{"id":670,"date":"2019-10-10T07:42:23","date_gmt":"2019-10-10T07:42:23","guid":{"rendered":"https:\/\/cloud.iseclisboa.pt\/?p=670"},"modified":"2019-10-10T07:42:23","modified_gmt":"2019-10-10T07:42:23","slug":"direcao-de-ciberseguranca-intelligence-e-operacoes-no-ciberespaco","status":"publish","type":"post","link":"https:\/\/cloud.iseclisboa.pt\/?p=670","title":{"rendered":"P\u00d3S-GRADUA\u00c7\u00c3O \/\/ DIRE\u00c7\u00c3O DE CIBERSEGURAN\u00c7A, INTELLIGENCE E OPERA\u00c7\u00d5ES NO CIBERESPA\u00c7O"},"content":{"rendered":"<p><b>[60 ECTS &#8211; 240 Horas]\u00a0<\/b><\/p>\n<h4>COORDENA\u00c7\u00c3O<\/h4>\n<h4><img loading=\"lazy\" decoding=\"async\" src=\"images\/pedro_machado.png\" width=\"116\" height=\"116\" \/><\/h4>\n<p><b>Mestre Pedro Machado<\/b><\/p>\n<p>\u00a0<\/p>\n<p>{loadmodule mod_wsaccordion, bio_dcioc_pm}<\/p>\n<h5>\u00a0<\/h5>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"images\/joaoanes.png\" width=\"116\" height=\"116\" \/><\/p>\n<p><b>Dr. Jo\u00e3o Annes<\/b><\/p>\n<p>{loadmodule mod_wsaccordion, bio_dcioc_ja}<\/p>\n<p>\u00a0<\/p>\n<hr \/>\n<h4>Pr\u00e9-Inscri\u00e7\u00f5es e Candidaturas<\/h4>\n<p>&gt;&gt; Candidaturas ano letivo 2022_23<\/p>\n<p>Para <span style=\"text-decoration: underline;\">mais informa\u00e7\u00f5es<\/span> e <span style=\"text-decoration: underline;\">inscri\u00e7\u00f5es<\/span> enviar email para\u00a0<a href=\"mailto:info@cesip.pt\" target=\"_blank\" rel=\"noopener\">info@cesip.pt<\/a>.<\/p>\n<hr \/>\n<h4 class=\"font_8\">ENQUADRAMENTO<\/h4>\n<p class=\"font_8\"><span class=\"color_11\">\u00c9 cada vez mais dif\u00edcil e complexo \u00e0s organiza\u00e7\u00f5es delimitarem o ambiente digital em que operam e fazerem um controlo eficiente dos riscos associados. Num mundo cada vez mais digital e conectado por tecnologia IoT, as organiza\u00e7\u00f5es est\u00e3o mais sujeitas a ataques com recurso a diversos n\u00edveis de sofistica\u00e7\u00e3o que exigem respostas que mantenham a protec\u00e7\u00e3o aos ataques mais comuns e, simultaneamente, garanta a capacidade para lidar com ataques avan\u00e7ados.<\/span><\/p>\n<p class=\"font_8\"><span class=\"color_11\">As organiza\u00e7\u00f5es dever\u00e3o estar conscientes de que sofrerem um ataque bem sucedido \u00e9 apenas uma quest\u00e3o de tempo. N\u00e3o nos devemos perguntar se pode acontecer, devemos \u00e9 estar preparados para quando acontecer. O sucesso das organiza\u00e7\u00f5es ser\u00e1 definido pela capacidade de resposta aos ataques e minimiza\u00e7\u00e3o dos riscos e das amea\u00e7as.<\/span><\/p>\n<h4 class=\"font_8\">DESTINAT\u00c1RIOS<\/h4>\n<p class=\"font_8\">Quadros t\u00e9cnicos e especializados do sector p\u00fablico empresarial ou privado, quadros interm\u00e9dios e superiores das estruturas do Estado e da Sociedade Civil, nomeadamente Oficiais das For\u00e7as Armadas e de For\u00e7as e Servi\u00e7os de Seguran\u00e7a, Diplomatas, Gestores, Juristas, Magistrados, respons\u00e1veis por infraestruturas cr\u00edticas, e demais interessados.