, redes e aplicativos organizacionais\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Avalia\u00e7\u00e3o de p\u00f3s-explora\u00e7\u00e3o\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Inspecionar pacotes com precis\u00e3o\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Realiza\u00e7\u00e3o de ataques de sniffing ativo<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c9e0117 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c9e0117\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4168f5c8\" data-id=\"4168f5c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-58fa2b16 elementor-widget elementor-widget-heading\" data-id=\"58fa2b16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que voc\u00ea receber\u00e1...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-722dba0 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"722dba0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Apresenta\u00e7\u00e3o do curso como um arquivo PDF<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Folhas de dicas e documenta\u00e7\u00e3o \u00fatil<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">\"Canivete su\u00ed\u00e7o\" - 3Gb de ferramentas de IR<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">42 horas de experi\u00eancia de aprendizado pr\u00e1tico por meio de atividades pr\u00e1ticas<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-check\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Um certificado Wawiwa ap\u00f3s a conclus\u00e3o bem-sucedida do curso<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3257990 elementor-widget elementor-widget-text-editor\" data-id=\"3257990\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Al\u00e9m disso, voc\u00ea pode optar por aumentar o curso da sua equipe para incluir a prepara\u00e7\u00e3o para os testes de certifica\u00e7\u00e3o relevantes do setor de seguran\u00e7a cibern\u00e9tica, por um custo adicional. As certifica\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica para as quais este curso pode ser usado como prepara\u00e7\u00e3o incluem: GIAC Penetration Tester (GPEN) com CyberLive e GIAC Web Application Penetration Tester (GWAPT).<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f29cbdd elementor-widget elementor-widget-image\" data-id=\"f29cbdd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"512\" height=\"263\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Cyber-certifications.png\" class=\"attachment-medium_large size-medium_large wp-image-5403\" alt=\"Certifica\u00e7\u00f5es cibern\u00e9ticas\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Cyber-certifications.png 512w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Cyber-certifications-300x154.png 300w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2a27c56 elementor-widget elementor-widget-text-editor\" data-id=\"2a27c56\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Certifica\u00e7\u00f5es relevantes de seguran\u00e7a cibern\u00e9tica<\/span><\/i><\/p><p style=\"text-align: center;\"><i><span style=\"font-weight: 400;\">Observa\u00e7\u00e3o: N\u00e3o \u00e9 oferecida nem garantida uma certifica\u00e7\u00e3o do setor como parte do curso.<\/span><\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-131f25b9 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"131f25b9\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-3321e838\" data-id=\"3321e838\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-66f56654 elementor-widget elementor-widget-heading\" data-id=\"66f56654\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Supervisor e instrutores profissionais<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dedad4a elementor-widget elementor-widget-heading\" data-id=\"dedad4a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">A supervis\u00e3o de todos os cursos cibern\u00e9ticos da Wawiwa \u00e9 feita pelo Sr. Nadav Nachmias, diretor de programas de seguran\u00e7a cibern\u00e9tica da Wawiwa.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77938287 elementor-widget elementor-widget-heading\" data-id=\"77938287\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Os instrutores do curso s\u00e3o profissionais de seguran\u00e7a cibern\u00e9tica com experi\u00eancia pr\u00e1tica e habilidades de treinamento. O n\u00edvel t\u00e9cnico do curso pode ser ajustado de acordo com o p\u00fablico.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6a817760 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6a817760\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-461ea04d\" data-id=\"461ea04d\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3e1bd641 elementor-widget elementor-widget-image\" data-id=\"3e1bd641\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"982\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg\" class=\"attachment-large size-large wp-image-5376\" alt=\"Nadav Nachmias Diretor de Programas de Seguran\u00e7a Cibern\u00e9tica\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg 834w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-244x300.jpeg 244w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-768x943.jpeg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias.jpeg 1043w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2158571a elementor-widget elementor-widget-heading\" data-id=\"2158571a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Nadav Nachmias<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-720fc5c1 elementor-widget elementor-widget-text-editor\" data-id=\"720fc5c1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Chefe de programas de seguran\u00e7a cibern\u00e9tica<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-104e10f9 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"104e10f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-9a810aa\" data-id=\"9a810aa\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12d75dc elementor-widget elementor-widget-text-editor\" data-id=\"12d75dc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nadav \u00e9 um especialista em seguran\u00e7a cibern\u00e9tica com mais de 15 anos de experi\u00eancia, com foco em estrat\u00e9gias de seguran\u00e7a cibern\u00e9tica, arquitetura e capacita\u00e7\u00e3o da for\u00e7a de trabalho. Sua experi\u00eancia pr\u00e1tica tornou intuitivo o desenvolvimento de diversos programas e materiais de treinamento em v\u00e1rios campos da seguran\u00e7a cibern\u00e9tica (incluindo gerenciamento de seguran\u00e7a cibern\u00e9tica, tratamento e resposta a incidentes e per\u00edcia cibern\u00e9tica).