{"id":5475,"date":"2024-02-26T12:00:47","date_gmt":"2024-02-26T10:00:47","guid":{"rendered":"https:\/\/wawiwa-tech.com\/?page_id=5475"},"modified":"2025-10-22T11:51:17","modified_gmt":"2025-10-22T08:51:17","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/","title":{"rendered":"Cursos de aperfei\u00e7oamento em seguran\u00e7a cibern\u00e9tica"},"content":{"rendered":"<div data-elementor-type=\"wp-page\" data-elementor-id=\"5475\" class=\"elementor elementor-5475\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-3f4a0206 elementor-section-height-min-height elementor-section-content-middle custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-items-middle\" data-id=\"3f4a0206\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:4,&quot;sizes&quot;:[]},&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-412f2665\" data-id=\"412f2665\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ee71bcf elementor-widget elementor-widget-heading\" data-id=\"ee71bcf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Cursos de aperfei\u00e7oamento em seguran\u00e7a cibern\u00e9tica<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-25af809d elementor-widget elementor-widget-heading\" data-id=\"25af809d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Suas habilidades cibern\u00e9ticas podem fazer a diferen\u00e7a.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4265929f custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4265929f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-3fd066a7\" data-id=\"3fd066a7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2db18b9b elementor-widget elementor-widget-text-editor\" data-id=\"2db18b9b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">\u00c0 medida que nos tornamos cada vez mais dependentes da tecnologia, o potencial de amea\u00e7as cibern\u00e9ticas aumenta. Uma \u00fanica viola\u00e7\u00e3o pode resultar em perdas financeiras significativas, danos \u00e0 reputa\u00e7\u00e3o e diminui\u00e7\u00e3o da confian\u00e7a do cliente. \u00c9 por isso que <strong>empresas de todos os setores precisam mais do que nunca de especialistas em seguran\u00e7a cibern\u00e9tica<\/strong>. <\/span>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-53fec5fa\" data-id=\"53fec5fa\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50cac22b elementor-widget elementor-widget-text-editor\" data-id=\"50cac22b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\"><strong>O aprimoramento da seguran\u00e7a cibern\u00e9tica \u00e9 fundamental, pois capacita os profissionais cibern\u00e9ticos, as equipes de TI, as equipes de DevOps e a ger\u00eancia com o conhecimento e as habilidades para proteger a si mesmos e suas organiza\u00e7\u00f5es contra essas amea\u00e7as<\/strong>. Ao conhecer as \u00faltimas tend\u00eancias e t\u00e9cnicas de seguran\u00e7a cibern\u00e9tica, voc\u00ea pode proteger seus ativos digitais e construir um futuro mais seguro para todos.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-8064682 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"8064682\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9d40567 elementor-widget elementor-widget-video\" data-id=\"9d40567\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;youtube_url&quot;:&quot;https:\\\/\\\/youtu.be\\\/XUsfCElpriQ&quot;,&quot;video_type&quot;:&quot;youtube&quot;,&quot;controls&quot;:&quot;yes&quot;}\" data-widget_type=\"video.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-wrapper elementor-open-inline\">\n\t\t\t<div class=\"elementor-video\"><\/div>\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f09e9b3 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"f09e9b3\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-36efe39 elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"36efe39\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Os cursos de aperfei\u00e7oamento da Wawiwa em seguran\u00e7a cibern\u00e9tica acomodam alunos de todos os n\u00edveis!\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-158cfd5 elementor-widget elementor-widget-text-editor\" data-id=\"158cfd5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Nossos cursos abrangentes, projetados para cobrir as principais \u00e1reas de seguran\u00e7a cibern\u00e9tica, garantem que cada aluno encontre o caminho de aprimoramento que melhor se adapte aos seus n\u00edveis de habilidade atuais e <\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; font-weight: var( --e-global-typography-text-font-weight ); text-align: var(--text-align); background-color: var( --e-global-color-f261a62 ); font-size: 1rem;\">aspira\u00e7\u00f5es de carreira<\/span><span style=\"color: var( --e-global-color-text ); font-family: var( --e-global-typography-text-font-family ), Sans-serif; text-align: var(--text-align); background-color: var( --e-global-color-f261a62 ); font-size: 1rem;\">.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-68536a9 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"68536a9\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d97e5ec elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"d97e5ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">N\u00edvel introdut\u00f3rio<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e0dc43a e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"e0dc43a\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-9bb3485 elementor-widget elementor-widget-text-editor\" data-id=\"9bb3485\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Cursos introdut\u00f3rios<\/strong> s\u00e3o ideais para alunos sem experi\u00eancia cibern\u00e9tica. Ele \u00e9 adequado para tomadores de decis\u00f5es organizacionais e para o p\u00fablico em geral, com o objetivo de compreender os fundamentos da seguran\u00e7a cibern\u00e9tica e sua import\u00e2ncia em v\u00e1rios setores e fun\u00e7\u00f5es.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-87e891f e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"87e891f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-8fcc6d2 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"8fcc6d2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6ec4ccf elementor-widget elementor-widget-image\" data-id=\"6ec4ccf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-awareness\/\">\n\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/intro-to-cyber-1024x574.png\" class=\"attachment-large size-large wp-image-5375\" alt=\"Introdu\u00e7\u00e3o \u00e0 seguran\u00e7a cibern\u00e9tica\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/intro-to-cyber-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/intro-to-cyber-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/intro-to-cyber-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/intro-to-cyber.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fa0db20 elementor-widget elementor-widget-heading\" data-id=\"fa0db20\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introdu\u00e7\u00e3o \u00e0 conscientiza\u00e7\u00e3o cibern\u00e9tica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5298752 elementor-widget elementor-widget-text-editor\" data-id=\"5298752\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>4-8 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a9669e4 elementor-widget elementor-widget-text-editor\" data-id=\"a9669e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este semin\u00e1rio oferece uma introdu\u00e7\u00e3o \u00e0 seguran\u00e7a cibern\u00e9tica, concentrando-se nos riscos, nas amea\u00e7as e nos atores da \u00e1rea. Voc\u00ea se aprofundar\u00e1 nos conceitos de engajamento, respostas e padr\u00f5es cotidianos, incluindo regulamentos, processos e procedimentos. O principal objetivo deste semin\u00e1rio \u00e9 aumentar sua conscientiza\u00e7\u00e3o e seu conhecimento b\u00e1sico sobre seguran\u00e7a cibern\u00e9tica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fc1c5cf elementor-widget elementor-widget-button\" data-id=\"fc1c5cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-awareness\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5240394 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"5240394\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-74fe199 elementor-widget elementor-widget-image\" data-id=\"74fe199\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO-1024x574.png\" class=\"attachment-large size-large wp-image-5381\" alt=\"Prote\u00e7\u00e3o cibern\u00e9tica para organiza\u00e7\u00f5es\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/CPO.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a82bb71 elementor-widget elementor-widget-heading\" data-id=\"a82bb71\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Prote\u00e7\u00e3o cibern\u00e9tica das organiza\u00e7\u00f5es<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9ea6188 elementor-widget elementor-widget-text-editor\" data-id=\"9ea6188\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>28 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b2a4d50 elementor-widget elementor-widget-text-editor\" data-id=\"b2a4d50\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Este curso oferece uma introdu\u00e7\u00e3o geral aos conceitos, m\u00e9todos, padr\u00f5es e pr\u00e1ticas recomendadas de defesa de seguran\u00e7a cibern\u00e9tica, com o objetivo de desenvolver uma base s\u00f3lida de conhecimento. Voc\u00ea aprender\u00e1 a lidar com incidentes de seguran\u00e7a comuns, a se familiarizar com ferramentas de seguran\u00e7a comuns e a se aprofundar em metodologias de defesa cibern\u00e9tica. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59b310e elementor-widget elementor-widget-button\" data-id=\"59b310e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-protection-of-organizations\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a6602a4 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"a6602a4\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cadc864 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"cadc864\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">N\u00edvel de Fundamentos<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-69660cd e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"69660cd\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3856e44 elementor-widget elementor-widget-text-editor\" data-id=\"3856e44\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O curso de n\u00edvel fundamental atende a juniores de TI e seguran\u00e7a, analistas cibern\u00e9ticos e equipes de SecOps, sendo perfeito para aqueles que buscam aprimorar seus conhecimentos b\u00e1sicos de seguran\u00e7a cibern\u00e9tica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-c3f3fb6 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"c3f3fb6\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-0730a01 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"0730a01\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37c03de elementor-widget elementor-widget-image\" data-id=\"37c03de\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-and-incident-response\/\">\n\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-1024x574.png\" class=\"attachment-large size-large wp-image-5383\" alt=\"Seguran\u00e7a cibern\u00e9tica e resposta a incidentes para profissionais de TI\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b0252d elementor-widget elementor-widget-heading\" data-id=\"5b0252d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Seguran\u00e7a cibern\u00e9tica e resposta a incidentes para profissionais de TI<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2c4113 elementor-widget elementor-widget-text-editor\" data-id=\"f2c4113\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3afe472 elementor-widget elementor-widget-text-editor\" data-id=\"3afe472\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Desenvolvido especificamente para pessoas com experi\u00eancia em TI, este curso exclusivo oferece uma introdu\u00e7\u00e3o \u00e0 resposta a incidentes, ensina como lidar com incidentes de seguran\u00e7a comuns e explica como aproveitar a intelig\u00eancia contra amea\u00e7as cibern\u00e9ticas e as investiga\u00e7\u00f5es forenses digitais para melhorar a resposta a incidentes.