<\/p>\n<hr \/>\n<h4 class=\"font_4\">ELENCO MODULAR<\/h4>\n<h4>I SEMESTRE<\/h4>\n<div id=\"comp-jzj2fp4e\" class=\"txtNew\" data-packed=\"true\">\n<p class=\"font_8\"><span class=\"color_11\">\u00a0<\/span><\/p>\n<p class=\"font_8\"><strong>\u200b<\/strong><\/p>\n<div id=\"comp-jzj2fp4e2\" class=\"txtNew\" data-packed=\"true\">\n<table class=\"table table-sm\" width=\"684\" align=\"center\">\n<thead>\n<tr>\n<th style=\"border-bottom-style: solid;\" scope=\"col\" bgcolor=\"#B3E1F0\" width=\"620\"><strong>Elenco Modular<\/strong><\/th>\n<th style=\"border-bottom-style: solid;\" scope=\"col\" bgcolor=\"#B3E1F0\">Semestre<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><b><span class=\"color_17\">I. M\u00d3DULO PROPED\u00caUTICO<\/span><\/b><\/p>\n<\/td>\n<td align=\"center\">\n<p align=\"center\">1\u00ba<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><strong>\u00a0 M01<\/strong>. Princ\u00edpios fundamentais de tecnologias de informa\u00e7\u00e3o e seguran\u00e7a<\/p>\n<\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 &#8211; Introdu\u00e7\u00e3o \u00e0 seguran\u00e7a de informa\u00e7\u00e3o e ciberseguran\u00e7a<br \/>\u00a0\u00a0\u00a0 &#8211; Protocolos, Ativos e respetivos n\u00edveis de prote\u00e7\u00e3o<br \/><\/span><\/span><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 <\/span><\/span> <span style=\"color: #000000;\"><span class=\"color_11\">&#8211; Medidas t\u00e9cnicas e organizativas e de mitiga\u00e7\u00e3o<\/span><\/span><\/p>\n<\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><span class=\"color_11\"><strong>\u00a0 M02<\/strong>. Direito Nacional e Europeu e a Ciberseguran\u00e7a<br \/><\/span><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 <\/span><\/span> <span class=\"color_11\">&#8211; No\u00e7\u00f5es gerais de Direito<br \/><\/span><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 <\/span><\/span> <span class=\"color_11\">&#8211; Legisla\u00e7\u00e3o nacional (Lei 109\/09, Lei 67\/98, Lei 46\/18, 58\/19, etc)<br \/><\/span><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 <\/span><\/span> <span class=\"color_11\">&#8211;\u00a0 Legisla\u00e7\u00e3o europeia (EU2016\/679, EU2016\/1148, etc)<\/span><\/p>\n<\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><span class=\"color_11\"><strong>\u00a0 M03<\/strong>. \u00c9tica e Valores<br \/><\/span><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 <\/span><\/span> <span class=\"color_11\">&#8211; \u00c9tica em contexto organizacional<br \/><\/span><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 <\/span><\/span> <span class=\"color_11\">&#8211; Lideran\u00e7a, Valores e Intelig\u00eancia emocional<br \/><\/span><span style=\"color: #000000;\"><span class=\"color_11\">\u00a0\u00a0\u00a0 <\/span><\/span> <span class=\"color_11\">&#8211; Cibercrime<\/span><\/p>\n<\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><span class=\"color_11\"><strong>\u00a0 M04<\/strong>. Estrat\u00e9gia e\u00a0Informa\u00e7\u00f5es