Skip to content

Quantum-Software-Development/1-Cybersecurity-SocialEngineering_Main_Repository-PUCSP

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

148 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation


[πŸ‡§πŸ‡· PortuguΓͺs] [πŸ‡¬πŸ‡§ English]



Main repository for the PUC-SP 5th Semester Academic Hub (2026) β€” focused on Cybersecurity & Social Engineering, featuring hands-on labs, ethical hacking simulations, AI security practices, threat analysis, and applied defense strategies aligned with real-world security scenarios.





Sponsor Quantum Software Development



Cybersecurity and Social Engineering Integrated Project - PUC-SP 5th Semester (2026)

Institution: Pontifical Catholic University of SΓ£o Paulo (PUC-SP Humanistic AI & Data Science β€’ 5ΒΊ Semestre β€’ 2026
School: FACEI - Faculty of Interdisciplinary Studies
Course Repo: INTEGRATED PROJECT: Cybersecurity and Social Engineering - 72 Hours
Professor: ✨ Eduardo Savino Gomes
Extensionist Activities: Social projects with open-source software for community support.



Professor Status






Note

⚠️ Heads Up







πŸ“‹ Table of Contents



This repository serves as the central academic and practical hub for a course in Cybersecurity, Social Engineering, AI System Protection, and Ethical Hacking.

It is designed to integrate theoretical foundations, applied methodologies, and real-world perspectives, preparing learners for modern security challenges.







The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:

- Identify and analyze security weaknesses
- Understand attack methodologies
- Anticipate complex threat scenarios
- Design and implement effective defensive solutions

with a strong focus on AI-driven environments and emerging risks.



Pillar What You Will Master Practical Application
Technical Cybersecurity Firewalls, encryption, IDS/IPS, malware analysis Securing AI infrastructures
Social Engineering Phishing, pretexting, baiting, tailgating Human vulnerability prevention
AI Security Adversarial AI, model poisoning, secure ML pipelines Protecting ML models
Hands-on Labs Ethical hacking, penetration testing, CTF exercises Real-world simulation




Week Topic Resources Status
1 Introduction & Cybersecurity Foundations Slides Notes Planned
2 Authentication & Password Security Slides Video Planned
3 Malware & Threat Actors Slides Lab Planned
4 Network Security Fundamentals Slides Code Planned
5 Encryption & Cryptography Slides Demo Planned
6 Social Engineering Fundamentals Slides Video Planned
7 Phishing & Pretexting Slides Simulation Planned
8 Midterm Labs & Review Slides Quiz Planned
9 Advanced Social Attacks Slides Lab Planned
10 AI in Cybersecurity Slides Code Planned
11 Defense Strategies Slides Project Planned
12 Ethical Hacking Basics Slides Demo Planned
13 Real Case Studies Slides Video Planned
14 Group Projects Slides Repository Planned
15 Project Presentations Slides Planned
16 Advanced Topics Slides Planned
17 Ethics & AI Safety Slides Planned
18 Final Review & Exam Slides Exam Planned



Folder Structure

/semana1/ /semana2/ /semana3/ /labs/ /projects/ /docs/


Each week should contain:

  • Slides
  • Notes (Markdown or Notebook)
  • Practical exercises
  • References




Project Description Status
Phishing Detector Machine Learning model to detect fraudulent emails Coming Soon
Social Engineering Simulator Awareness training simulation Coming Soon
AI Security Toolkit Monitoring and protection utilities Coming Soon
CTF Challenges Capture The Flag exercises Coming Soon

[!IMPORTAT]

Projects are structured to be publicly documented and version-controlled.


























πŸ›ΈΰΉ‹ My Contacts Hub




────────────── βŠΉπŸ”­ΰΉ‹ ──────────────

➣➒➀ Back to Top

Copyright 2026 Quantum Software Development. Code released under the MIT license.

The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:

- Identify and analyze security weaknesses
- Understand attack methodologies
- Anticipate complex threat scenarios
- Design and implement effective defensive solutions

with a strong focus on AI-driven environments and emerging risks.


























πŸ›ΈΰΉ‹ My Contacts Hub




────────────── βŠΉπŸ”­ΰΉ‹ ──────────────

➣➒➀ Back to Top

Copyright 2026 Quantum Software Development. Code released under the MIT license.

About

πŸ” 1-Cybersecurity Social Engineering Main Repository - PUCSP: Academic hub for Cybersecurity & Social Engineering (PUC-SP, 2026) β€” labs, ethical hacking simulations, AI security practices, and applied defense strategies.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Contributors