[π§π· PortuguΓͺs] [π¬π§ English]
Main repository for the PUC-SP 5th Semester Academic Hub (2026) β focused on Cybersecurity & Social Engineering, featuring hands-on labs, ethical hacking simulations, AI security practices, threat analysis, and applied defense strategies aligned with real-world security scenarios.
Institution: Pontifical Catholic University of SΓ£o Paulo (PUC-SP Humanistic AI & Data Science β’ 5ΒΊ Semestre β’ 2026
School: FACEI - Faculty of Interdisciplinary Studies
Course Repo: INTEGRATED PROJECT: Cybersecurity and Social Engineering - 72 Hours
Professor: β¨ Eduardo Savino Gomes
Extensionist Activities: Social projects with open-source software for community support.
Note
-
Projects and deliverables may be made publicly available whenever possible.
-
The course emphasizes practical, hands-on experience with real datasets to simulate professional consulting scenarios in the fields of Machine Learning and Neural Networks for partner organizations and institutions affiliated with the university.
-
All activities comply with the academic and ethical guidelines of PUC-SP.
-
Any content not authorized for public disclosure will remain confidential and securely stored in private repositories.
- Course Overview
- Core Areas
- Objective
- Core Learning Pillars
- Weekly Classes Schedule
- Folder Structure
- Related Project Repositories
- Professor Information
- Quick Start Guide
- Grading & Assessment
- Learning Resources
- Tooling Stack
- Contributing Guidelines
- License
- Repository Stats
This repository serves as the central academic and practical hub for a course in Cybersecurity, Social Engineering, AI System Protection, and Ethical Hacking.
It is designed to integrate theoretical foundations, applied methodologies, and real-world perspectives, preparing learners for modern security challenges.
- Cybersecurity Foundations β principles, threats, and defense strategies
- Social Engineering β human factors, persuasion, and attack vectors
- AI System Protection β securing intelligent systems and mitigating adversarial risks
- Ethical Hacking β penetration testing concepts and responsible exploitation
The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:
- Master core cybersecurity principles and architectures.
- Identify + mitigate social engineering threats (phishing, pretexting).
- Protect AI/ML systems against adversarial attacks + model poisoning.
- Apply encryption + authentication mechanisms correctly.
- Conduct ethical security testing (penetration testing, CTF).
- Design defensive strategies aligned with AI ethics standards.
With a strong focus on AI-driven environments and emerging risks.
| Pillar | Technical Focus | Applied Outcome | Kid Analogy |
|---|---|---|---|
| Cybersecurity Foundations | Encryption, IDS/IPS, firewalls | Infrastructure protection | Digital castle walls |
| Social Engineering | Phishing, pretexting, baiting | Human risk mitigation | Tricking the guards |
| AI Security | Adversarial ML, model poisoning | Secure ML pipelines | Poisoning the well |
| Ethical Hacking | Penetration testing, CTF | Attack simulation | Friendly spy games |
| Pillar | Technical Focus | Applied Outcome | Kid Analogy |
| ------------ | ------------------- | ------------------- | ----------------- |
| Cybersecurity Foundations | Encryption, IDS/IPS, firewalls | Infrastructure protection | Digital castle walls |
| Social Engineering | Phishing, pretexting, baiting | Human risk mitigation | Tricking the guards |
| AI Security | Adversarial ML, model poisoning | Secure ML pipelines | Poisoning the well |
| Ethical Hacking | Penetration testing, CTF | Attack simulation | Friendly spy games |
72-hour comprehensive program covering:
- Authentication + password security
- Malware analysis + threat actors
- Network security fundamentals
- Cryptography + secure communication
- Social engineering tactics + prevention
- AI applications in cybersecurity
- Ethical hacking methodologies
- Defense architecture design
| Week | Date (2026) | Topic | Status |
|---|---|---|---|
| 1 | Feb 2 | Introduction to Cybersecurity | π Planned |
| 2 | Feb 9 | Authentication & Passwords | π Planned |
| 3 | Feb 16 | Malware & Threat Actors | π Planned |
| 4 | Feb 23 | Network Security | π Planned |
| 5 | Mar 2 | Encryption & Cryptography | π Planned |
| 6 | Mar 9 | Social Engineering Fundamentals | π Planned |
| 7 | Mar 16 | Phishing & Pretexting | π Planned |
| 8 | Mar 23 | Midterm Labs & Review | π Planned |
| 9 | Mar 30 | Advanced Social Attacks | π Planned |
| 10 | Apr 6 | AI in Cybersecurity | π Planned |
| 11 | Apr 13 | Defensive Architectures | π Planned |
| 12 | Apr 20 | Ethical Hacking | π Planned |
| 13 | Apr 27 | Real Case Studies | π Planned |
| 14 | May 4 | Group Projects | π Planned |
| 15 | May 11 | Presentations | π Planned |
| 16 | May 18 | Advanced Topics | π Planned |
| 17 | May 25 | AI Ethics & Compliance | π Planned |
| 18 | Jun 1 | Final Assessment | π Planned |
| Project | Description | Status |
|---|---|---|
| Phishing Detector | Machine Learning model to detect fraudulent emails | Coming Soon |
| Social Engineering Simulator | Awareness training simulation | Coming Soon |
| AI Security Toolkit | Monitoring and protection utilities | Coming Soon |
| CTF Challenges | Capture The Flag exercises | Coming Soon |
Important
Projects are structured to be publicly documented and version-controlled.
πΈΰΉ My Contacts Hub
ββββββββββββββ βΉπΰΉ ββββββββββββββ
β£β’β€ Back to Top
Copyright 2026 Quantum Software Development. Code released under the MIT license.
The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:
- Identify and analyze security weaknesses
- Understand attack methodologies
- Anticipate complex threat scenarios
- Design and implement effective defensive solutions
with a strong focus on AI-driven environments and emerging risks.
πΈΰΉ My Contacts Hub
ββββββββββββββ βΉπΰΉ ββββββββββββββ
β£β’β€ Back to Top
Copyright 2026 Quantum Software Development. Code released under the MIT license.