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-335d926 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"335d926\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08c1ebb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08c1ebb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fb4226\" data-id=\"0fb4226\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54123b9 elementor-widget elementor-widget-heading\" data-id=\"54123b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que os graduados t\u00eam a dizer?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e78f81c elementor-testimonial--skin-default elementor-testimonial--layout-image_inline elementor-testimonial--align-center elementor-arrows-yes elementor-pagination-type-bullets elementor-widget elementor-widget-testimonial-carousel\" data-id=\"e78f81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;autoplay_speed&quot;:10000,&quot;show_arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;autoplay&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"testimonial-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Sempre tive interesse em seguran\u00e7a cibern\u00e9tica. Eu tinha uma paix\u00e3o por esse campo enorme que est\u00e1 sempre evoluindo. Procurei cursos on-line e descobri que a maioria deles \u00e9 muito pr\u00e1tica, um v\u00eddeo em um site. Ent\u00e3o, encontrei o programa de seguran\u00e7a cibern\u00e9tica da Wawiwa. Registrei-me e, ao longo do programa, fiquei ansioso pelas aulas. \u00c9 uma sess\u00e3o ao vivo, com muito trabalho pr\u00e1tico, trabalhando com ferramentas cibern\u00e9ticas da vida real e experimentando o que elas podem fazer. Os instrutores t\u00eam hist\u00f3rias reais e exemplos do campo para transmitir seus pontos de vista. Isso torna o programa realmente empolgante!\"\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-testimonial__footer\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/John-Hamilton-Cyber-CTIA2.jpeg\" alt=\"John Hamilton\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">John Hamilton<\/span><span class=\"elementor-testimonial__title\">Analista de seguran\u00e7a cibern\u00e9tica<\/span><\/cite>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-f7ee1d2 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"f7ee1d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-47686b9 elementor-widget elementor-widget-heading\" data-id=\"47686b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Programa do curso<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-959e363 elementor-widget elementor-widget-heading\" data-id=\"959e363\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 1: Introdu\u00e7\u00e3o aos Fundamentos (6 horas te\u00f3ricas, 5 horas pr\u00e1ticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95186a7 elementor-widget elementor-widget-text-editor\" data-id=\"95186a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">O que \u00e9 seguran\u00e7a da informa\u00e7\u00e3o?\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Tr\u00edade da CIA\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Autentica\u00e7\u00e3o, autoriza\u00e7\u00e3o e contabilidade (AAA)<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Fases do Hacking\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Conceitos de hacking \u00e9tico\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Entendendo os termos comuns de hacking\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Avalia\u00e7\u00e3o de vulnerabilidade\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Teste de penetra\u00e7\u00e3o\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Conceito de Red Teaming\/Blue Teaming\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Controles e pol\u00edticas de seguran\u00e7a da informa\u00e7\u00e3o\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No\u00e7\u00f5es b\u00e1sicas de sistema operacional e rede\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kali Linux<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39a8903 elementor-widget elementor-widget-heading\" data-id=\"39a8903\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 2: Pr\u00e1ticas recomendadas de coleta de informa\u00e7\u00f5es (7 horas te\u00f3ricas, 8 horas pr\u00e1ticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-00fa54a elementor-widget elementor-widget-text-editor\" data-id=\"00fa54a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pegadas<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Reconhecimento\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Coleta de intelig\u00eancia\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Google Dorking\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Shodan\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">DNS de informa\u00e7\u00f5es p\u00fablicas e vazamento de informa\u00e7\u00f5es\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">An\u00e1lise e for\u00e7a bruta de DNS\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Descobrir hosts de rede\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Varredura de portas\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Enumerar servi\u00e7os de escuta\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Descubra superf\u00edcies de ataque vulner\u00e1veis<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-340757f elementor-widget elementor-widget-heading\" data-id=\"340757f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 3: - Teste de penetra\u00e7\u00e3o de rede e infraestrutura (10 horas te\u00f3ricas, 14 horas pr\u00e1ticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8525407 elementor-widget elementor-widget-text-editor\" data-id=\"8525407\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Teste de penetra\u00e7\u00e3o focado\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Comprometer hosts vulner\u00e1veis\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Explora\u00e7\u00e3o de patches de software ausentes\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Uso do Metasploit para