Skip to content

Quantum-Software-Development/1-Cybersecurity-SocialEngineering_Main_Repository-PUCSP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

184 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


[πŸ‡§πŸ‡· PortuguΓͺs] [πŸ‡¬πŸ‡§ English]



Main repository for the PUC-SP 5th Semester Academic Hub (2026) β€” focused on Cybersecurity & Social Engineering, featuring hands-on labs, ethical hacking simulations, AI security practices, threat analysis, and applied defense strategies aligned with real-world security scenarios.





Sponsor Quantum Software Development



Cybersecurity and Social Engineering Integrated Project - PUC-SP 5th Semester (2026)

Institution: Pontifical Catholic University of SΓ£o Paulo (PUC-SP Humanistic AI & Data Science β€’ 5ΒΊ Semestre β€’ 2026
School: FACEI - Faculty of Interdisciplinary Studies
Course Repo: INTEGRATED PROJECT: Cybersecurity and Social Engineering - 72 Hours
Professor: ✨ Eduardo Savino Gomes
Extensionist Activities: Social projects with open-source software for community support.






Note

⚠️ Heads Up







Table of Contents



This repository serves as the central academic and practical hub for a course in Cybersecurity, Social Engineering, AI System Protection, and Ethical Hacking.

It is designed to integrate theoretical foundations, applied methodologies, and real-world perspectives, preparing learners for modern security challenges.





The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:

- Master core cybersecurity principles and architectures.
- Identify + mitigate social engineering threats (phishing, pretexting).
- Protect AI/ML systems against adversarial attacks + model poisoning.
- Apply encryption + authentication mechanisms correctly.
- Conduct ethical security testing (penetration testing, CTF).
- Design defensive strategies aligned with AI ethics standards.


With a strong focus on AI-driven environments and emerging risks.




Pillar Technical Focus Applied Outcome Kid Analogy
Cybersecurity Foundations Encryption, IDS/IPS, firewalls Infrastructure protection Digital castle walls
Social Engineering Phishing, pretexting, baiting Human risk mitigation Tricking the guards
AI Security Adversarial ML, model poisoning Secure ML pipelines Poisoning the well
Ethical Hacking Penetration testing, CTF Attack simulation Friendly spy games
Pillar Technical Focus Applied Outcome Kid Analogy
------------ ------------------- ------------------- -----------------
Cybersecurity Foundations Encryption, IDS/IPS, firewalls Infrastructure protection Digital castle walls
Social Engineering Phishing, pretexting, baiting Human risk mitigation Tricking the guards
AI Security Adversarial ML, model poisoning Secure ML pipelines Poisoning the well
Ethical Hacking Penetration testing, CTF Attack simulation Friendly spy games




72-hour comprehensive program covering:


  • Authentication + password security
  • Malware analysis + threat actors
  • Network security fundamentals
  • Cryptography + secure communication
  • Social engineering tactics + prevention
  • AI applications in cybersecurity
  • Ethical hacking methodologies
  • Defense architecture design




Week Date (2026) Topic Status
1 Feb 2 Introduction to Cybersecurity πŸ“‹ Planned
2 Feb 9 Authentication & Passwords πŸ“‹ Planned
3 Feb 16 Malware & Threat Actors πŸ“‹ Planned
4 Feb 23 Network Security πŸ“‹ Planned
5 Mar 2 Encryption & Cryptography πŸ“‹ Planned
6 Mar 9 Social Engineering Fundamentals πŸ“‹ Planned
7 Mar 16 Phishing & Pretexting πŸ“‹ Planned
8 Mar 23 Midterm Labs & Review πŸ“‹ Planned
9 Mar 30 Advanced Social Attacks πŸ“‹ Planned
10 Apr 6 AI in Cybersecurity πŸ“‹ Planned
11 Apr 13 Defensive Architectures πŸ“‹ Planned
12 Apr 20 Ethical Hacking πŸ“‹ Planned
13 Apr 27 Real Case Studies πŸ“‹ Planned
14 May 4 Group Projects πŸ“‹ Planned
15 May 11 Presentations πŸ“‹ Planned
16 May 18 Advanced Topics πŸ“‹ Planned
17 May 25 AI Ethics & Compliance πŸ“‹ Planned
18 Jun 1 Final Assessment πŸ“‹ Planned




Project Description Status
Phishing Detector Machine Learning model to detect fraudulent emails Coming Soon
Social Engineering Simulator Awareness training simulation Coming Soon
AI Security Toolkit Monitoring and protection utilities Coming Soon
CTF Challenges Capture The Flag exercises Coming Soon

Important

Projects are structured to be publicly documented and version-controlled.


























πŸ›ΈΰΉ‹ My Contacts Hub




────────────── βŠΉπŸ”­ΰΉ‹ ──────────────

➣➒➀ Back to Top

Copyright 2026 Quantum Software Development. Code released under the MIT license.

The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:

- Identify and analyze security weaknesses
- Understand attack methodologies
- Anticipate complex threat scenarios
- Design and implement effective defensive solutions

with a strong focus on AI-driven environments and emerging risks.


























πŸ›ΈΰΉ‹ My Contacts Hub




────────────── βŠΉπŸ”­ΰΉ‹ ──────────────

➣➒➀ Back to Top

Copyright 2026 Quantum Software Development. Code released under the MIT license.

About

πŸ” 1-Cybersecurity Social Engineering Main Repository - PUCSP: Academic hub for Cybersecurity & Social Engineering (PUC-SP, 2026) β€” labs, ethical hacking simulations, AI security practices, and applied defense strategies.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Contributors