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1f4e0f elementor-widget elementor-widget-button\" data-id=\"b1f4e0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-and-incident-response\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5251e3b e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"5251e3b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-2817181 elementor-widget elementor-widget-image\" data-id=\"2817181\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/soc-operations-for-analysts\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/SOCS-for-analysts-1024x574.png\" class=\"attachment-large size-large wp-image-5776\" alt=\"Opera\u00e7\u00e3o do SOC para analistas\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/SOCS-for-analysts-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/SOCS-for-analysts-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/SOCS-for-analysts-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/SOCS-for-analysts-1536x861.png 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/SOCS-for-analysts-2048x1148.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6636366 elementor-widget elementor-widget-heading\" data-id=\"6636366\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Opera\u00e7\u00e3o do SOC para analistas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f6da12c elementor-widget elementor-widget-text-editor\" data-id=\"f6da12c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>20 horas acad\u00eamicas<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-279b664 elementor-widget elementor-widget-text-editor\" data-id=\"279b664\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este curso de aprimoramento de habilidades foi criado para proporcionar uma jornada envolvente de 20 horas no mundo das opera\u00e7\u00f5es de seguran\u00e7a. Ele se concentra nos aspectos pr\u00e1ticos da detec\u00e7\u00e3o e resposta a amea\u00e7as \u00e0 seguran\u00e7a cibern\u00e9tica. O treinamento inclui atividades pr\u00e1ticas centradas em opera\u00e7\u00f5es de SOC, tratamento de amea\u00e7as, an\u00e1lise de amea\u00e7as e t\u00e9cnicas essenciais de resposta.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-57d48fc elementor-widget elementor-widget-button\" data-id=\"57d48fc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/soc-operations-for-analysts\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9d63624 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"9d63624\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-f22d876 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"f22d876\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-98f8e1e elementor-widget elementor-widget-image\" data-id=\"98f8e1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/risk-management\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Intro-to-risk-management-1024x574.png\" class=\"attachment-large size-large wp-image-5781\" alt=\"Introdu\u00e7\u00e3o ao gerenciamento de riscos\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Intro-to-risk-management-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Intro-to-risk-management-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Intro-to-risk-management-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Intro-to-risk-management.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b4a80c elementor-widget elementor-widget-heading\" data-id=\"0b4a80c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Introdu\u00e7\u00e3o ao gerenciamento de riscos<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bfd255 elementor-widget elementor-widget-text-editor\" data-id=\"3bfd255\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>21 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-02b4f66 elementor-widget elementor-widget-text-editor\" data-id=\"02b4f66\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este workshop foi criado para oferecer aos profissionais cibern\u00e9ticos em est\u00e1gio inicial uma compreens\u00e3o hol\u00edstica da Estrutura de Gerenciamento de Riscos (RMF) do NIST e suas aplica\u00e7\u00f5es pr\u00e1ticas. Este workshop apresenta o RMF, entrela\u00e7ando-o com os padr\u00f5es relevantes do NIST, publica\u00e7\u00f5es constituintes, principais terminologias e o cen\u00e1rio mais amplo dos padr\u00f5es e metodologias de gerenciamento de riscos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8fe9736 elementor-widget elementor-widget-button\" data-id=\"8fe9736\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/risk-management\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5da33ba e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"5da33ba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71600bb elementor-widget elementor-widget-image\" data-id=\"71600bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/basic-level-monitoring-team\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Training-of-a-Basic-Level-Monitoring-Team---Analyst-Tier-1-1024x574.png\" class=\"attachment-large size-large wp-image-5706\" alt=\"Treinamento de uma equipe de monitoramento de n\u00edvel b\u00e1sico - Analista N\u00edvel 1\" srcset=\"\" sizes=\"(max-width: 800px) 100vw, 800px\" data-srcset=\"\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-512b61c elementor-widget elementor-widget-heading\" data-id=\"512b61c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Treinamento de uma equipe de monitoramento de n\u00edvel b\u00e1sico\nAnalista N\u00edvel 1<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-feb5d99 elementor-widget elementor-widget-text-editor\" data-id=\"feb5d99\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0de7044 elementor-widget elementor-widget-text-editor\" data-id=\"0de7044\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este curso foi criado para fornecer aos analistas de SOC de n\u00edvel b\u00e1sico os conhecimentos e as habilidades essenciais necess\u00e1rios para gerenciar com efici\u00eancia a triagem inicial de alertas de seguran\u00e7a. Ele abrange os aspectos administrativos e operacionais cruciais para os analistas de N\u00edvel 1.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2100611 elementor-align-left elementor-widget elementor-widget-button\" data-id=\"2100611\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/basic-level-monitoring-team\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-6f0f528 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"6f0f528\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-815bc3f e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"815bc3f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-978beef elementor-widget elementor-widget-image\" data-id=\"978beef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-and-incident-response-150\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/03\/odette0888_47378_a_sports-style_poster_composed_of_a_realistic__68461979-bd0c-4f5d-b0d4-1b777b8b2a68-1024x574.png\" class=\"attachment-large size-large wp-image-6517\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/03\/odette0888_47378_a_sports-style_poster_composed_of_a_realistic__68461979-bd0c-4f5d-b0d4-1b777b8b2a68-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/03\/odette0888_47378_a_sports-style_poster_composed_of_a_realistic__68461979-bd0c-4f5d-b0d4-1b777b8b2a68-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/03\/odette0888_47378_a_sports-style_poster_composed_of_a_realistic__68461979-bd0c-4f5d-b0d4-1b777b8b2a68-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/03\/odette0888_47378_a_sports-style_poster_composed_of_a_realistic__68461979-bd0c-4f5d-b0d4-1b777b8b2a68-18x10.png 18w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/03\/odette0888_47378_a_sports-style_poster_composed_of_a_realistic__68461979-bd0c-4f5d-b0d4-1b777b8b2a68.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-79903cd elementor-widget elementor-widget-heading\" data-id=\"79903cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Seguran\u00e7a cibern\u00e9tica e resposta a incidentes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60097f1 elementor-widget elementor-widget-text-editor\" data-id=\"60097f1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>150 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd46a5c elementor-widget elementor-widget-text-editor\" data-id=\"fd46a5c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>O curso de aperfei\u00e7oamento em Seguran\u00e7a Cibern\u00e9tica e Resposta a Incidentes foi criado para aprimorar as habilidades e os recursos de resposta a incidentes. Feito sob medida para alunos e equipes com forma\u00e7\u00e3o em TI, ele abrange estrat\u00e9gias de detec\u00e7\u00e3o, an\u00e1lise e resposta a amea\u00e7as para reduzir os riscos cibern\u00e9ticos de forma eficaz. Ao se inscrever neste curso, voc\u00ea estar\u00e1 dando um passo significativo para o avan\u00e7o de sua experi\u00eancia em seguran\u00e7a cibern\u00e9tica, equipando-se com habilidades e conhecimentos pr\u00e1ticos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-39e0234 elementor-widget elementor-widget-button\" data-id=\"39e0234\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cybersecurity-and-incident-response-150\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce6d4a1 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"ce6d4a1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-e098907 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"e098907\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-7d6319a elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"7d6319a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">N\u00edvel intermedi\u00e1rio<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9ec03ef e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"9ec03ef\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-574ba9f elementor-widget elementor-widget-text-editor\" data-id=\"574ba9f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os cursos de n\u00edvel intermedi\u00e1rio s\u00e3o adaptados para respondedores de incidentes, administradores de sistemas, profissionais de seguran\u00e7a cibern\u00e9tica e estudantes de bacharelado em tecnologia que desejam aprofundar seus conhecimentos t\u00e9cnicos e enfrentar desafios cibern\u00e9ticos mais complexos.