explorar um sistema sem patches\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Usando a carga \u00fatil do shell do Meterpreter\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Gera\u00e7\u00e3o de c\u00f3digo de shell personalizado para explora\u00e7\u00f5es do Exploit-DB\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Implantar cargas \u00fateis execut\u00e1veis personalizadas\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Acesso \u00e0 interface de gerenciamento remoto\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Teste de penetra\u00e7\u00e3o de ataque DOS\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Falsifica\u00e7\u00e3o e sniffing\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Sistema de detec\u00e7\u00e3o de intrus\u00e3o\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Firewall\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Auditoria de seguran\u00e7a de dispositivos de rede\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">P\u00f3s-explora\u00e7\u00e3o e escalonamento de privil\u00e9gios\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Coleta de credenciais de arquivos .dot\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Tunelamento por meio de conex\u00f5es SSH\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Automatizando a autentica\u00e7\u00e3o SSH Pubkey com o Bash\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Agendamento de uma chamada de retorno reversa usando o Cron\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Escalonamento de privil\u00e9gios com bin\u00e1rios SUID\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Manuten\u00e7\u00e3o do acesso persistente ao Meterpreter\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Coleta de credenciais armazenadas em cache no dom\u00ednio\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Extra\u00e7\u00e3o de credenciais de texto claro da mem\u00f3ria\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Pesquisa de credenciais no sistema de arquivos em arquivos de configura\u00e7\u00e3o\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Usando o Pass-the-Hash para se deslocar lateralmente<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5331238 elementor-widget elementor-widget-heading\" data-id=\"5331238\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 4: Pentesting de aplicativos da Web (10 horas te\u00f3ricas, 9 horas pr\u00e1ticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e9c3b0 elementor-widget elementor-widget-text-editor\" data-id=\"5e9c3b0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">No\u00e7\u00f5es b\u00e1sicas da Web\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Conceitos b\u00e1sicos de aplicativos da Web, princ\u00edpios de funcionamento\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">No\u00e7\u00f5es b\u00e1sicas de HTML\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Diferen\u00e7a entre sites est\u00e1ticos e din\u00e2micos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Entendendo os protocolos HTTP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Introdu\u00e7\u00e3o \u00e0 transfer\u00eancia de estado representacional (REST)\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Cabe\u00e7alhos de solicita\u00e7\u00e3o e resposta HTTP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">O que \u00e9 um cookie?\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Proxy HTTP\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Servidor e lado do cliente com exemplo\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">O que \u00e9 uma sess\u00e3o?\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Diferentes tipos de codifica\u00e7\u00e3o\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ferramentas de teste de penetra\u00e7\u00e3o de aplicativos da Web\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">DirBuster\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Wfuzz\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Nikto\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">wpscan\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Su\u00edte para arrotos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo de proxy\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo de alvo e aranha\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Tipos de ataque de intrusos e configura\u00e7\u00f5es de carga \u00fatil\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo repetidor\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">M\u00f3dulo Sequenciador e Scanner\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ataques comuns \u00e0 seguran\u00e7a de sites\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inje\u00e7\u00e3o\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Autentica\u00e7\u00e3o e gerenciamento de sess\u00e3o quebrados\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Scripting entre sites\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Refer\u00eancia direta a objeto insegura\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Configura\u00e7\u00e3o incorreta da seguran\u00e7a\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Exposi\u00e7\u00e3o de dados confidenciais\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Controles de acesso de n\u00edvel funcional ausentes\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Falsifica\u00e7\u00e3o de solicita\u00e7\u00e3o entre sites\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Uso de componentes com vulnerabilidades conhecidas\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Redirecionamentos e encaminhamentos n\u00e3o validados\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Entidades externas XML\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Um olhar mais detalhado sobre as 10 dez vulnerabilidades do Owasp\u00a0<\/span><\/li><\/ul><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ataques a bancos de dados\u00a0<\/span><ul><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inje\u00e7\u00e3o de SQL\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inje\u00e7\u00e3o baseada em erros<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inje\u00e7\u00e3o de consulta dupla\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inje\u00e7\u00e3o cega