{"id":698,"date":"2026-03-05T13:59:20","date_gmt":"2026-03-05T16:59:20","guid":{"rendered":"https:\/\/treinamentolivre.com\/si\/cyber\/?page_id=698"},"modified":"2026-03-31T18:35:45","modified_gmt":"2026-03-31T21:35:45","slug":"exercicios-de-seguranca-cibernetica-na-jf","status":"publish","type":"page","link":"https:\/\/treinamentolivre.com\/si\/cyber\/?page_id=698","title":{"rendered":"Exerc\u00edcios de Seguran\u00e7a Cibern\u00e9tica na JF."},"content":{"rendered":"\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>(c) CNJ Conselho da Justi\u00e7a Federal. <\/p>\n<\/blockquote>\n\n\n\n<p><strong><a href=\"https:\/\/ead.cjf.jus.br\/moodle\/course\/view.php?id=234\" target=\"_blank\" rel=\"noreferrer noopener\">Exercicios de Seguran\u00e7a Cibernetica na JF<\/a><\/strong> &#8211; Servidores &#8211; (Desenvolvimento) &#8211; TRF2 &#8211; T1\/2026 &#8211; Curso promovido em mar\u00e7o de 2026 pelo CNJ. <\/p>\n\n\n\n<p><strong>Ementa:<\/strong> Seguran\u00e7a de Aplica\u00e7\u00f5es &#8211; OWASP (Ferramentas e Recursos) &#8211; Pr\u00e1ticas Seguras de Desenvolvimento &#8211; Integra\u00e7\u00e3o da Seguran\u00e7a no Ciclo de Desenvolvimento &#8211; Pr\u00e1tica de an\u00e1lise de amea\u00e7as em aplica\u00e7\u00f5es por meio de gamifica\u00e7\u00e3o.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Apresenta\u00e7\u00e3o dos tutores:\ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A00\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/bizvnL_vS6g?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Dicas de sucesso em EAD.\ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Dicas para obter sucesso como aluno EaD\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/MYhScE6vY5E?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Impacto das vulnerabilidades no neg\u00f3cio.\ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A02\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/5TXIx0lke7Y?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: O que \u00e9 OWASP ( Open Worldwide Application Security Project ) ?\ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A03\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/MDBXGPdQIcU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Broken Access Control. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A04\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1zBuOpssi_c?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Falha de criptografia. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A05\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/Dpfo2saB8E4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Injection. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A06\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/W07IpQmsxPU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Insecure Design. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A07\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/5nstghYzcBE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Security Misconfiguration. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A08\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/0cpdut6R8aw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Vulnerable and outdate elements.\ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A09\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/X21lbhY9ONU?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Identification and Authentication Failures.\ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A10\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/grZehdiTXxE?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Valida\u00e7\u00e3o de Entrada e Sanitiza\u00e7\u00e3o. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A11\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/PcWUU47zm10?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Autentica\u00e7\u00e3o e Controle de Acesso na Pr\u00e1tica (RBAC e ABAC).\ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A12\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/EfoHEbDY-ew?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Prote\u00e7\u00e3o contra Inje\u00e7\u00f5es e XSS na Pr\u00e1tica. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A13\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/nSqc1AAH0-o?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: OWASP Cheat Sheets. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A14\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/5Ui9N4ahzJc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Ferramentas de an\u00e1lise e automa\u00e7\u00e3o de seguran\u00e7a. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A15\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/k-D2RSn1p6w?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><a href=\"https:\/\/cheatsheetseries.owasp.org\/index.html\" target=\"_blank\" rel=\"noreferrer noopener\">Owasp Cheat Sheet Series<\/a> .\ud83d\udc48\ud83c\udffe<\/h1>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: DevSecOps na Pr\u00e1tica. \ud83d\udc47\ud83c\udffe<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A16\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/1EhEtnevjZg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Cultura de Seguran\u00e7a no Time.<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A17\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/RisiCtjTas8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Video: Encerramento de Turma.<\/h1>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"TTX T1A18\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/ooA2xogmoc8?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>(c) CNJ Conselho da Justi\u00e7a Federal. Exercicios de Seguran\u00e7a Cibernetica na JF &#8211; Servidores &#8211; (Desenvolvimento) &#8211; TRF2 &#8211; T1\/2026 &#8211; Curso promovido em mar\u00e7o de 2026 pelo CNJ. Ementa:&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/treinamentolivre.com\/si\/cyber\/?page_id=698\">Continuar a ler&#8230;<span class=\"screen-reader-text\">Exerc\u00edcios de Seguran\u00e7a Cibern\u00e9tica na JF.<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-698","page","type-page","status-publish","hentry","excerpt"],"_links":{"self":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages\/698","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=698"}],"version-history":[{"count":15,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages\/698\/revisions"}],"predecessor-version":[{"id":748,"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=\/wp\/v2\/pages\/698\/revisions\/748"}],"wp:attachment":[{"href":"https:\/\/treinamentolivre.com\/si\/cyber\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}