
{"id":8082,"date":"2022-05-11T07:31:31","date_gmt":"2022-05-11T07:31:31","guid":{"rendered":"https:\/\/www.isutc.ac.mz\/?p=8082"},"modified":"2022-06-29T13:35:42","modified_gmt":"2022-06-29T13:35:42","slug":"cybersecurity-fundamentals-of-network-security","status":"publish","type":"post","link":"https:\/\/www.isutc.ac.mz\/?p=8082","title":{"rendered":"Cybersecurity Fundamentals of Network Security"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\"><strong>Descri\u00e7\u00e3o do Curso<\/strong><\/h4>\n\n\n\n<p>A forma\u00e7\u00e3o em Cybersecurity Fundamentals of Network Security d\u00e1 a conhecer os dispositivos e protocolos envolvidos nos v\u00e1rios tipos de redes corporativas para depois implementar t\u00e9cnicas de configura\u00e7\u00e3o utilizando o Wireshark.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Destinat\u00e1rios<\/strong><\/h4>\n\n\n\n<p>Todos interessados em aprofundar conhecimentos e desenvolver compet\u00eancias na \u00e1rea de Seguran\u00e7a de Redes e Sistemas, para consolidar uma carreira especializada em Seguran\u00e7a de Informa\u00e7\u00e3o.<\/p>\n\n\n\n<p><strong>Formador: <\/strong><strong>Eng. Rafael Mpfumo<\/strong><\/p>\n\n\n\n<p><strong>Data: <\/strong> 18 a 29 de Julho 2022<\/p>\n\n\n\n<p><strong>Dura\u00e7\u00e3o: <\/strong>40 horas, 4h\/dia, 10 Sess\u00f5es<\/p>\n\n\n\n<p><strong>Hor\u00e1rio: <\/strong>17h \u00e0s 21h<\/p>\n\n\n\n<p><strong>Modalidade H\u00edbrida: <\/strong>Aulas via ZOOM e presenciais\nno ISUTC; Avalia\u00e7\u00e3o: GoogleClassroom<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Investimento<\/strong><\/h4>\n\n\n\n<p>Estudantes do ISUTC: 6 000,00 Mt<\/p>\n\n\n\n<p>Estudantes Externos: 9 500,00 Mt<\/p>\n\n\n\n<p>Graduados do ISUTC: 12 000,00 Mt<\/p>\n\n\n\n<p>Outros: 18 000,00 Mt<\/p>\n\n\n\n<p><strong>Link para inscri\u00e7\u00e3o:<\/strong>\n<a href=\"https:\/\/bit.ly\/Forma\u00e7\u00e3oExtraCurricularECont\u00ednua\">https:\/\/bit.ly\/Forma\u00e7\u00e3oExtraCurricularECont\u00ednua<\/a><\/p>\n\n\n\n<p>Programas ISUTC em parceria com a\n<strong>Academia Palo Alto<\/strong><\/p>\n\n\n\n<p style=\"color:#f5f7f8\" class=\"has-text-color has-background has-large-font-size has-vivid-cyan-blue-background-color\"><strong>Contacto<\/strong><\/p>\n\n\n\n<p>Prolongamento Av. Kim Il Sung, Edf. D1, C.P. 2088 &#8211; Maputo &#8211; Mo\u00e7ambique <\/p>\n\n\n\n<p>EMAIL : <a href=\"mailto:executive-education@isutc.ac.mz\">executive-education@isutc.ac.mz<\/a><\/p>\n\n\n\n<p>Celular: 849675894 <\/p>\n\n\n\n<p><strong><br><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Descri\u00e7\u00e3o do Curso A forma\u00e7\u00e3o em Cybersecurity Fundamentals of Network Security d\u00e1 a conhecer os dispositivos e protocolos envolvidos nos v\u00e1rios tipos de redes corporativas para depois implementar t\u00e9cnicas de configura\u00e7\u00e3o utilizando o Wireshark. Destinat\u00e1rios Todos interessados em aprofundar conhecimentos e desenvolver compet\u00eancias na \u00e1rea de Seguran\u00e7a de Redes e Sistemas, para consolidar uma carreira [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":8084,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-8082","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Fundamentals of Network Security - ISUTC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isutc.ac.mz\/?p=8082\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Fundamentals of Network Security - ISUTC\" \/>\n<meta property=\"og:description\" content=\"Descri\u00e7\u00e3o do Curso A forma\u00e7\u00e3o em Cybersecurity Fundamentals of Network Security d\u00e1 a conhecer os dispositivos e protocolos envolvidos nos v\u00e1rios tipos de redes corporativas para depois implementar t\u00e9cnicas de configura\u00e7\u00e3o utilizando o Wireshark. Destinat\u00e1rios Todos interessados em aprofundar conhecimentos e desenvolver compet\u00eancias na \u00e1rea de Seguran\u00e7a de Redes e Sistemas, para consolidar uma carreira [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isutc.ac.mz\/?p=8082\" \/>\n<meta property=\"og:site_name\" content=\"ISUTC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/pt-br.facebook.com\/isutc\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-11T07:31:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-29T13:35:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1030\" \/>\n\t<meta property=\"og:image:height\" content=\"606\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Francisca Chacha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francisca Chacha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082\"},\"author\":{\"name\":\"Francisca Chacha\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205\"},\"headline\":\"Cybersecurity Fundamentals of Network Security\",\"datePublished\":\"2022-05-11T07:31:31+00:00\",\"dateModified\":\"2022-06-29T13:35:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082\"},\"wordCount\":162,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.isutc.ac.mz\/?p=8082#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082\",\"url\":\"https:\/\/www.isutc.ac.mz\/?p=8082\",\"name\":\"Cybersecurity Fundamentals of Network Security - ISUTC\",\"isPartOf\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png\",\"datePublished\":\"2022-05-11T07:31:31+00:00\",\"dateModified\":\"2022-06-29T13:35:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isutc.ac.mz\/?p=8082\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage\",\"url\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png\",\"contentUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png\",\"width\":1030,\"height\":606},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8082#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isutc.ac.mz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Fundamentals of