baseada em booleano\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Inje\u00e7\u00e3o cega baseada em tempo\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Dumping de banco de dados usando o SQLMap<\/span><\/li><\/ul><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4a8054e elementor-widget elementor-widget-heading\" data-id=\"4a8054e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">Module 5: Wireless Pentest (3 horas te\u00f3ricas, 3 horas pr\u00e1ticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-843a1c2 elementor-widget elementor-widget-text-editor\" data-id=\"843a1c2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vis\u00e3o geral da seguran\u00e7a sem fio\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Introdu\u00e7\u00e3o ao padr\u00e3o 802.11\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kungfu de rachaduras no ar\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ataque do EvilTwin\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ferramentas de seguran\u00e7a sem fio\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Pr\u00e1ticas recomendadas para seguran\u00e7a corporativa sem fio e sem fio<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-77a44b1 elementor-widget elementor-widget-heading\" data-id=\"77a44b1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">M\u00f3dulo 6: Limpeza p\u00f3s-engajamento (2 horas te\u00f3ricas, 3 horas pr\u00e1ticas)<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-242e742 elementor-widget elementor-widget-text-editor\" data-id=\"242e742\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<ul><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Elimina\u00e7\u00e3o de conex\u00f5es ativas do Shell\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Remo\u00e7\u00e3o de contas de usu\u00e1rio desnecess\u00e1rias\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Exclus\u00e3o de arquivos diversos\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Revers\u00e3o de altera\u00e7\u00f5es de configura\u00e7\u00e3o\u00a0<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Fechamento de backdoors<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-8dc2662 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"8dc2662\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-de9a086 elementor-widget elementor-widget-heading\" data-id=\"de9a086\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">D\u00ea \u00e0 sua equipe a vantagem de que ela precisa para ter sucesso com nossos cursos abrangentes, adaptados \u00e0s suas necessidades espec\u00edficas. <\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94e334b elementor-widget elementor-widget-heading\" data-id=\"94e334b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Interessado em mais detalhes?\n<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1d9715 elementor-widget elementor-widget-text-editor\" data-id=\"c1d9715\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Teremos o maior prazer em responder a todas as suas perguntas!<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-0c14e59 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"0c14e59\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3260b11 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"3260b11\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfd0e5 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"3bfd0e5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero oferecer este curso<br>em minha institui\u00e7\u00e3o<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-081d346 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"081d346\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ab29a81 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"ab29a81\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/find-a-center\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero participar deste curso<br>ou inscrever minha equipe<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53dc31e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53dc31e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0a84a8\" data-id=\"e0a84a8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b46e040 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b46e040\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-79e3365\" data-id=\"79e3365\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-422aa51 elementor-widget elementor-widget-heading\" data-id=\"422aa51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Fa\u00e7a uma parceria com a Wawiwa para oferecer programas de treinamento tecnol\u00f3gico em menos de 6 meses!<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9970554 elementor-widget elementor-widget-text-editor\" data-id=\"9970554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA Wawiwa preenche a lacuna de habilidades tecnol\u00f3gicas ao requalificar pessoas para profiss\u00f5es tecnol\u00f3gicas de alta demanda. H\u00e1 milh\u00f5es de vagas em tecnologia e n\u00e3o h\u00e1 profissionais de tecnologia suficientes com o conhecimento e as habilidades relevantes para preench\u00ea-las. O que o setor precisa dos funcion\u00e1rios n\u00e3o \u00e9 ensinado em longos cursos acad\u00eamicos. A Wawiwa ajuda parceiros em todo o mundo a requalificar e aprimorar as habilidades de pessoas para empregos em tecnologia por meio de centros ou programas locais de treinamento em tecnologia. A empresa utiliza uma metodologia de treinamento comprovada, conte\u00fado de ponta, plataformas digitais para aprendizado e avalia\u00e7\u00e3o, al\u00e9m de s\u00f3lidas rela\u00e7\u00f5es com o setor, para oferecer programas de treinamento que resultam em maior empregabilidade e satisfa\u00e7\u00e3o dos formandos. Isso, por sua vez, tamb\u00e9m cria uma marca de treinamento forte e um neg\u00f3cio sustent\u00e1vel para os parceiros da Wawiwa.