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-eb9f713 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"eb9f713\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-3fdebbc e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"3fdebbc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fe81ce5 elementor-widget elementor-widget-image\" data-id=\"fe81ce5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-threat-intelligence\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence-1024x574.png\" class=\"attachment-large size-large wp-image-5386\" alt=\"intelig\u00eancia sobre amea\u00e7as cibern\u00e9ticas\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-threat-and-intelligence.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-221c93c elementor-widget elementor-widget-heading\" data-id=\"221c93c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Intelig\u00eancia sobre amea\u00e7as cibern\u00e9ticas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e3b7ca elementor-widget elementor-widget-text-editor\" data-id=\"8e3b7ca\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-612b8b9 elementor-widget elementor-widget-text-editor\" data-id=\"612b8b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">O objetivo deste curso \u00e9 familiarizar os alunos com o mundo das investiga\u00e7\u00f5es de intelig\u00eancia de amea\u00e7as cibern\u00e9ticas e Threat Hunting, com \u00eanfase nas ferramentas OSINT no setor financeiro, hacking \u00e9tico, an\u00e1lise de malware e processos forenses digitais.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-363de7b elementor-widget elementor-widget-button\" data-id=\"363de7b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-threat-intelligence\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ccc6c53 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"ccc6c53\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-37e9e00 elementor-widget elementor-widget-image\" data-id=\"37e9e00\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/malware-analysis-investigator\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Malware-Analysis-Investigator-1024x574.png\" class=\"attachment-large size-large wp-image-5442\" alt=\"Investigador de an\u00e1lise de malware\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Malware-Analysis-Investigator-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Malware-Analysis-Investigator-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Malware-Analysis-Investigator-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Malware-Analysis-Investigator.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-59b67ee elementor-widget elementor-widget-heading\" data-id=\"59b67ee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Investigador de an\u00e1lise de malware<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6cf09fa elementor-widget elementor-widget-text-editor\" data-id=\"6cf09fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-317e860 elementor-widget elementor-widget-text-editor\" data-id=\"317e860\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Projetado para profissionais de seguran\u00e7a cibern\u00e9tica que buscam aprimorar seus conhecimentos, este curso \u00fanico aborda o desafio da constante evolu\u00e7\u00e3o das amea\u00e7as de malware. Ele oferece aos participantes um mergulho profundo nas amea\u00e7as de malware e nas t\u00e9cnicas de an\u00e1lise de malware.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9abaad8 elementor-widget elementor-widget-button\" data-id=\"9abaad8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/malware-analysis-investigator\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce2b688 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"ce2b688\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63502ba e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"63502ba\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-d29236f elementor-widget elementor-widget-image\" data-id=\"d29236f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/training-of-ir-team-basic\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber-1024x574.png\" class=\"attachment-large size-large wp-image-6070\" alt=\"Treinamento da equipe de RI - Treinamento b\u00e1sico\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber-1536x861.png 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber-2048x1148.png 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-76a1178 elementor-widget elementor-widget-heading\" data-id=\"76a1178\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Treinamento da equipe de RI - Treinamento b\u00e1sico<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7ed93db elementor-widget elementor-widget-text-editor\" data-id=\"7ed93db\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a81c534 elementor-widget elementor-widget-text-editor\" data-id=\"a81c534\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este curso de aperfei\u00e7oamento foi criado para analistas de SOC que desejam aprimorar seus conhecimentos sobre os processos de resposta a incidentes e suas aplica\u00e7\u00f5es pr\u00e1ticas em um ambiente de SOC, desenvolvendo as habilidades necess\u00e1rias para um analista de SOC de n\u00edvel 2.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4365d32 elementor-widget elementor-widget-button\" data-id=\"4365d32\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/training-of-ir-team-basic\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2811558 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"2811558\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-16e0244 elementor-widget elementor-widget-image\" data-id=\"16e0244\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/advanced-level-monitoring-team\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Cyber-1024x574.png\" class=\"attachment-large size-large wp-image-5702\" alt=\"Treinamento da equipe de monitoramento de n\u00edvel avan\u00e7ado - Analista N\u00edvel 2\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Cyber-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Cyber-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Cyber-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/05\/Cyber.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f34fe19 elementor-widget elementor-widget-heading\" data-id=\"f34fe19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Treinamento da equipe de monitoramento de n\u00edvel avan\u00e7ado - Analista N\u00edvel 2<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-60cd402 elementor-widget elementor-widget-text-editor\" data-id=\"60cd402\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>40 horas acad\u00eamicas<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1c0de9 elementor-widget elementor-widget-text-editor\" data-id=\"b1c0de9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este curso foi desenvolvido para analistas de SOC que est\u00e3o subindo para o N\u00edvel 2, enfatizando a orquestra\u00e7\u00e3o do processo de triagem e o tratamento de alertas escalonados. O curso aprofunda os conceitos fundamentais do N\u00edvel 1, introduzindo t\u00e9cnicas avan\u00e7adas de lideran\u00e7a, estrat\u00e9gias eficazes de resposta a incidentes e habilidades refinadas de seguran\u00e7a cibern\u00e9tica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89863da elementor-align-left elementor-widget elementor-widget-button\" data-id=\"89863da\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/advanced-level-monitoring-team\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-642efdb e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"642efdb\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-e3c2f71 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"e3c2f71\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-305a7f6 elementor-widget elementor-widget-image\" data-id=\"305a7f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/ai-and-cybersecurity\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/10\/odette0888_47378_a_positive_sports-style_poster_composed_of_a_r_4a4b9767-1627-44c5-82cc-75642e9976af-1024x574.png\" class=\"attachment-large size-large wp-image-6843\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/10\/odette0888_47378_a_positive_sports-style_poster_composed_of_a_r_4a4b9767-1627-44c5-82cc-75642e9976af-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/10\/odette0888_47378_a_positive_sports-style_poster_composed_of_a_r_4a4b9767-1627-44c5-82cc-75642e9976af-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/10\/odette0888_47378_a_positive_sports-style_poster_composed_of_a_r_4a4b9767-1627-44c5-82cc-75642e9976af-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/10\/odette0888_47378_a_positive_sports-style_poster_composed_of_a_r_4a4b9767-1627-44c5-82cc-75642e9976af-18x10.png 18w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/10\/odette0888_47378_a_positive_sports-style_poster_composed_of_a_r_4a4b9767-1627-44c5-82cc-75642e9976af.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-888398b elementor-widget elementor-widget-heading\" data-id=\"888398b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">IA e seguran\u00e7a cibern\u00e9tica<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8e4be26 elementor-widget elementor-widget-text-editor\" data-id=\"8e4be26\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01a8020 elementor-widget elementor-widget-text-editor\" data-id=\"01a8020\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Este curso foi desenvolvido para pessoas com experi\u00eancia em TI ou seguran\u00e7a cibern\u00e9tica, explorando a fun\u00e7\u00e3o crescente da IA no cen\u00e1rio cibern\u00e9tico. Ele abrange amea\u00e7as orientadas por IA, t\u00e9cnicas de ataque e estrat\u00e9gias defensivas, enquanto examina como a IA \u00e9 integrada a ferramentas e estruturas modernas de seguran\u00e7a cibern\u00e9tica.\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-19ef212 elementor-widget elementor-widget-button\" data-id=\"19ef212\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/ai-and-cybersecurity\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-f9b677c e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"f9b677c\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-2711ab2 e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"2711ab2\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a8bc565 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\" data-id=\"a8bc565\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"icon-list.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-icon-list-items\">\n\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"far fa-eye\"><\/i>\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">N\u00edvel avan\u00e7ado<\/span>\n\t\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64cc8bf e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"64cc8bf\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-bfa9fc9 elementor-widget elementor-widget-text-editor\" data-id=\"bfa9fc9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Os cursos de n\u00edvel avan\u00e7ado atendem \u00e0s necessidades de profissionais experientes em cibern\u00e9tica e TI, l\u00edderes em seguran\u00e7a cibern\u00e9tica e especialistas como gerentes de SOC e analistas forenses, concentrando-se em estrat\u00e9gias de alto n\u00edvel, t\u00e1ticas espec\u00edficas, an\u00e1lise avan\u00e7ada de amea\u00e7as e mecanismos de defesa sist\u00eamica.