[π§π· PortuguΓͺs] [π¬π§ English]
Main repository for the PUC-SP 5th Semester Academic Hub (2026) β focused on Cybersecurity & Social Engineering, featuring hands-on labs, ethical hacking simulations, AI security practices, threat analysis, and applied defense strategies aligned with real-world security scenarios.
Institution: Pontifical Catholic University of SΓ£o Paulo (PUC-SP Humanistic AI & Data Science β’ 5ΒΊ Semestre β’ 2026
School: FACEI - Faculty of Interdisciplinary Studies
Course Repo: INTEGRATED PROJECT: Cybersecurity and Social Engineering - 72 Hours
Professor: β¨ Eduardo Savino Gomes
Extensionist Activities: Social projects with open-source software for community support.
Note
-
Projects and deliverables may be made publicly available whenever possible.
-
The course emphasizes practical, hands-on experience with real datasets to simulate professional consulting scenarios in the fields of Machine Learning and Neural Networks for partner organizations and institutions affiliated with the university.
-
All activities comply with the academic and ethical guidelines of PUC-SP.
-
Any content not authorized for public disclosure will remain confidential and securely stored in private repositories.
- Course Overview
- Core Areas
- Objective
- Core Learning Pillars
- Weekly Classes Schedule
- Folder Structure
- Related Project Repositories
- Professor Information
- Quick Start Guide
- Grading & Assessment
- Learning Resources
- Tooling Stack
- Contributing Guidelines
- License
- Repository Stats
This repository serves as the central academic and practical hub for a course in Cybersecurity, Social Engineering, AI System Protection, and Ethical Hacking.
It is designed to integrate theoretical foundations, applied methodologies, and real-world perspectives, preparing learners for modern security challenges.
- Cybersecurity Foundations β principles, threats, and defense strategies
- Social Engineering β human factors, persuasion, and attack vectors
- AI System Protection β securing intelligent systems and mitigating adversarial risks
- Ethical Hacking β penetration testing concepts and responsible exploitation
The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:
- Identify and analyze security weaknesses
- Understand attack methodologies
- Anticipate complex threat scenarios
- Design and implement effective defensive solutions
with a strong focus on AI-driven environments and emerging risks.
br>
| Pillar | What You Will Master | Practical Application |
|---|---|---|
| Technical Cybersecurity | Firewalls, encryption, IDS/IPS, malware analysis | Securing AI infrastructures |
| Social Engineering | Phishing, pretexting, baiting, tailgating | Human vulnerability prevention |
| AI Security | Adversarial AI, model poisoning, secure ML pipelines | Protecting ML models |
| Hands-on Labs | Ethical hacking, penetration testing, CTF exercises | Real-world simulation |
πΈΰΉ My Contacts Hub
ββββββββββββββ βΉπΰΉ ββββββββββββββ
β£β’β€ Back to Top
Copyright 2026 Quantum Software Development. Code released under the MIT license.
The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:
- Identify and analyze security weaknesses
- Understand attack methodologies
- Anticipate complex threat scenarios
- Design and implement effective defensive solutions
with a strong focus on AI-driven environments and emerging risks.
πΈΰΉ My Contacts Hub
ββββββββββββββ βΉπΰΉ ββββββββββββββ
β£β’β€ Back to Top
Copyright 2026 Quantum Software Development. Code released under the MIT license.