
{"id":8438,"date":"2022-08-30T08:22:01","date_gmt":"2022-08-30T08:22:01","guid":{"rendered":"https:\/\/www.isutc.ac.mz\/?p=8438"},"modified":"2023-02-23T13:42:14","modified_gmt":"2023-02-23T13:42:14","slug":"security-operation-center","status":"publish","type":"post","link":"https:\/\/www.isutc.ac.mz\/?p=8438","title":{"rendered":"Security Operation Center"},"content":{"rendered":"\n<p><strong>Descri\u00e7\u00e3o do curso <\/strong><\/p>\n\n\n\n<p>Security Operation\nCenter \u00e9\num curso\ndestinados \u00e0 capacita\u00e7\u00e3o de especialistas e gestores no dom\u00ednio de seguran\u00e7a no\nCentro de Opera\u00e7\u00f5es de dados.<\/p>\n\n\n\n<p>&nbsp;<strong>Objectivo<\/strong><\/p>\n\n\n\n<p>Os alunos aprender\u00e3o processos de melhoria\ncont\u00ednua para coletar intelig\u00eancia de alta fidelidade, dados contextuais e\nfluxos de trabalho de preven\u00e7\u00e3o automatizados que identificam e respondem\nrapidamente a amea\u00e7as. Eles tamb\u00e9m aprender\u00e3o como aproveitar a automa\u00e7\u00e3o para\nreduzir a press\u00e3o sobre os analistas e executar a miss\u00e3o do <em>Security Operation Center (SOC)<\/em>\npara identificar, investigar e mitigar amea\u00e7as. <\/p>\n\n\n\n<p><strong>&nbsp;Objetivos espec\u00edficos<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Identificar\nos principais elementos das opera\u00e7\u00f5es de seguran\u00e7a <em>(SecOps)<\/em> e descrever os processos <\/li>\n\n\n\n<li>Configurar\ne testar o encaminhamento de <em>log<\/em>\npara investiga\u00e7\u00e3o e resposta de an\u00e1lise de tr\u00e1fego.<\/li>\n\n\n\n<li>Descrever a\ninfraestrutura <em>SecOps<\/em>,\nincluindo informa\u00e7\u00f5es de seguran\u00e7a e gest\u00e3o de eventos (<em>SIEM<\/em>), ferramentas de\nan\u00e1lise e engenharia do centro de opera\u00e7\u00f5es de seguran\u00e7a (<em>SOC<\/em>).<\/li>\n\n\n\n<li>Definir\norquestra\u00e7\u00e3o de seguran\u00e7a, automa\u00e7\u00e3o e resposta (<em>SOAR<\/em>) para <em>SecOps<\/em>.<\/li>\n\n\n\n<li>Configurar\no <em>firewall <\/em>de\n\u00faltima gera\u00e7\u00e3o para impedir ataques de reconhecimento.<\/li>\n\n\n\n<li>&nbsp;Reconhecer\nos principais componentes da arquitetura de implanta\u00e7\u00e3o do <em>Cortex XDR<\/em> e explicar como\nprotege <em>endpoints<\/em>\nde <em>malware e exploits.<\/em><\/li>\n\n\n\n<li>Configurar\no <em>firewall <\/em>de\n\u00faltima gera\u00e7\u00e3o com perf\u00eds de vulnerabilidade para proteger os terminais.<\/li>\n\n\n\n<li>Descrever\ncomo o <em>AutoFocus<\/em>\nfornece intelig\u00eancia contextual de amea\u00e7as para as equipes <em>SOC<\/em> para permitir a a\u00e7\u00e3o uma\nvis\u00e3o dos ataques do mundo real.<\/li>\n\n\n\n<li>Identificar\ncomo optimizar a agrega\u00e7\u00e3o, aplica\u00e7\u00e3o e compartilhamento de intelig\u00eancia contra\namea\u00e7as.<\/li>\n\n\n\n<li>Configurar\no <em>Mindmeld<\/em> para\ncolecta e resposta inteligentes contra amea\u00e7as.<\/li>\n\n\n\n<li>Explicar\ncomo o <em>Cortex XSOAR<\/em>\nautomatiza as ac\u00e7\u00f5es de resposta de seguran\u00e7a.<\/li>\n\n\n\n<li>Explicar\ncomo as equipes <em>SOC<\/em>\npodem aproveitar o <em>Cortex Data\nLake<\/em> para colectar, integrar e normalizar dados de seguran\u00e7a\nempresarial com intelig\u00eancia artificial avan\u00e7ada (<em>IA<\/em>) e aprendizado de m\u00e1quina.<\/li>\n\n\n\n<li>Configurar\no <em>firewall <\/em>de\n\u00faltima gera\u00e7\u00e3o para usar listas de bloqueio din\u00e2micas.<\/li>\n<\/ul>\n\n\n\n<p><strong>Sess\u00f5es <\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>I<em> &#8211; Elements and\nProcess of SOC<\/em><\/li>\n\n\n\n<li><em>II- <\/em><em>SOC Infrastructure\n&amp; Automation<\/em><\/li>\n\n\n\n<li><em>III- <\/em><em>Advanced Endpoint\nProtection <\/em><\/li>\n\n\n\n<li><em>IV- <\/em><em>Threat Prevention\n&amp; Intelligence<\/em><\/li>\n\n\n\n<li><em>V <\/em><em>Secure the Future\n(Cortex)<\/em><em><\/em><\/li>\n<\/ul>\n\n\n\n<p><strong>Destinat\u00e1rios<\/strong>: Licenciados em Engenharia Inform\u00e1tica ou \u00e1reas\nsimilares, pretendem uma capacita\u00e7\u00e3o no dom\u00ednio de seguran\u00e7a no Centro de Opera\u00e7\u00f5es\nde Dados.