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-4d00d7b e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"4d00d7b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-90bd0a8 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"90bd0a8\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-33cc59d elementor-widget elementor-widget-image\" data-id=\"33cc59d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-security-and-incident-response\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-manager-1024x574.png\" class=\"attachment-large size-large wp-image-5409\" alt=\"Seguran\u00e7a cibern\u00e9tica e resposta a incidentes para gerentes\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-manager-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-manager-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-manager-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/cyber-manager.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-53b41fe elementor-widget elementor-widget-heading\" data-id=\"53b41fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Seguran\u00e7a cibern\u00e9tica e resposta a incidentes para gerentes<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-ab24479 elementor-widget elementor-widget-text-editor\" data-id=\"ab24479\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-75a9c51 elementor-widget elementor-widget-text-editor\" data-id=\"75a9c51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Criado para gerentes de seguran\u00e7a cibern\u00e9tica, este curso oferece uma introdu\u00e7\u00e3o \u00e0 resposta a incidentes e ensina os participantes a lidar e gerenciar incidentes de seguran\u00e7a comuns. A participa\u00e7\u00e3o neste curso preparar\u00e1 voc\u00ea e a equipe de seguran\u00e7a cibern\u00e9tica da sua organiza\u00e7\u00e3o para lidar, investigar e agir de acordo com os padr\u00f5es comuns de resposta a incidentes, como o Plano de Resposta a Incidentes do NIST e as estruturas do MITRE Attack.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c828b02 elementor-widget elementor-widget-button\" data-id=\"c828b02\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-security-and-incident-response\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-9393b05 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"9393b05\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-a80c3fe elementor-widget elementor-widget-image\" data-id=\"a80c3fe\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/advanced-incident-response-and-forensics\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Advanced-Incident-Response-and-Forensics-1024x574.png\" class=\"attachment-large size-large wp-image-5445\" alt=\"Resposta avan\u00e7ada a incidentes e per\u00edcia\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Advanced-Incident-Response-and-Forensics-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Advanced-Incident-Response-and-Forensics-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Advanced-Incident-Response-and-Forensics-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Advanced-Incident-Response-and-Forensics.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7b5227c elementor-widget elementor-widget-heading\" data-id=\"7b5227c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Resposta avan\u00e7ada a incidentes e per\u00edcia\n<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f387457 elementor-widget elementor-widget-text-editor\" data-id=\"f387457\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4d9a198 elementor-widget elementor-widget-text-editor\" data-id=\"4d9a198\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Destinado a profissionais de seguran\u00e7a cibern\u00e9tica que buscam aprimorar suas capacidades, este curso foi criado para aprimorar as habilidades dos participantes em resposta a incidentes, investiga\u00e7\u00e3o e per\u00edcia em um ambiente organizacional. Destinado a equipes experientes de seguran\u00e7a cibern\u00e9tica e TI, o curso exp\u00f5e os participantes a m\u00e9todos, procedimentos, tecnologias e ferramentas inovadores, essenciais para uma resposta eficaz a incidentes. <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-24830f3 elementor-widget elementor-widget-button\" data-id=\"24830f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/advanced-incident-response-and-forensics\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-64b2fbe e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"64b2fbe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-d22efa1 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"d22efa1\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-61fd73a elementor-widget elementor-widget-image\" data-id=\"61fd73a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-threat-hunter\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Certified-Cyber-Threat-Hunter-1024x574.png\" class=\"attachment-large size-large wp-image-5405\" alt=\"Ca\u00e7ador de amea\u00e7as cibern\u00e9ticas certificado\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Certified-Cyber-Threat-Hunter-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Certified-Cyber-Threat-Hunter-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Certified-Cyber-Threat-Hunter-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Certified-Cyber-Threat-Hunter.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d770f3 elementor-widget elementor-widget-heading\" data-id=\"2d770f3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Ca\u00e7ador de amea\u00e7as cibern\u00e9ticas<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4793fa1 elementor-widget elementor-widget-text-editor\" data-id=\"4793fa1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d74928 elementor-widget elementor-widget-text-editor\" data-id=\"2d74928\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Este curso foi criado para equipar os participantes com o conhecimento e as habilidades para procurar e identificar amea\u00e7as \u00e0 seguran\u00e7a cibern\u00e9tica na rede de suas organiza\u00e7\u00f5es. O curr\u00edculo abrange os fundamentos da ca\u00e7a a amea\u00e7as, incluindo diferentes tipos de ca\u00e7a, processos, miss\u00f5es e estrat\u00e9gias para aumentar sua maturidade. Este curso tamb\u00e9m explora t\u00e9cnicas espec\u00edficas de ca\u00e7a em n\u00edvel de rede e de endpoint.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-88e805c elementor-widget elementor-widget-button\" data-id=\"88e805c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/cyber-threat-hunter\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-b7a6a62 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"b7a6a62\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e0ac09b elementor-widget elementor-widget-image\" data-id=\"e0ac09b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/training-of-ir-team-advanced\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber2-1024x574.png\" class=\"attachment-large size-large wp-image-6072\" alt=\"Treinamento da equipe de RI - Treinamento avan\u00e7ado\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber2-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber2-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber2-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/09\/cyber2.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2f885af elementor-widget elementor-widget-heading\" data-id=\"2f885af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Treinamento da equipe de RI - Treinamento avan\u00e7ado<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ddfa14 elementor-widget elementor-widget-text-editor\" data-id=\"6ddfa14\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3bb244f elementor-widget elementor-widget-text-editor\" data-id=\"3bb244f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Este curso de aperfei\u00e7oamento foi criado para aprimorar o conhecimento e as habilidades de profissionais experientes em resposta a incidentes com investiga\u00e7\u00f5es avan\u00e7adas e aprofundadas sobre sistemas operacionais e redes. O curr\u00edculo foi desenvolvido para aumentar a capacidade do respondente de fornecer um suporte valioso na investiga\u00e7\u00e3o de incidentes complexos, ao mesmo tempo em que se aprofunda na an\u00e1lise forense avan\u00e7ada de rede e mem\u00f3ria<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6a04ee7 elementor-widget elementor-widget-button\" data-id=\"6a04ee7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/training-of-ir-team-advanced\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-1ca021b e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"1ca021b\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-ced374d e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"ced374d\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-12c4098 elementor-widget elementor-widget-image\" data-id=\"12c4098\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/windows-forensics\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Windows-Forensics-1024x574.png\" class=\"attachment-large size-large wp-image-5448\" alt=\"An\u00e1lise forense do Windows\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Windows-Forensics-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Windows-Forensics-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Windows-Forensics-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Windows-Forensics.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1df60f8 elementor-widget elementor-widget-heading\" data-id=\"1df60f8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">An\u00e1lise forense do Windows<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b074e6 elementor-widget elementor-widget-text-editor\" data-id=\"3b074e6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a0644f0 elementor-widget elementor-widget-text-editor\" data-id=\"a0644f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Este curso permite que os participantes aprimorem suas capacidades, habilidades e conhecimentos em rela\u00e7\u00e3o a investiga\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica e forense em um ambiente de sistema operacional Microsoft Windows.