no Ciberespa\u00e7o<br \/>\u00a0\u00a0\u00a0 &#8211; Estrat\u00e9gia<br \/>\u00a0\u00a0\u00a0 &#8211; Manipula\u00e7\u00e3o de informa\u00e7\u00e3o no ciberespa\u00e7o<br \/>\u00a0\u00a0\u00a0 &#8211; Boas pr\u00e1ticas de partilha de informa\u00e7\u00e3o<\/span><\/p>\n<\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><span class=\"color_11\"><strong>\u00a0 M05<\/strong>. Seguran\u00e7a da Informa\u00e7\u00e3o e a familia das ISO\/IEC2700x<br \/>\u00a0\u00a0\u00a0 &#8211; Sistema de Gest\u00e3o da Seguran\u00e7a da Informa\u00e7\u00e3o ISO\/IEC27001<br \/>\u00a0\u00a0\u00a0 &#8211; Aplica\u00e7\u00e3o dos controlos nos termos da ISO\/IEC27002<br \/>\u00a0\u00a0\u00a0 &#8211; Compreender a Gest\u00e3o de Risco nos termos da ISO\/IEC27005<br \/>\u00a0\u00a0\u00a0 &#8211; Entender e conhecer a estrutura da fam\u00edlia ISO\/IEC2700x<\/span><\/p>\n<\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\"><span class=\"color_11\"><strong>\u00a0 M06<\/strong>.\u00a0Criptologia\/Criptografia<br \/>\u00a0\u00a0\u00a0 &#8211; Conceitos e resumos criptogr\u00e1ficos<br \/>\u00a0\u00a0\u00a0 &#8211; Algoritmos e modelos de cifra em Criptografia Sim\u00e9trica<br \/>\u00a0\u00a0\u00a0 &#8211; Algoritmos e modelos de cifra em Criptografia Assim\u00e9trica<br \/>\u00a0\u00a0\u00a0 &#8211; Ataques e futuro da criptografia<\/span><\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\"><strong>II. M\u00d3DULO DE GEST\u00c3O EM CIBERSEGURAN\u00c7A<\/strong><\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><span class=\"color_11\"><strong>\u00a0 M07<\/strong>. Modelos referenciais e planos de maturidade<br \/><strong>\u00a0 M08<\/strong>. Governance, Risk and Compliance (GRC)<\/span><br \/><span class=\"color_11\"><strong>\u00a0 M09<\/strong>. Frameworks e Auditorias de Ciberseguran\u00e7a<br \/><strong>\u00a0 M10<\/strong>. Alta Lideran\u00e7a, Reputa\u00e7\u00e3o e Comunica\u00e7\u00e3o de Crise<\/span><\/p>\n<\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\"><strong>III. M\u00d3DULO DE OPERA\u00c7\u00d5ES OFENSIVAS E DEFENSIVAS<\/strong><\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\u00a0 <span class=\"color_11\"><strong>M11<\/strong>. Cyber Intelligence<br \/><strong>\u00a0 M12<\/strong>. Opera\u00e7\u00f5es Ofensivas de Ciberseguran\u00e7a<br \/>\u00a0 &#8211; Ferramentas e pr\u00e1tica de OSINT<br \/>\u00a0 &#8211; Engenharia de Testes de Penetra\u00e7\u00e3o e Hacking \u00c9tico<br \/>\u00a0 &#8211; Ataques de Engenharia Inversa<br \/><strong>\u00a0 M13<\/strong>. Opera\u00e7\u00f5es Defensivas de Ciberseguran\u00e7a<br \/>\u00a0 &#8211; Logging, Eventos e Correla\u00e7\u00e3o (SIEM, IDS\/IPS, FW)<br \/>\u00a0 &#8211; Dete\u00e7\u00e3o e An\u00e1lise forense<br \/>\u00a0 &#8211; Mitiga\u00e7\u00e3o e contrataque<br \/><strong>\u00a0 M14.