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71a3895 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"71a3895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Entre em contato conosco<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Para proteger as redes de computadores e os ativos digitais, \u00e0s vezes \u00e9 preciso partir para o ataque e tentar penetr\u00e1-los para descobrir vulnerabilidades. Este curso abrangente de treinamento em seguran\u00e7a cibern\u00e9tica concentra-se em v\u00e1rios aspectos da seguran\u00e7a ofensiva. Ele abrange m\u00e9todos e t\u00e9cnicas de teste de penetra\u00e7\u00e3o de infraestrutura, aplicativos e seguran\u00e7a sem fio que podem ajudar a construir uma carreira em seguran\u00e7a cibern\u00e9tica nas \u00e1reas de pentesting de sistemas, pentesting de infraestrutura, seguran\u00e7a cibern\u00e9tica, pentesting de aplicativos da Web e opera\u00e7\u00f5es cibern\u00e9ticas.<\/p>","protected":false},"author":13,"featured_media":5415,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5401","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Certified Penetration Testing<\/title>\n<meta name=\"description\" content=\"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wawiwa-tech.com\/pt\/certified-penetration-testing\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Certified Penetration Testing\" \/>\n<meta property=\"og:description\" content=\"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wawiwa-tech.com\/pt\/certified-penetration-testing\/\" \/>\n<meta property=\"og:site_name\" content=\"Wawiwa Tech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wawiwatech\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-15T09:39:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1456\" \/>\n\t<meta property=\"og:image:height\" content=\"816\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@WawiwaTech\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/\",\"name\":\"Certified Penetration Testing\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\",\"datePublished\":\"2024-01-31T14:46:05+00:00\",\"dateModified\":\"2024-07-15T09:39:25+00:00\",\"description\":\"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png\",\"width\":1456,\"height\":816,\"caption\":\"Penetration Testing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/certified-penetration-testing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Certified Penetration Testing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"name\":\"Wawiwa Tech\",\"description\":\"Reskilling the World to Tech\",\"publisher\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wawiwa-tech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\",\"name\":\"Wawiwa Tech\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"width\":1000,\"height\":425,\"caption\":\"Wawiwa Tech\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/wawiwatech\\\/\",\"https:\\\/\\\/x.com\\\/WawiwaTech\",\"https:\\\/\\\/instagram.com\\\/wawiwatech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wawiwa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCN_ejCsLDqznGifvkX86gzA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Certified Penetration Testing","description":"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wawiwa-tech.com\/pt\/certified-penetration-testing\/","og_locale":"pt_BR","og_type":"article","og_title":"Certified Penetration Testing","og_description":"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.","og_url":"https:\/\/wawiwa-tech.com\/pt\/certified-penetration-testing\/","og_site_name":"Wawiwa Tech","article_publisher":"https:\/\/www.facebook.com\/wawiwatech\/","article_modified_time":"2024-07-15T09:39:25+00:00","og_image":[{"width":1456,"height":816,"url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@WawiwaTech","twitter_misc":{"Est. tempo de leitura":"6 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/","url":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/","name":"Certified Penetration Testing","isPartOf":{"@id":"https:\/\/wawiwa-tech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#primaryimage"},"image":{"@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#primaryimage"},"thumbnailUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","datePublished":"2024-01-31T14:46:05+00:00","dateModified":"2024-07-15T09:39:25+00:00","description":"To protect computer networks and digital assets, you sometimes need to be on the offense, and try penetrating them to uncover vulnerabilities. This comprehensive cybersecurity training course focuses on various aspects of offensive security. It covers infrastructure, application, and wireless security penetration test methods and techniques that can help build a career in cybersecurity in the fields of system pentesting, infrastructure pentesting, cybersecurity, web application pentesting, and cyber operations.","breadcrumb":{"@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wawiwa-tech.com\/certified-penetration-testing\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#primaryimage","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/oded666_a_sports-style_poster_composed_of_a_realistic_photo_of__6136bf93-be9e-4655-96bf-6eb94658cb3d.png","width":1456,"height":816,"caption":"Penetration Testing"},{"@type":"BreadcrumbList","@id":"https:\/\/wawiwa-tech.com\/certified-penetration-testing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wawiwa-tech.com\/"},{"@type":"ListItem","position":2,"name":"Certified Penetration Testing"}]},{"@type":"WebSite","@id":"https:\/\/wawiwa-tech.com\/#website","url":"https:\/\/wawiwa-tech.com\/","name":"Wawiwa Tech","description":"Reskilling the World to Tech","publisher":{"@id":"https:\/\/wawiwa-tech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wawiwa-tech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/wawiwa-tech.com\/#organization","name":"Wawiwa Tech","url":"https:\/\/wawiwa-tech.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","width":1000,"height":425,"caption":"Wawiwa Tech"},"image":{"@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wawiwatech\/","https:\/\/x.com\/WawiwaTech","https:\/\/instagram.com\/wawiwatech","https:\/\/www.linkedin.com\/company\/wawiwa\/","https:\/\/www.youtube.com\/channel\/UCN_ejCsLDqznGifvkX86gzA"]}]}},"_links":{"self":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5401","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/comments?post=5401"}],"version-history":[{"count":0,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5401\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/media\/5415"}],"wp:attachment":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/media?parent=5401"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}