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b81fe84 elementor-widget elementor-widget-button\" data-id=\"b81fe84\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/windows-forensics\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-a546797 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"a546797\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-39db884 elementor-widget elementor-widget-image\" data-id=\"39db884\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/network-forensics\/\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"448\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Network-Forensics-1024x574.png\" class=\"attachment-large size-large wp-image-5447\" alt=\"Forense de rede\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Network-Forensics-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Network-Forensics-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Network-Forensics-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Network-Forensics.png 1456w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-320d975 elementor-widget elementor-widget-heading\" data-id=\"320d975\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Forense de rede<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9dea6b2 elementor-widget elementor-widget-text-editor\" data-id=\"9dea6b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>40 horas acad\u00eamicas<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-89b6964 elementor-widget elementor-widget-text-editor\" data-id=\"89b6964\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span style=\"font-weight: 400;\">Projetado para elevar as capacidades, as habilidades e o conhecimento dos alunos em investiga\u00e7\u00f5es de seguran\u00e7a cibern\u00e9tica e an\u00e1lise forense de redes, este curso \u00e9 voltado para pessoas que desejam aprofundar sua compreens\u00e3o e profici\u00eancia.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-442272a elementor-widget elementor-widget-button\" data-id=\"442272a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/network-forensics\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Saiba mais<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-ad8c208 custom_overflow elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"ad8c208\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6253018\" data-id=\"6253018\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-d0e9343 elementor-widget elementor-widget-heading\" data-id=\"d0e9343\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Supervisor e instrutores profissionais<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e4d4daa elementor-widget elementor-widget-heading\" data-id=\"e4d4daa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">A supervis\u00e3o de todos os cursos cibern\u00e9ticos da Wawiwa \u00e9 feita pelo Sr. Nadav Nachmias, diretor de programas de seguran\u00e7a cibern\u00e9tica da Wawiwa.\n\nOs instrutores do curso s\u00e3o profissionais de seguran\u00e7a cibern\u00e9tica com experi\u00eancia pr\u00e1tica e habilidades de treinamento. O n\u00edvel t\u00e9cnico do curso pode ser ajustado de acordo com o p\u00fablico.<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-74346c0 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"74346c0\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-e64bee2\" data-id=\"e64bee2\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f455f6c elementor-widget elementor-widget-image\" data-id=\"f455f6c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"982\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg\" class=\"attachment-large size-large wp-image-5376\" alt=\"Nadav Nachmias Diretor de Programas de Seguran\u00e7a Cibern\u00e9tica\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-834x1024.jpeg 834w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-244x300.jpeg 244w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias-768x943.jpeg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/01\/Nadav-Nachmias.jpeg 1043w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-bc7fb35 elementor-widget elementor-widget-heading\" data-id=\"bc7fb35\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Nadav Nachmias<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-49af620 elementor-widget elementor-widget-text-editor\" data-id=\"49af620\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Chefe de programas de seguran\u00e7a cibern\u00e9tica<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28624fb elementor-absolute elementor-widget elementor-widget-image\" data-id=\"28624fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-74a9262\" data-id=\"74a9262\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5e24060 elementor-widget elementor-widget-text-editor\" data-id=\"5e24060\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Nadav \u00e9 um especialista em seguran\u00e7a cibern\u00e9tica com mais de 15 anos de experi\u00eancia, com foco em estrat\u00e9gias de seguran\u00e7a cibern\u00e9tica, arquitetura e capacita\u00e7\u00e3o da for\u00e7a de trabalho. Sua experi\u00eancia pr\u00e1tica tornou intuitivo o desenvolvimento de diversos programas e materiais de treinamento em v\u00e1rios campos da seguran\u00e7a cibern\u00e9tica (incluindo gerenciamento de seguran\u00e7a cibern\u00e9tica, tratamento e resposta a incidentes e per\u00edcia cibern\u00e9tica).<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f85a823 elementor-absolute elementor-widget elementor-widget-image\" data-id=\"f85a823\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_position&quot;:&quot;absolute&quot;}\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"352\" height=\"352\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png\" class=\"attachment-full size-full wp-image-2148\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots.png 352w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-300x300.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/06\/white-dots-150x150.png 150w\" sizes=\"(max-width: 352px) 100vw, 352px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-c3fc378 e-con-full e-ecs-flex e-flex e-con e-child\" data-id=\"c3fc378\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t<div class=\"elementor-element elementor-element-7a9d663 e-ecs-flex e-flex e-con-boxed e-con e-child\" data-id=\"7a9d663\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6a6cf1a elementor-align-center elementor-widget elementor-widget-button\" data-id=\"6a6cf1a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/be-our-partner\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Quero oferecer cursos de seguran\u00e7a cibern\u00e9tica<br>em minha institui\u00e7\u00e3o<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-08c1ebb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"08c1ebb\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-0fb4226\" data-id=\"0fb4226\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54123b9 elementor-widget elementor-widget-heading\" data-id=\"54123b9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">O que os graduados t\u00eam a dizer?<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e78f81c elementor-testimonial--skin-default elementor-testimonial--layout-image_inline elementor-testimonial--align-center elementor-arrows-yes elementor-pagination-type-bullets elementor-widget elementor-widget-testimonial-carousel\" data-id=\"e78f81c\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;autoplay_speed&quot;:10000,&quot;show_arrows&quot;:&quot;yes&quot;,&quot;pagination&quot;:&quot;bullets&quot;,&quot;speed&quot;:500,&quot;autoplay&quot;:&quot;yes&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;pause_on_hover&quot;:&quot;yes&quot;,&quot;pause_on_interaction&quot;:&quot;yes&quot;,&quot;space_between&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;space_between_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]}}\" data-widget_type=\"testimonial-carousel.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-swiper\">\n\t\t\t\t\t<div class=\"elementor-main-swiper swiper\" role=\"region\" aria-roledescription=\"carousel\" aria-label=\"Slides\">\n\t\t\t\t<div class=\"swiper-wrapper\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"swiper-slide\" role=\"group\" aria-roledescription=\"slide\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial\">\n\t\t\t\t\t\t\t<div class=\"elementor-testimonial__content\">\n\t\t\t\t\t<div class=\"elementor-testimonial__text\">\n\t\t\t\t\t\t\"Sempre tive interesse em seguran\u00e7a cibern\u00e9tica. Eu tinha uma paix\u00e3o por esse campo enorme que est\u00e1 sempre evoluindo. Procurei cursos on-line e descobri que a maioria deles \u00e9 muito pr\u00e1tica, um v\u00eddeo em um site. Ent\u00e3o, encontrei o programa de seguran\u00e7a cibern\u00e9tica da Wawiwa. Registrei-me e, ao longo do programa, fiquei ansioso pelas aulas. \u00c9 uma sess\u00e3o ao vivo, com muito trabalho pr\u00e1tico, trabalhando com ferramentas cibern\u00e9ticas da vida real e experimentando o que elas podem fazer. Os instrutores t\u00eam hist\u00f3rias reais e exemplos do campo para transmitir seus pontos de vista. Isso torna o programa realmente empolgante!\"\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-testimonial__footer\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-testimonial__image\">\n\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/02\/John-Hamilton-Cyber-CTIA2.jpg\" alt=\"John Hamilton, graduado do Programa de Analista de Seguran\u00e7a Cibern\u00e9tica, CTIA powered by Wawiwa\">\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<cite class=\"elementor-testimonial__cite\"><span class=\"elementor-testimonial__name\">John Hamilton<\/span><span class=\"elementor-testimonial__title\">Analista de seguran\u00e7a cibern\u00e9tica<\/span><\/cite>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t<div class=\"elementor-element elementor-element-e65c07f e-ecs-flex e-flex e-con-boxed e-con e-parent\" data-id=\"e65c07f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;ecs_container_type&quot;:&quot;flex&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ed73223 elementor-widget elementor-widget-heading\" data-id=\"ed73223\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Leia nossos blogs...<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6169d13 elementor-grid-3 elementor-grid-tablet-2 elementor-grid-mobile-1 elementor-posts--thumbnail-top elementor-card-shadow-yes elementor-posts__hover-gradient elementor-widget elementor-widget-posts\" data-id=\"6169d13\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;cards_columns&quot;:&quot;3&quot;,&quot;cards_columns_tablet&quot;:&quot;2&quot;,&quot;cards_columns_mobile&quot;:&quot;1&quot;,&quot;cards_row_gap&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:35,&quot;sizes&quot;:[]},&quot;cards_row_gap_tablet&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]},&quot;cards_row_gap_mobile&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:[]}}\" data-widget_type=\"posts.cards\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-posts-container elementor-posts elementor-posts--skin-cards elementor-grid\" role=\"list\">\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4873 post type-post status-publish format-standard has-post-thumbnail hentry category-webinar tag-army tag-cyber tag-idf tag-it tag-methodology tag-military tag-tech tag-training\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/webinar\/mamram-webinar-idf-tech-training\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-300x168.png\" class=\"attachment-medium size-medium wp-image-4875\" alt=\"Sala de guerra cibern\u00e9tica\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/07\/oded666_a_digital_art_illustration_of_the_war_room_headquarters_c1c8fbcf-881f-4417-96b2-d67bcdeb1087.