Network Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#website\",\"url\":\"https:\/\/www.isutc.ac.mz\/\",\"name\":\"ISUTC\",\"description\":\"Instituto Superior de Transportes e Comunica\u00e7\u00f5es\",\"publisher\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isutc.ac.mz\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\",\"name\":\"instituto superior de transportes e comunica\u00e7\u00f5es\",\"url\":\"https:\/\/www.isutc.ac.mz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png\",\"contentUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png\",\"width\":390,\"height\":105,\"caption\":\"instituto superior de transportes e comunica\u00e7\u00f5es\"},\"image\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pt-br.facebook.com\/isutc\",\"https:\/\/www.instagram.com\/isutc.ac\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205\",\"name\":\"Francisca Chacha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g\",\"caption\":\"Francisca Chacha\"},\"url\":\"https:\/\/www.isutc.ac.mz\/?author=17\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Fundamentals of Network Security - ISUTC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isutc.ac.mz\/?p=8082","og_locale":"pt_PT","og_type":"article","og_title":"Cybersecurity Fundamentals of Network Security - ISUTC","og_description":"Descri\u00e7\u00e3o do Curso A forma\u00e7\u00e3o em Cybersecurity Fundamentals of Network Security d\u00e1 a conhecer os dispositivos e protocolos envolvidos nos v\u00e1rios tipos de redes corporativas para depois implementar t\u00e9cnicas de configura\u00e7\u00e3o utilizando o Wireshark. Destinat\u00e1rios Todos interessados em aprofundar conhecimentos e desenvolver compet\u00eancias na \u00e1rea de Seguran\u00e7a de Redes e Sistemas, para consolidar uma carreira [&hellip;]","og_url":"https:\/\/www.isutc.ac.mz\/?p=8082","og_site_name":"ISUTC","article_publisher":"https:\/\/pt-br.facebook.com\/isutc","article_published_time":"2022-05-11T07:31:31+00:00","article_modified_time":"2022-06-29T13:35:42+00:00","og_image":[{"width":1030,"height":606,"url":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png","type":"image\/png"}],"author":"Francisca Chacha","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Francisca Chacha","Tempo estimado de leitura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.isutc.ac.mz\/?p=8082#article","isPartOf":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8082"},"author":{"name":"Francisca Chacha","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205"},"headline":"Cybersecurity Fundamentals of Network Security","datePublished":"2022-05-11T07:31:31+00:00","dateModified":"2022-06-29T13:35:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8082"},"wordCount":162,"commentCount":0,"publisher":{"@id":"https:\/\/www.isutc.ac.mz\/#organization"},"image":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage"},"thumbnailUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png","articleSection":["Uncategorized"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.isutc.ac.mz\/?p=8082#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.isutc.ac.mz\/?p=8082","url":"https:\/\/www.isutc.ac.mz\/?p=8082","name":"Cybersecurity Fundamentals of Network Security - ISUTC","isPartOf":{"@id":"https:\/\/www.isutc.ac.mz\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage"},"image":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage"},"thumbnailUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png","datePublished":"2022-05-11T07:31:31+00:00","dateModified":"2022-06-29T13:35:42+00:00","breadcrumb":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8082#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isutc.ac.mz\/?p=8082"]}]},{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/?p=8082#primaryimage","url":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png","contentUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2022\/05\/cybersecurity.png","width":1030,"height":606},{"@type":"BreadcrumbList","@id":"https:\/\/www.isutc.ac.mz\/?p=8082#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isutc.ac.mz\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Fundamentals of Network Security"}]},{"@type":"WebSite","@id":"https:\/\/www.isutc.ac.mz\/#website","url":"https:\/\/www.isutc.ac.mz\/","name":"ISUTC","description":"Instituto Superior de Transportes e Comunica\u00e7\u00f5es","publisher":{"@id":"https:\/\/www.isutc.ac.mz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isutc.ac.mz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.isutc.ac.mz\/#organization","name":"instituto superior de transportes e comunica\u00e7\u00f5es","url":"https:\/\/www.isutc.ac.mz\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/","url":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png","contentUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png","width":390,"height":105,"caption":"instituto superior de transportes e comunica\u00e7\u00f5es"},"image":{"@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pt-br.facebook.com\/isutc","https:\/\/www.instagram.com\/isutc.ac\/"]},{"@type":"Person","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205","name":"Francisca Chacha","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g","caption":"Francisca Chacha"},"url":"https:\/\/www.isutc.ac.mz\/?author=17"}]}},"_links":{"self":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/8082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8082"}],"version-history":[{"count":3,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/8082\/revisions"}],"predecessor-version":[{"id":8268,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/8082\/revisions\/8268"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/media\/8084"}],"wp:attachment":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}