<\/p>\n\n\n\n<p><strong>Dura\u00e7\u00e3o <\/strong><\/p>\n\n\n\n<p>Dura\u00e7\u00e3o: 30 horas totais, 10 sess\u00f5es de 3h\/dia <\/p>\n\n\n\n<p>Data: 19 Setembro de 2022 \u2013 03 de Outubro 2022<\/p>\n\n\n\n<p>Hor\u00e1rios: 17h00 \u2013 20h00<\/p>\n\n\n\n<p>Modalidade: online (aulas em zoom). <\/p>\n\n\n\n<p>Avalia\u00e7\u00e3o: Google Classroom<\/p>\n\n\n\n<p><strong>Investimento <\/strong><\/p>\n\n\n\n<p>7,000.00- Estudantes do ISUTC<\/p>\n\n\n\n<p>10,000.00- Estudantes Externos<\/p>\n\n\n\n<p>15,000.00- Graduados do ISUTC<\/p>\n\n\n\n<p>25,000.00 Outros<\/p>\n\n\n\n<p><strong>Formador<\/strong>:&nbsp; Rafael Mpfumo<strong><\/strong><\/p>\n\n\n\n<p><strong>Link para inscri\u00e7\u00e3o:<\/strong> <a href=\"https:\/\/bit.ly\/Forma\u00e7\u00e3oExtraCurricularECont\u00ednua\">https:\/\/bit.ly\/Forma\u00e7\u00e3oExtraCurricularECont\u00ednua<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Descri\u00e7\u00e3o do curso Security Operation Center \u00e9 um curso destinados \u00e0 capacita\u00e7\u00e3o de especialistas e gestores no dom\u00ednio de seguran\u00e7a no Centro de Opera\u00e7\u00f5es de dados. &nbsp;Objectivo Os alunos aprender\u00e3o processos de melhoria cont\u00ednua para coletar intelig\u00eancia de alta fidelidade, dados contextuais e fluxos de trabalho de preven\u00e7\u00e3o automatizados que identificam e respondem rapidamente a [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51],"tags":[],"class_list":["post-8438","post","type-post","status-publish","format-standard","hentry","category-formacao-continua"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.9 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Operation Center - ISUTC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.isutc.ac.mz\/?p=8438\" \/>\n<meta property=\"og:locale\" content=\"pt_PT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Operation Center - ISUTC\" \/>\n<meta property=\"og:description\" content=\"Descri\u00e7\u00e3o do curso Security Operation Center \u00e9 um curso destinados \u00e0 capacita\u00e7\u00e3o de especialistas e gestores no dom\u00ednio de seguran\u00e7a no Centro de Opera\u00e7\u00f5es de dados. &nbsp;Objectivo Os alunos aprender\u00e3o processos de melhoria cont\u00ednua para coletar intelig\u00eancia de alta fidelidade, dados contextuais e fluxos de trabalho de preven\u00e7\u00e3o automatizados que identificam e respondem rapidamente a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.isutc.ac.mz\/?p=8438\" \/>\n<meta property=\"og:site_name\" content=\"ISUTC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/pt-br.facebook.com\/isutc\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-30T08:22:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-23T13:42:14+00:00\" \/>\n<meta name=\"author\" content=\"Francisca Chacha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Francisca Chacha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo estimado de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8438#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8438\"},\"author\":{\"name\":\"Francisca Chacha\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205\"},\"headline\":\"Security Operation Center\",\"datePublished\":\"2022-08-30T08:22:01+00:00\",\"dateModified\":\"2023-02-23T13:42:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8438\"},\"wordCount\":461,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\"},\"articleSection\":[\"Forma\u00e7\u00e3o Cont\u00ednua\"],\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.isutc.ac.mz\/?p=8438#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8438\",\"url\":\"https:\/\/www.isutc.ac.mz\/?p=8438\",\"name\":\"Security Operation Center - ISUTC\",\"isPartOf\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#website\"},\"datePublished\":\"2022-08-30T08:22:01+00:00\",\"dateModified\":\"2023-02-23T13:42:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8438#breadcrumb\"},\"inLanguage\":\"pt-PT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.isutc.ac.mz\/?p=8438\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.isutc.ac.mz\/?p=8438#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.isutc.ac.mz\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Operation Center\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#website\",\"url\":\"https:\/\/www.isutc.ac.mz\/\",\"name\":\"ISUTC\",\"description\":\"Instituto Superior de Transportes e Comunica\u00e7\u00f5es\",\"publisher\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.isutc.ac.mz\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-PT\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#organization\",\"name\":\"instituto superior de transportes e comunica\u00e7\u00f5es\",\"url\":\"https:\/\/www.isutc.ac.mz\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png\",\"contentUrl\":\"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png\",\"width\":390,\"height\":105,\"caption\":\"instituto superior de transportes e comunica\u00e7\u00f5es\"},\"image\":{\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/pt-br.facebook.com\/isutc\",\"https:\/\/www.instagram.com\/isutc.ac\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205\",\"name\":\"Francisca