{"id":153196,"date":"2023-06-05T19:18:14","date_gmt":"2023-06-05T22:18:14","guid":{"rendered":"https:\/\/sandbox2.institutopmg.com\/curso-online\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/"},"modified":"2026-03-19T16:23:57","modified_gmt":"2026-03-19T19:23:57","slug":"it-shaped-cybersecurity-vulnerabilities-and-threats-foundation","status":"publish","type":"curso-online","link":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","title":{"rendered":"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF"},"content":{"rendered":"<p>In this course, you will learn the principles and fundamentals of Cybersecurity analysis in an organization.<\/p>\n<p>You will understand the basic terminology, learn about cybersecurity tools and devices, and the main attacks, vulnerabilities, and cyber threats, from Malware to Social Engineering, including Application Attacks, Network Attacks, Threat Actors, and understanding the fundamentals of Protocols and Networks.<\/p>\n","protected":false},"featured_media":140393,"comment_status":"open","ping_status":"closed","template":"","_formacao-curso-online":[8040],"class_list":["post-153196","curso-online","type-curso-online","status-publish","has-post-thumbnail","hentry","_formacao-curso-online-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation<\/title>\n<meta name=\"description\" content=\"In this course, you will learn about the main attacks, vulnerabilities, and cyber threats, from Malware to Social Engineering, including Application Attacks, Network Attacks, Threat Actors, and understanding the fundamentals of Protocols and Networks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF\" \/>\n<meta property=\"og:description\" content=\"In this course, you will learn about the main attacks, vulnerabilities, and cyber threats, from Malware to Social Engineering, including Application Attacks, Network Attacks, Threat Actors, and understanding the fundamentals of Protocols and Networks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\" \/>\n<meta property=\"og:site_name\" content=\"PMG Academy\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-19T19:23:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\" \/>\n\t<meta property=\"og:image:width\" content=\"759\" \/>\n\t<meta property=\"og:image:height\" content=\"759\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\",\"name\":\"PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation\",\"isPartOf\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\",\"datePublished\":\"2023-06-05T22:18:14+00:00\",\"dateModified\":\"2026-03-19T19:23:57+00:00\",\"description\":\"In this course, you will learn about the main attacks, vulnerabilities, and cyber threats, from Malware to Social Engineering, including Application Attacks, Network Attacks, Threat Actors, and understanding the fundamentals of Protocols and Networks.\",\"breadcrumb\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage\",\"url\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\",\"contentUrl\":\"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png\",\"width\":759,\"height\":759,\"caption\":\"IT Shaped Cybersecurity Vulnerabilities And Threats Foundation T-CVTF\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Curso Online\",\"item\":\"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#website\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"name\":\"PMG Academy\",\"description\":\"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis\",\"publisher\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#organization\",\"name\":\"PMG Academy\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"contentUrl\":\"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png\",\"width\":6964,\"height\":2938,\"caption\":\"PMG Academy\"},\"image\":{\"@id\":\"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PMG.Academy.Brasil\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation","description":"In this course, you will learn about the main attacks, vulnerabilities, and cyber threats, from Malware to Social Engineering, including Application Attacks, Network Attacks, Threat Actors, and understanding the fundamentals of Protocols and Networks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","og_locale":"en_US","og_type":"article","og_title":"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF","og_description":"In this course, you will learn about the main attacks, vulnerabilities, and cyber threats, from Malware to Social Engineering, including Application Attacks, Network Attacks, Threat Actors, and understanding the fundamentals of Protocols and Networks.","og_url":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","og_site_name":"PMG Academy","article_publisher":"https:\/\/www.facebook.com\/PMG.Academy.Brasil","article_modified_time":"2026-03-19T19:23:57+00:00","og_image":[{"width":759,"height":759,"url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","url":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/","name":"PMG Academy | IT Shaped Cybersecurity Vulnerabilities And Threats Foundation","isPartOf":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage"},"thumbnailUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","datePublished":"2023-06-05T22:18:14+00:00","dateModified":"2026-03-19T19:23:57+00:00","description":"In this course, you will learn about the main attacks, vulnerabilities, and cyber threats, from Malware to Social Engineering, including Application Attacks, Network Attacks, Threat Actors, and understanding the fundamentals of Protocols and Networks.","breadcrumb":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#primaryimage","url":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","contentUrl":"https:\/\/media.pmgacademy.com\/wp-content\/uploads\/2022\/11\/23180329\/T-CVTF.png","width":759,"height":759,"caption":"IT Shaped Cybersecurity Vulnerabilities And Threats Foundation T-CVTF"},{"@type":"BreadcrumbList","@id":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/it-shaped-cybersecurity-vulnerabilities-and-threats-foundation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Curso Online","item":"https:\/\/sandbox2.institutopmg.com\/en\/online-course\/"},{"@type":"ListItem","position":2,"name":"IT-Shaped Cybersecurity Vulnerabilities and Threats Foundation | T-CVTF"}]},{"@type":"WebSite","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#website","url":"https:\/\/sandbox2.institutopmg.com\/en\/","name":"PMG Academy","description":"Seu portal de estudos de ITSM, Cyber, EGIT e Projetos \u00c1geis","publisher":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sandbox2.institutopmg.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#organization","name":"PMG Academy","url":"https:\/\/sandbox2.institutopmg.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","contentUrl":"https:\/\/sandbox2.institutopmg.com\/wp-content\/uploads\/2021\/02\/cropped-Asset-1@azul-1.png","width":6964,"height":2938,"caption":"PMG Academy"},"image":{"@id":"https:\/\/sandbox2.institutopmg.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PMG.Academy.Brasil"]}]}},"_links":{"self":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/curso-online\/153196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/curso-online"}],"about":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/types\/curso-online"}],"replies":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/comments?post=153196"}],"version-history":[{"count":1,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/curso-online\/153196\/revisions"}],"predecessor-version":[{"id":153199,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/curso-online\/153196\/revisions\/153199"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/media\/140393"}],"wp:attachment":[{"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/media?parent=153196"}],"wp:term":[{"taxonomy":"_formacao-curso-online","embeddable":true,"href":"https:\/\/sandbox2.institutopmg.com\/en\/wp-json\/wp\/v2\/_formacao-curso-online?post=153196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}