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Webinar<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/webinar\/mamram-webinar-idf-tech-training\/\" >\n\t\t\t\tUma vis\u00e3o privilegiada da MAMRAM: como as IDF de Israel treinam talentos tecnol\u00f3gicos e impactam a inova\u00e7\u00e3o global\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Uma visita aos bastidores do centro secreto de treinamento tecnol\u00f3gico de Israel - a MAMRAM, uma unidade de elite das For\u00e7as de Defesa de Israel (IDF)! H\u00e1 muito tempo, a MAMRAM vem transformando jovens mentes brilhantes em magos da alta tecnologia e guerreiros cibern\u00e9ticos, equipando-os com a\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/webinar\/mamram-webinar-idf-tech-training\/\" aria-label=\"Leia mais sobre Uma vis\u00e3o privilegiada da MAMRAM: como as IDF de Israel treinam talentos tecnol\u00f3gicos e impactam a inova\u00e7\u00e3o global\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t10\/07\/2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6292 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-cyber-security tag-cybersecurity tag-learning tag-reskilling tag-upskilling-en\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/best-cyber-security-courses-to-land-top-in-demand-jobs\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-300x168.png\" class=\"attachment-medium size-medium wp-image-6305\" alt=\"cursos cibern\u00e9ticos\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/12\/cyber.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprendizagem<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/best-cyber-security-courses-to-land-top-in-demand-jobs\/\" >\n\t\t\t\tOs melhores cursos de seguran\u00e7a cibern\u00e9tica para conseguir os melhores empregos sob demanda\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>A seguran\u00e7a cibern\u00e9tica \u00e9 uma das \u00e1reas mais procuradas, oferecendo altos sal\u00e1rios, seguran\u00e7a no emprego e a chance de proteger os ativos digitais das empresas e combater as amea\u00e7as cibern\u00e9ticas. Como as organiza\u00e7\u00f5es priorizam cada vez mais a prote\u00e7\u00e3o de dados, a demanda por profissionais qualificados disparou. Sal\u00e1rios de n\u00edvel b\u00e1sico\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/best-cyber-security-courses-to-land-top-in-demand-jobs\/\" aria-label=\"Leia mais sobre Os melhores cursos de seguran\u00e7a cibern\u00e9tica para conseguir os empregos mais procurados\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t27\/12\/2024\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6314 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-cyber-security tag-cybersecurity tag-learning tag-reskilling tag-upskilling-en\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/coursera-cybersecurity-alternatives\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-300x168.png\" class=\"attachment-medium size-medium wp-image-6315\" alt=\"Alternativas ao coursera\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/01\/Alternatives-to-coursera.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprendizagem<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/coursera-cybersecurity-alternatives\/\" >\n\t\t\t\tAlternativas ao Coursera Cybersecurity\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>As habilidades de seguran\u00e7a cibern\u00e9tica s\u00e3o mais essenciais do que nunca, com quase 90% das organiza\u00e7\u00f5es sofrendo algum tipo de viola\u00e7\u00e3o nos \u00faltimos anos devido \u00e0 falta de conhecimento especializado. Isso destaca a necessidade urgente de profissionais com as habilidades certas para combater as amea\u00e7as cibern\u00e9ticas.\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/coursera-cybersecurity-alternatives\/\" aria-label=\"Leia mais sobre as alternativas de seguran\u00e7a cibern\u00e9tica do Coursera\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t09\/01\/2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4400 post type-post status-publish format-standard has-post-thumbnail hentry category-tech-jobs tag-cyber-forensics tag-cyber-hunting tag-cybersecurity tag-cybersecurity-specialist tag-industrial-control-systems tag-information-systems tag-malware tag-malware-analysis tag-social-engineering tag-tech-jobs tag-tech-training tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/cyber-career-paths-from-cybersecurity-analyst-to-ciso\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"194\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-300x194.jpg\" class=\"attachment-medium size-medium wp-image-4401\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-300x194.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-1024x662.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-768x496.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-1536x993.jpg 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/pexels-mikhail-nilov-6963061-scaled-e1648578801418-2048x1324.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Empregos na \u00e1rea de tecnologia<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/cyber-career-paths-from-cybersecurity-analyst-to-ciso\/\" >\n\t\t\t\tCaminhos da carreira cibern\u00e9tica: do analista de seguran\u00e7a cibern\u00e9tica ao CISO\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>O dom\u00ednio da seguran\u00e7a cibern\u00e9tica oferece uma ampla gama de oportunidades para profissionais de tecnologia. Desde a an\u00e1lise de malware at\u00e9 o gerenciamento de uma divis\u00e3o de defensores cibern\u00e9ticos, uma carreira na \u00e1rea cibern\u00e9tica o mant\u00e9m em p\u00e9 por d\u00e9cadas!<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/cyber-career-paths-from-cybersecurity-analyst-to-ciso\/\" aria-label=\"Leia mais sobre Caminhos da carreira cibern\u00e9tica: de analista de seguran\u00e7a cibern\u00e9tica a CISO\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t29\/03\/2022\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-5018 post type-post status-publish format-standard has-post-thumbnail hentry category-trending tag-cybersecurity tag-talent-shortage tag-tech tag-technology\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/trending\/guarding-tomorrow-the-escalating-need-for-cybersecurity-expertise\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"168\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-300x168.png\" class=\"attachment-medium size-medium wp-image-5019\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-300x168.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-1024x574.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity-768x430.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/08\/cybersecurity.png 1456w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Tend\u00eancias<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/trending\/guarding-tomorrow-the-escalating-need-for-cybersecurity-expertise\/\" >\n\t\t\t\tProtegendo o amanh\u00e3: A crescente necessidade de especializa\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Explore nosso mundo cibern\u00e9tico vulner\u00e1vel: Mergulhe nos desafios invis\u00edveis da era digital. \u00c0 medida que as amea\u00e7as cibern\u00e9ticas aumentam, cresce a necessidade de 3,4 milh\u00f5es de especialistas em seguran\u00e7a cibern\u00e9tica. Estamos preparados para defender nosso mundo digital? Mergulhe em nosso blog mais recente e enfrente os\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/trending\/guarding-tomorrow-the-escalating-need-for-cybersecurity-expertise\/\" aria-label=\"Leia mais sobre Guarding Tomorrow: A crescente necessidade de especializa\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t29\/08\/2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4381 post type-post status-publish format-standard has-post-thumbnail hentry category-trending tag-cybersecurity tag-cybersecurity-specialist tag-hermetic-wiper tag-isaac-wiper tag-israel tag-malware tag-teamwork tag-tech-jobs tag-tech-training tag-technology tag-the-startup-nation tag-ukraine tag-wiping\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/trending\/hacking-ukraine-russias-cyber-war-and-malware-without-borders\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-300x200.jpg\" class=\"attachment-medium size-medium wp-image-4382\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-300x200.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-1024x683.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-768x512.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920-1536x1025.jpg 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2022\/03\/hacker-1446193_1920.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Tend\u00eancias<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/trending\/hacking-ukraine-russias-cyber-war-and-malware-without-borders\/\" >\n\t\t\t\tHackeando a Ucr\u00e2nia: A guerra cibern\u00e9tica da R\u00fassia e o malware sem fronteiras\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Paralelamente \u00e0 guerra na Ucr\u00e2nia, uma guerra cibern\u00e9tica russa tem como alvo a infraestrutura de TI do pa\u00eds e, potencialmente, o mundo inteiro. <\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/trending\/hacking-ukraine-russias-cyber-war-and-malware-without-borders\/\" aria-label=\"Leia mais sobre Hacking Ukraine: A guerra cibern\u00e9tica da R\u00fassia e o malware sem fronteiras\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t11\/03\/2022\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6743 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-cybersecurity tag-iran tag-israel tag-reskilling tag-tech tag-upskilling\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/israel-cyber-excellence-lessons-from-the-recent-conflict-with-iran\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-300x169.png\" class=\"attachment-medium size-medium wp-image-6745\" alt=\"Guerra entre Israel e Ir\u00e3\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-300x169.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-1024x576.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-768x432.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-1536x864.png 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2-18x10.png 18w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/07\/Iran-Israel-2.png 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprendizagem<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/israel-cyber-excellence-lessons-from-the-recent-conflict-with-iran\/\" >\n\t\t\t\tA excel\u00eancia cibern\u00e9tica de Israel: Li\u00e7\u00f5es do recente conflito com o Ir\u00e3\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Os conflitos geralmente s\u00e3o travados com m\u00edsseis e soldados, mas hoje em dia eles tamb\u00e9m se desenrolam em campos de batalha digitais. Eventos recentes no Oriente M\u00e9dio, especificamente a guerra entre Israel e Ir\u00e3 em junho de 2025, destacaram como a seguran\u00e7a cibern\u00e9tica pode desempenhar um papel decisivo na\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/israel-cyber-excellence-lessons-from-the-recent-conflict-with-iran\/\" aria-label=\"Leia mais sobre A excel\u00eancia cibern\u00e9tica de Israel: Li\u00e7\u00f5es do recente conflito com o Ir\u00e3\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t22\/07\/2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-4704 post type-post status-publish format-standard has-post-thumbnail hentry category-learning category-upskilling tag-attack-vector tag-awareness tag-cyber tag-cybersecurity tag-hackers tag-management tag-manager tag-organisation tag-organization tag-risk tag-tech tag-technology tag-threat\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/upskilling\/cyber-protection-organization-guide\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-300x169.jpg\" class=\"attachment-medium size-medium wp-image-4706\" alt=\"Conscientiza\u00e7\u00e3o cibern\u00e9tica nas organiza\u00e7\u00f5es\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-300x169.