<\/strong> Inform\u00e1tica Forense Digital<\/span><\/td>\n<td align=\"center\">1\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\u00a0<\/td>\n<td align=\"center\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><strong>II SEMESTRE<\/strong><\/p>\n<\/td>\n<td align=\"center\">2\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\">\n<p class=\"font_8\"><strong>\u00a0 IV. M\u00d3DULO DE SEMIN\u00c1RIOS T\u00c9CNICOS E COMPORTAMENTAIS<\/strong><\/p>\n<\/td>\n<td align=\"center\">2\u00ba<\/td>\n<\/tr>\n<tr>\n<td width=\"620\"><strong>\u00a0 <\/strong><span class=\"color_11\"><strong> M15<\/strong>. Semin\u00e1rio Global de Ciberseguran\u00e7a<br \/><strong>\u00a0\u00a0\u00a0 _S01.<\/strong> Factor Humano &#8211; Forma\u00e7\u00e3o e preven\u00e7\u00e3o<br \/><strong>\u00a0\u00a0\u00a0 _S02.<\/strong> Panorama Europeu da Ciberseguran\u00e7a<br \/><strong>\u00a0\u00a0\u00a0 <\/strong> _<strong>S03.<\/strong> A Ind\u00fastria da Ciberseguran\u00e7a e Protec\u00e7\u00e3o de Dados<br \/><strong>\u00a0\u00a0\u00a0 _S04<\/strong>. Cibercrime: Investiga\u00e7\u00e3o e Coopera\u00e7\u00e3o Judici\u00e1ria<br \/><strong>\u00a0\u00a0\u00a0 _S05.<\/strong> Ciberseguran\u00e7a no contexto da estrat\u00e9gia empresarial<br \/><strong>\u00a0\u00a0\u00a0 <\/strong> _<strong>S06.<\/strong> Governance no Ciberespa\u00e7o<br \/><strong>\u00a0\u00a0\u00a0 <\/strong> _<strong>S07.<\/strong> \u00d3rg\u00e3os Executivos e tomada de decis\u00e3o <\/span><\/td>\n<td align=\"center\">2\u00ba<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<hr \/>\n<h4 class=\"font_8\">CERTIFICA\u00c7\u00c3O<\/h4>\n<ul>\n<li>Prepara\u00e7\u00e3o para exame de Certifica\u00e7\u00e3o Internacional EXIN<\/li>\n<li>CERTIFICADO PG_60 ECTS<\/li>\n<li>CERTIFICADO INTERNACIONAL EXIN<\/li>\n<li><span class=\"color_11\">[Information Security Management\u00a0 Foundations\u00a0<\/span><span class=\"color_11\">based on ISO\/IEC 27001]<\/span><\/li>\n<\/ul>\n<h4 class=\"font_8\">PROPINA<\/h4>\n<p class=\"font_8\">4.200\u20ac<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[60 ECTS &#8211; 240 Horas]\u00a0 COORDENA\u00c7\u00c3O Mestre Pedro Machado \u00a0 {loadmodule mod_wsaccordion, bio_dcioc_pm} \u00a0 Dr. Jo\u00e3o Annes {loadmodule mod_wsaccordion, bio_dcioc_ja} \u00a0 Pr\u00e9-Inscri\u00e7\u00f5es e Candidaturas &gt;&gt; Candidaturas ano letivo 2022_23 Para mais informa\u00e7\u00f5es e inscri\u00e7\u00f5es enviar email para\u00a0info@cesip.pt. ENQUADRAMENTO \u00c9 cada vez mais dif\u00edcil e complexo \u00e0s organiza\u00e7\u00f5es delimitarem o ambiente digital em que operam e [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[31],"tags":[],"class_list":["post-670","post","type-post","status-publish","format-standard","hentry","category-iseclisboa"],"_links":{"self":[{"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=\/wp\/v2\/posts\/670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=670"}],"version-history":[{"count":0,"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=\/wp\/v2\/posts\/670\/revisions"}],"wp:attachment":[{"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cloud.iseclisboa.pt\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}