{"id":29,"date":"2023-11-14T05:37:51","date_gmt":"2023-11-14T08:37:51","guid":{"rendered":"https:\/\/treinamentolivre.com\/si\/cyber\/?page_id=29"},"modified":"2026-03-10T18:52:41","modified_gmt":"2026-03-10T21:52:41","slug":"certificacoes","status":"publish","type":"page","link":"https:\/\/treinamentolivre.com\/si\/cyber\/?page_id=29","title":{"rendered":"Certifica\u00e7\u00f5es"},"content":{"rendered":"\n<p><strong>Aqui est\u00e3o listadas as certifica\u00e7\u00f5es profissionais mais importantes para o profissional de seguran\u00e7a da informa\u00e7\u00e3o. \u00c9 necess\u00e1rio conhecer :<\/strong><\/p>\n\n\n\n<p>I &#8211; programa\u00e7\u00e3o Java e C++,<\/p>\n\n\n\n<p>II &#8211; normas e m\u00e9todos de governan\u00e7a e seguran\u00e7a da informa\u00e7\u00e3o;<\/p>\n\n\n\n<p>III &#8211; redes de computadores e suas tecnologias;<\/p>\n\n\n\n<p>IV &#8211; sistemas operacionais Unix, Windows e shell scripting;<\/p>\n\n\n\n<p>V &#8211; ferramentas de controle de ambientes.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Lista das certifica\u00e7\u00f5es indicadas em oportunidades de trabalho<\/strong>. <\/p>\n\n\n\n<p>Estas certifica\u00e7\u00f5es foram colhidas como pr\u00e9-requisitos em ofertas de emprego:<\/p>\n\n\n\n<p><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/treinamentolivre.com\/si\/cyber\/?p=215\" target=\"_blank\" rel=\"noreferrer noopener\">C Certified Professional Programmer (C-CPP)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.udemy.com\/course\/cpp-c-certified-professional-programmer-exam-preparation\/\" target=\"_blank\" rel=\"noreferrer noopener\">C++ Certified Professional Programmer (CPPP) da International Software Certification Board (ISCB)<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/www.eccouncil.org\/train-certify\/certified-ethical-hacker-ceh\/\" target=\"_blank\" rel=\"noreferrer noopener\">CEH<\/a><\/li>\n\n\n\n<li>Certified Associate in C++ (CPA) da C++ Institute<\/li>\n\n\n\n<li>Certified C Developer (CDev)<\/li>\n\n\n\n<li>Certified Network Defender (CND)<\/li>\n\n\n\n<li>Certified Professional Programmer (CPP) da C++ Institute<\/li>\n\n\n\n<li>Certified Secure C Programmer (CSCP)<\/li>\n\n\n\n<li>Cisco: CCNA Routing e Switch<\/li>\n\n\n\n<li><a href=\"https:\/\/learningnetwork.cisco.com\/s\/ccna\" target=\"_blank\" rel=\"noreferrer noopener\">Cisco: Certified Network Associate (CCNA)<\/a><\/li>\n\n\n\n<li>Cisco: Certified Support Technician (CCST) Cybersecurity<\/li>\n\n\n\n<li>Cisco: Certified Support Technician (CCST) Networking<\/li>\n\n\n\n<li><a href=\"https:\/\/treinamentolivre.com\/si\/cyber\/?p=730\" target=\"_blank\" rel=\"noreferrer noopener\">CompTIA<\/a><\/li>\n\n\n\n<li>CISSP<\/li>\n\n\n\n<li>EC-Council Certified Ethical Hacking<\/li>\n\n\n\n<li>eLearnSecurity Certified Incident Responder (eCIR)<\/li>\n\n\n\n<li>eLearnSecurity Network Defense Professional (eNDP)<\/li>\n\n\n\n<li>Forcepoint: Certified Forcepoint DLP Administrator<\/li>\n\n\n\n<li>Fortinet NSE 4+<\/li>\n\n\n\n<li>GNU C++ Certified Professional Programmer (G-CPP)<\/li>\n\n\n\n<li>ISACA:CDPSE &#8211; Certified Data Privacy Solutions Engineer<\/li>\n\n\n\n<li>ISACA:CET &#8211; Certified in emerging technology certification<\/li>\n\n\n\n<li>ISACA:CGEIT &#8211; Certified in the governance of Enterprise IT<\/li>\n\n\n\n<li>ISACA:CISA &#8211; Cettified Systems Auditor<\/li>\n\n\n\n<li>ISACA:CISM &#8211; Certified Information Security Manager<\/li>\n\n\n\n<li>ISACA:CRISK &#8211; Certified Risk and Information Systems Control<\/li>\n\n\n\n<li>ISACA:CSX-P &#8211; CSX Cybersecurity Practitioner Certification<\/li>\n\n\n\n<li>ISACA:ITCA &#8211; Information Technology Certified Associate<\/li>\n\n\n\n<li>JavaScript<\/li>\n\n\n\n<li>Microsoft AZ-500<\/li>\n\n\n\n<li>Microsoft Certified: Azure Solutions Architect Expert<\/li>\n\n\n\n<li>Microsoft MS-500<\/li>\n\n\n\n<li>Microsoft SC-100<\/li>\n\n\n\n<li><a href=\"https:\/\/treinamentolivre.com\/si\/cyber\/?p=89\" target=\"_blank\" rel=\"noreferrer noopener\">Microsoft SC-200<\/a><\/li>\n\n\n\n<li>OffSec OSCE: Offensive Security Certified Expert<\/li>\n\n\n\n<li>OffSec OSCP: Offensive Security Certified Professional<\/li>\n\n\n\n<li>OffSec OSPW: OSWP Certification. Wireless Attacks<\/li>\n\n\n\n<li>OffSec: Exploit Development<\/li>\n\n\n\n<li>OffSec: Penetration Testing<\/li>\n\n\n\n<li>OffSec: Security Operations<\/li>\n\n\n\n<li>OffSec: Web Application Security<\/li>\n\n\n\n<li>Oracle Certified Professional, Java SE 8 Programmer (OCPJP)<\/li>\n\n\n\n<li>Oracle: Oracle Certified Professional, Java EE (Enterprise Edition) Web Services Developer<\/li>\n\n\n\n<li>Oracle: Oracle Certified Professional, Java SE Programmer (OCP Java SE 11)<\/li>\n\n\n\n<li>Pivotal: Spring Professional Certification<\/li>\n\n\n\n<li>Red Hat: Certified Enterprise Microservices Developer (RHCEMD)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Aqui est\u00e3o listadas as certifica\u00e7\u00f5es profissionais mais importantes para o profissional de seguran\u00e7a da informa\u00e7\u00e3o. \u00c9 necess\u00e1rio conhecer : I &#8211; programa\u00e7\u00e3o Java e C++, II &#8211; normas e m\u00e9todos&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/treinamentolivre.com\/si\/cyber\/?page_id=29\">Continuar a ler&#8230;<span class=\"screen-reader-text\">Certifica\u00e7\u00f5es<\/span><\/a><\/div>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-29","page","type-page","status-publish","hentry","excerpt"],"_links":{"self":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=29"}],"version-history":[{"count":33,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages\/29\/revisions"}],"predecessor-version":[{"id":733,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages\/29\/revisions\/733"}],"wp:attachment":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}