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-1024x576.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness-768x432.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2023\/03\/midjourney-cyber-awareness.jpg 1280w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprendizagem<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/upskilling\/cyber-protection-organization-guide\/\" >\n\t\t\t\tA import\u00e2ncia da prote\u00e7\u00e3o cibern\u00e9tica para as organiza\u00e7\u00f5es: Um guia abrangente\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>As organiza\u00e7\u00f5es e as pessoas dependem muito de computadores, telefones celulares e aplicativos. Embora a tecnologia tenha facilitado nossa vida, ela tamb\u00e9m nos tornou vulner\u00e1veis a ataques cibern\u00e9ticos. Hackers e golpistas est\u00e3o sempre \u00e0 procura de vulnerabilidades para explorar dados\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/upskilling\/cyber-protection-organization-guide\/\" aria-label=\"Leia mais sobre A import\u00e2ncia da prote\u00e7\u00e3o cibern\u00e9tica para as organiza\u00e7\u00f5es: Um guia abrangente\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t23\/03\/2023\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-1707 post type-post status-publish format-standard has-post-thumbnail hentry category-tech-jobs tag-cyber tag-cyber-security tag-cybersecurity tag-it tag-learning tag-security tag-tech tag-technology tag-training\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/training-cybersecurity-professionals-to-close-the-tech-skills-gap\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"169\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-300x169.jpg\" class=\"attachment-medium size-medium wp-image-1709\" alt=\"Treinamento em seguran\u00e7a cibern\u00e9tica da Wawiwa\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-300x169.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-1024x576.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-768x432.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766-1536x864.jpg 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/09\/iStock-808157766.jpg 1920w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Empregos na \u00e1rea de tecnologia<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/training-cybersecurity-professionals-to-close-the-tech-skills-gap\/\" >\n\t\t\t\tTreinamento de profissionais de seguran\u00e7a cibern\u00e9tica para eliminar a lacuna de habilidades tecnol\u00f3gicas\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>Milh\u00f5es de empregos de seguran\u00e7a cibern\u00e9tica est\u00e3o vagos. A Wawiwa oferece dois programas distintos de seguran\u00e7a cibern\u00e9tica: um programa de n\u00edvel b\u00e1sico para iniciantes e um programa avan\u00e7ado para aprimoramento de habilidades.<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/training-cybersecurity-professionals-to-close-the-tech-skills-gap\/\" aria-label=\"Leia mais sobre Treinamento de profissionais de seguran\u00e7a cibern\u00e9tica para eliminar a lacuna de habilidades tecnol\u00f3gicas\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t23\/09\/2020\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-2953 post type-post status-publish format-standard has-post-thumbnail hentry category-tech-jobs tag-cybersecurity tag-data-analyst tag-data-scientist tag-devops-specialist tag-digital-products tag-qa-specialists tag-software-developers tag-tech-jobs tag-technology tag-ui-ux-designers\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/when-tech-teams-tick-the-creation-of-digital-products\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"137\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/11\/pexels-mikhail-nilov-7988207-scaled-e1637346266381-300x137.jpg\" class=\"attachment-medium size-medium wp-image-2956\" alt=\"\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/11\/pexels-mikhail-nilov-7988207-scaled-e1637346266381-300x137.jpg 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/11\/pexels-mikhail-nilov-7988207-scaled-e1637346266381-1024x467.jpg 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/11\/pexels-mikhail-nilov-7988207-scaled-e1637346266381-768x350.jpg 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/11\/pexels-mikhail-nilov-7988207-scaled-e1637346266381-1536x700.jpg 1536w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2021\/11\/pexels-mikhail-nilov-7988207-scaled-e1637346266381-2048x934.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Empregos na \u00e1rea de tecnologia<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/when-tech-teams-tick-the-creation-of-digital-products\/\" >\n\t\t\t\tQuando as equipes de tecnologia entram em a\u00e7\u00e3o: A cria\u00e7\u00e3o de produtos digitais\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>O setor de tecnologia \u00e9 o lar de uma ampla gama de cargos. Quando gerentes, designers, desenvolvedores e outros especialistas em tecnologia se re\u00fanem com um objetivo unificado, os produtos digitais que eles lan\u00e7am s\u00e3o realmente incr\u00edveis!<\/p>\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/tech-jobs\/when-tech-teams-tick-the-creation-of-digital-products\/\" aria-label=\"Leia mais sobre When Tech Teams Tick: A cria\u00e7\u00e3o de produtos digitais\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t18\/11\/2021\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<article class=\"elementor-post elementor-grid-item post-6560 post type-post status-publish format-standard has-post-thumbnail hentry category-learning tag-cybersecurity tag-learning tag-reskilling tag-tech-training tag-upskilling-en\" role=\"listitem\">\n\t\t\t<div class=\"elementor-post__card\">\n\t\t\t\t<a class=\"elementor-post__thumbnail__link\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/why-your-team-needs-cybersecurity-training\/\" tabindex=\"-1\" ><div class=\"elementor-post__thumbnail\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"164\" src=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-09-at-9.55.03-AM-300x164.png\" class=\"attachment-medium size-medium wp-image-6565\" alt=\"Por que sua equipe precisa de treinamento em seguran\u00e7a cibern\u00e9tica\" srcset=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-09-at-9.55.03-AM-300x164.png 300w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-09-at-9.55.03-AM-1024x560.png 1024w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-09-at-9.55.03-AM-768x420.png 768w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-09-at-9.55.03-AM-18x10.png 18w, https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2025\/04\/Screenshot-2025-04-09-at-9.55.03-AM.png 1310w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/div><\/a>\n\t\t\t\t<div class=\"elementor-post__badge\">Aprendizagem<\/div>\n\t\t\t\t<div class=\"elementor-post__text\">\n\t\t\t\t<h3 class=\"elementor-post__title\">\n\t\t\t<a href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/why-your-team-needs-cybersecurity-training\/\" >\n\t\t\t\tPor que sua equipe precisa de treinamento em seguran\u00e7a cibern\u00e9tica\t\t\t<\/a>\n\t\t<\/h3>\n\t\t\t\t<div class=\"elementor-post__excerpt\">\n\t\t\t<p>A sua equipe est\u00e1 preparada para defender a sua organiza\u00e7\u00e3o contra amea\u00e7as cibern\u00e9ticas? Com os hackers cada vez mais sofisticados, um \u00fanico clique pode levar a consequ\u00eancias desastrosas. No entanto, muitas viola\u00e7\u00f5es acontecem por causa de simples erros humanos. Garantir que sua equipe esteja equipada com\t\t<\/div>\n\t\t\n\t\t<a class=\"elementor-post__read-more\" href=\"https:\/\/wawiwa-tech.com\/pt\/blog\/learning\/why-your-team-needs-cybersecurity-training\/\" aria-label=\"Leia mais sobre Por que sua equipe precisa de treinamento em seguran\u00e7a cibern\u00e9tica\" tabindex=\"-1\" >\n\t\t\tLeia mais \"\t\t<\/a>\n\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-post__meta-data\">\n\t\t\t\t\t<span class=\"elementor-post-date\">\n\t\t\t09\/04\/2025\t\t<\/span>\n\t\t\t\t<span class=\"elementor-post-avatar\">\n\t\t\tNenhum coment\u00e1rio\t\t<\/span>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/article>\n\t\t\t\t<\/div>\n\t\t\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-53dc31e elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"53dc31e\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;background_motion_fx_motion_fx_scrolling&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_effect&quot;:&quot;yes&quot;,&quot;background_motion_fx_translateY_direction&quot;:&quot;negative&quot;,&quot;background_motion_fx_translateY_speed&quot;:{&quot;unit&quot;:&quot;px&quot;,&quot;size&quot;:10,&quot;sizes&quot;:[]},&quot;shape_divider_top&quot;:&quot;waves&quot;,&quot;shape_divider_top_negative&quot;:&quot;yes&quot;,&quot;shape_divider_bottom&quot;:&quot;waves&quot;,&quot;background_motion_fx_translateY_affectedRange&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:&quot;&quot;,&quot;sizes&quot;:{&quot;start&quot;:0,&quot;end&quot;:100}},&quot;background_motion_fx_devices&quot;:[&quot;desktop&quot;,&quot;tablet&quot;,&quot;mobile&quot;],&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t\t<div class=\"elementor-background-overlay\"><\/div>\n\t\t\t\t\t\t<div class=\"elementor-shape elementor-shape-top\" aria-hidden=\"true\" data-negative=\"true\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M790.5,93.1c-59.3-5.3-116.8-18-192.6-50c-29.6-12.7-76.9-31-100.5-35.9c-23.6-4.9-52.6-7.8-75.5-5.3\tc-10.2,1.1-22.6,1.4-50.1,7.4c-27.2,6.3-58.2,16.6-79.4,24.7c-41.3,15.9-94.9,21.9-134,22.6C72,58.2,0,25.8,0,25.8V100h1000V65.3\tc0,0-51.5,19.4-106.2,25.7C839.5,97,814.1,95.2,790.5,93.1z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t<div class=\"elementor-shape elementor-shape-bottom\" aria-hidden=\"true\" data-negative=\"false\">\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewbox=\"0 0 1000 100\" preserveaspectratio=\"none\">\n\t<path class=\"elementor-shape-fill\" d=\"M421.9,6.5c22.6-2.5,51.5,0.4,75.5,5.3c23.6,4.9,70.9,23.5,100.5,35.7c75.8,32.2,133.7,44.5,192.6,49.7\tc23.6,2.1,48.7,3.5,103.4-2.5c54.7-6,106.2-25.6,106.2-25.6V0H0v30.3c0,0,72,32.6,158.4,30.5c39.2-0.7,92.8-6.7,134-22.4\tc21.2-8.1,52.2-18.2,79.7-24.2C399.3,7.9,411.6,7.5,421.9,6.5z\"\/>\n<\/svg>\t\t<\/div>\n\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-e0a84a8\" data-id=\"e0a84a8\" data-element_type=\"column\" data-e-type=\"column\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b46e040 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b46e040\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-79e3365\" data-id=\"79e3365\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-422aa51 elementor-widget elementor-widget-heading\" data-id=\"422aa51\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h4 class=\"elementor-heading-title elementor-size-default\">Fa\u00e7a uma parceria com a Wawiwa para oferecer programas de treinamento tecnol\u00f3gico em menos de 6 meses!