Chacha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-PT\",\"@id\":\"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g\",\"caption\":\"Francisca Chacha\"},\"url\":\"https:\/\/www.isutc.ac.mz\/?author=17\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Operation Center - ISUTC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.isutc.ac.mz\/?p=8438","og_locale":"pt_PT","og_type":"article","og_title":"Security Operation Center - ISUTC","og_description":"Descri\u00e7\u00e3o do curso Security Operation Center \u00e9 um curso destinados \u00e0 capacita\u00e7\u00e3o de especialistas e gestores no dom\u00ednio de seguran\u00e7a no Centro de Opera\u00e7\u00f5es de dados. &nbsp;Objectivo Os alunos aprender\u00e3o processos de melhoria cont\u00ednua para coletar intelig\u00eancia de alta fidelidade, dados contextuais e fluxos de trabalho de preven\u00e7\u00e3o automatizados que identificam e respondem rapidamente a [&hellip;]","og_url":"https:\/\/www.isutc.ac.mz\/?p=8438","og_site_name":"ISUTC","article_publisher":"https:\/\/pt-br.facebook.com\/isutc","article_published_time":"2022-08-30T08:22:01+00:00","article_modified_time":"2023-02-23T13:42:14+00:00","author":"Francisca Chacha","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Francisca Chacha","Tempo estimado de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.isutc.ac.mz\/?p=8438#article","isPartOf":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8438"},"author":{"name":"Francisca Chacha","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205"},"headline":"Security Operation Center","datePublished":"2022-08-30T08:22:01+00:00","dateModified":"2023-02-23T13:42:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8438"},"wordCount":461,"commentCount":0,"publisher":{"@id":"https:\/\/www.isutc.ac.mz\/#organization"},"articleSection":["Forma\u00e7\u00e3o Cont\u00ednua"],"inLanguage":"pt-PT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.isutc.ac.mz\/?p=8438#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.isutc.ac.mz\/?p=8438","url":"https:\/\/www.isutc.ac.mz\/?p=8438","name":"Security Operation Center - ISUTC","isPartOf":{"@id":"https:\/\/www.isutc.ac.mz\/#website"},"datePublished":"2022-08-30T08:22:01+00:00","dateModified":"2023-02-23T13:42:14+00:00","breadcrumb":{"@id":"https:\/\/www.isutc.ac.mz\/?p=8438#breadcrumb"},"inLanguage":"pt-PT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.isutc.ac.mz\/?p=8438"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.isutc.ac.mz\/?p=8438#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.isutc.ac.mz\/"},{"@type":"ListItem","position":2,"name":"Security Operation Center"}]},{"@type":"WebSite","@id":"https:\/\/www.isutc.ac.mz\/#website","url":"https:\/\/www.isutc.ac.mz\/","name":"ISUTC","description":"Instituto Superior de Transportes e Comunica\u00e7\u00f5es","publisher":{"@id":"https:\/\/www.isutc.ac.mz\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.isutc.ac.mz\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-PT"},{"@type":"Organization","@id":"https:\/\/www.isutc.ac.mz\/#organization","name":"instituto superior de transportes e comunica\u00e7\u00f5es","url":"https:\/\/www.isutc.ac.mz\/","logo":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/","url":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png","contentUrl":"https:\/\/www.isutc.ac.mz\/wp-content\/uploads\/2020\/08\/LOGO-20.png","width":390,"height":105,"caption":"instituto superior de transportes e comunica\u00e7\u00f5es"},"image":{"@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/pt-br.facebook.com\/isutc","https:\/\/www.instagram.com\/isutc.ac\/"]},{"@type":"Person","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/91dac55d0c4a61cc39a90540a2aa9205","name":"Francisca Chacha","image":{"@type":"ImageObject","inLanguage":"pt-PT","@id":"https:\/\/www.isutc.ac.mz\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1b22b2d08b8ef61c857aeaa08fac1cf21357b6ec7d91d342e408c93afe44a831?s=96&d=mm&r=g","caption":"Francisca Chacha"},"url":"https:\/\/www.isutc.ac.mz\/?author=17"}]}},"_links":{"self":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/8438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8438"}],"version-history":[{"count":2,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/8438\/revisions"}],"predecessor-version":[{"id":9669,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=\/wp\/v2\/posts\/8438\/revisions\/9669"}],"wp:attachment":[{"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.isutc.ac.mz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}