<\/h4>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-9970554 elementor-widget elementor-widget-text-editor\" data-id=\"9970554\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\tA Wawiwa preenche a lacuna de habilidades tecnol\u00f3gicas ao requalificar pessoas para profiss\u00f5es tecnol\u00f3gicas de alta demanda. H\u00e1 milh\u00f5es de vagas em tecnologia e n\u00e3o h\u00e1 profissionais de tecnologia suficientes com o conhecimento e as habilidades relevantes para preench\u00ea-las. O que o setor precisa dos funcion\u00e1rios n\u00e3o \u00e9 ensinado em longos cursos acad\u00eamicos. A Wawiwa ajuda parceiros em todo o mundo a requalificar e aprimorar as habilidades de pessoas para empregos em tecnologia por meio de centros ou programas locais de treinamento em tecnologia. A empresa utiliza uma metodologia de treinamento comprovada, conte\u00fado de ponta, plataformas digitais para aprendizado e avalia\u00e7\u00e3o, al\u00e9m de s\u00f3lidas rela\u00e7\u00f5es com o setor, para oferecer programas de treinamento que resultam em maior empregabilidade e satisfa\u00e7\u00e3o dos formandos. Isso, por sua vez, tamb\u00e9m cria uma marca de treinamento forte e um neg\u00f3cio sustent\u00e1vel para os parceiros da Wawiwa.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-71a3895 elementor-align-center elementor-widget elementor-widget-button\" data-id=\"71a3895\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-lg elementor-animation-grow\" href=\"https:\/\/wawiwa-tech.com\/pt\/contact-us\/\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Entre em contato conosco<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>A atualiza\u00e7\u00e3o em seguran\u00e7a cibern\u00e9tica \u00e9 fundamental, pois capacita os profissionais cibern\u00e9ticos, as equipes de TI, as equipes de DevOps e a ger\u00eancia com o conhecimento e as habilidades para proteger a si mesmos e suas organiza\u00e7\u00f5es contra essas amea\u00e7as. Ao conhecer as \u00faltimas tend\u00eancias e t\u00e9cnicas de seguran\u00e7a cibern\u00e9tica, voc\u00ea pode proteger seus ativos digitais e construir um futuro mais seguro para todos. Os parceiros da Wawiwa em todo o mundo oferecem v\u00e1rios cursos de aprimoramento em seguran\u00e7a cibern\u00e9tica, atendendo a alunos de todos os n\u00edveis.<\/p>","protected":false},"author":13,"featured_media":5507,"parent":5680,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5475","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Upskilling Courses<\/title>\n<meta name=\"description\" content=\"Upskilling in cybersecurity is crucial as it empowers cyber professionals, IT Teams, DevOps teams, and management alike with the knowledge and skills to protect themselves and their organizations against these threats. By knowing the latest cybersecurity trends and techniques, you can safeguard your digital assets and build a more secure future for everyone. Wawiwa partners around the world offer several upskilling courses in cybersecurity, catering to learners at all levels.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Upskilling Courses\" \/>\n<meta property=\"og:description\" content=\"Upskilling in cybersecurity is crucial as it empowers cyber professionals, IT Teams, DevOps teams, and management alike with the knowledge and skills to protect themselves and their organizations against these threats. By knowing the latest cybersecurity trends and techniques, you can safeguard your digital assets and build a more secure future for everyone. Wawiwa partners around the world offer several upskilling courses in cybersecurity, catering to learners at all levels.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Wawiwa Tech\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/wawiwatech\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T08:51:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Courses-1-1024x574.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"574\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@WawiwaTech\" \/>\n<meta name=\"twitter:label1\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data1\" content=\"16 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/\",\"name\":\"Cybersecurity Upskilling Courses\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Cybersecurity-Courses-1.png\",\"datePublished\":\"2024-02-26T10:00:47+00:00\",\"dateModified\":\"2025-10-22T08:51:17+00:00\",\"description\":\"Upskilling in cybersecurity is crucial as it empowers cyber professionals, IT Teams, DevOps teams, and management alike with the knowledge and skills to protect themselves and their organizations against these threats. By knowing the latest cybersecurity trends and techniques, you can safeguard your digital assets and build a more secure future for everyone. Wawiwa partners around the world offer several upskilling courses in cybersecurity, catering to learners at all levels.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Cybersecurity-Courses-1.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/Cybersecurity-Courses-1.png\",\"width\":1456,\"height\":816,\"caption\":\"Cybersecurity Courses\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wawiwa\u2019s Upskilling Courses\",\"item\":\"https:\\\/\\\/wawiwa-tech.com\\\/upskilling\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity Upskilling Courses\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#website\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"name\":\"Wawiwa Tech\",\"description\":\"Reskilling the World to Tech\",\"publisher\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wawiwa-tech.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#organization\",\"name\":\"Wawiwa Tech\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"contentUrl\":\"https:\\\/\\\/wawiwa-tech.com\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Wawiwa-Logo-trans.png\",\"width\":1000,\"height\":425,\"caption\":\"Wawiwa Tech\"},\"image\":{\"@id\":\"https:\\\/\\\/wawiwa-tech.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/wawiwatech\\\/\",\"https:\\\/\\\/x.com\\\/WawiwaTech\",\"https:\\\/\\\/instagram.com\\\/wawiwatech\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wawiwa\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCN_ejCsLDqznGifvkX86gzA\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Upskilling Courses","description":"Upskilling in cybersecurity is crucial as it empowers cyber professionals, IT Teams, DevOps teams, and management alike with the knowledge and skills to protect themselves and their organizations against these threats. By knowing the latest cybersecurity trends and techniques, you can safeguard your digital assets and build a more secure future for everyone. Wawiwa partners around the world offer several upskilling courses in cybersecurity, catering to learners at all levels.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/","og_locale":"pt_BR","og_type":"article","og_title":"Cybersecurity Upskilling Courses","og_description":"Upskilling in cybersecurity is crucial as it empowers cyber professionals, IT Teams, DevOps teams, and management alike with the knowledge and skills to protect themselves and their organizations against these threats. By knowing the latest cybersecurity trends and techniques, you can safeguard your digital assets and build a more secure future for everyone. Wawiwa partners around the world offer several upskilling courses in cybersecurity, catering to learners at all levels.","og_url":"https:\/\/wawiwa-tech.com\/pt\/upskilling\/cybersecurity\/","og_site_name":"Wawiwa Tech","article_publisher":"https:\/\/www.facebook.com\/wawiwatech\/","article_modified_time":"2025-10-22T08:51:17+00:00","og_image":[{"width":1024,"height":574,"url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Courses-1-1024x574.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_site":"@WawiwaTech","twitter_misc":{"Est. tempo de leitura":"16 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/","url":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/","name":"Cybersecurity Upskilling Courses","isPartOf":{"@id":"https:\/\/wawiwa-tech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Courses-1.png","datePublished":"2024-02-26T10:00:47+00:00","dateModified":"2025-10-22T08:51:17+00:00","description":"Upskilling in cybersecurity is crucial as it empowers cyber professionals, IT Teams, DevOps teams, and management alike with the knowledge and skills to protect themselves and their organizations against these threats. By knowing the latest cybersecurity trends and techniques, you can safeguard your digital assets and build a more secure future for everyone. Wawiwa partners around the world offer several upskilling courses in cybersecurity, catering to learners at all levels.","breadcrumb":{"@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/#primaryimage","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Courses-1.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2024\/02\/Cybersecurity-Courses-1.png","width":1456,"height":816,"caption":"Cybersecurity Courses"},{"@type":"BreadcrumbList","@id":"https:\/\/wawiwa-tech.com\/upskilling\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wawiwa-tech.com\/"},{"@type":"ListItem","position":2,"name":"Wawiwa\u2019s Upskilling Courses","item":"https:\/\/wawiwa-tech.com\/upskilling\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity Upskilling Courses"}]},{"@type":"WebSite","@id":"https:\/\/wawiwa-tech.com\/#website","url":"https:\/\/wawiwa-tech.com\/","name":"Wawiwa Tech","description":"Reskilling the World to Tech","publisher":{"@id":"https:\/\/wawiwa-tech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wawiwa-tech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/wawiwa-tech.com\/#organization","name":"Wawiwa Tech","url":"https:\/\/wawiwa-tech.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/","url":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","contentUrl":"https:\/\/wawiwa-tech.com\/wp-content\/uploads\/2020\/05\/Wawiwa-Logo-trans.png","width":1000,"height":425,"caption":"Wawiwa Tech"},"image":{"@id":"https:\/\/wawiwa-tech.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/wawiwatech\/","https:\/\/x.com\/WawiwaTech","https:\/\/instagram.com\/wawiwatech","https:\/\/www.linkedin.com\/company\/wawiwa\/","https:\/\/www.youtube.com\/channel\/UCN_ejCsLDqznGifvkX86gzA"]}]}},"_links":{"self":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5475","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/comments?post=5475"}],"version-history":[{"count":0,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5475\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/pages\/5680"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/media\/5507"}],"wp:attachment":[{"href":"https:\/\/wawiwa-tech.com\/pt\/wp-json\/wp\/v2\/media?parent=5475"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}