Python for Finance
Starting at
2
€
Course length
Location
Language
Scientific Coordination
Executive Coordination
Course Objective
Learn how to use Python, the fastest-growing programming language in the world, to process, analyze, and visualize financial data faster than ever.
Target Audience
Learn how to use Python, the fastest-growing programming language in the world, to process, analyze, and visualize financial data faster than ever.
1st Module
Introduction to
Cybersecurity concepts
(3 hours)
Eng. José Alegria (Altice)
-
Cyber Security definition
-
Importance of security at different layers (from physical to information)
-
Fundamental information security properties: confidentiality, integrity, availability
-
Types of vulnerabilities
-
Types of attacks
-
Motivations of attackers
-
Phases of an attack
-
Attack-Vulnerability-Intrusion (AVI) model
-
NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, Recover
2nd Module
Identification of assets
and risk concepts
(3 hours)
Prof. Ana Respício (FCUL)
-
Resources
-
Information flows and dependencies
-
Security policies and responsibilities
-
Risk identification
-
Risk assessment
-
Risk analysis
-
Risk management
-
Control strategies
-
Cost-benefit analysis in InfoSec
1st Module
Introduction to
Cybersecurity concepts
(3 hours)
Eng. José Alegria (Altice)
-
Cyber Security definition
-
Importance of security at different layers (from physical to information)
-
Fundamental information security properties: confidentiality, integrity, availability
-
Types of vulnerabilities
-
Types of attacks
-
Motivations of attackers
-
Phases of an attack
-
Attack-Vulnerability-Intrusion (AVI) model
-
NIST Cybersecurity Framework: Identify, Protect, Detect, Respond, Recover
2nd Module
Protection of assets and detection of attacks
(3 hours)
Eng. Paulo Moniz (EDP)
-
Access control (Authentication, Authorization, Accounting)
-
Network protection (SSL/TLS, VPNs)
-
Infrastructure protection (Firewalls, IPS, Antivirus)
-
Information protection (backups, DLP tools)
-
Penetration testing
-
Personnel training
-
Intelligence gathering systems/OSINT
-
Vulnerability scanners
-
Event gathering and monitoring systems (Syslog, NIDS, HIDS)
-
Event correlation (SIEMs)
3rd Module
Protection of assets and detection of attacks
(3 hours)
Eng. Paulo Moniz (EDP)
-
Access control (Authentication, Authorization, Accounting)
-
Network protection (SSL/TLS, VPNs)
-
Infrastructure protection (Firewalls, IPS, Antivirus)
-
Information protection (backups, DLP tools)
-
Penetration testing
-
Personnel training
-
Intelligence gathering systems/OSINT
-
Vulnerability scanners
-
Event gathering and monitoring systems (Syslog, NIDS, HIDS)
-
Event correlation (SIEMs)
4th Module
Reaction & Recovery
(3 hours)
Eng. Marcelo Rodrigues (PWC)
-
Response plans (legal frameworks)
-
Incident management (CERT/CSIRT teams)
-
Analysis of incident impacts
-
Contingency plans
-
Disaster recovery
-
Business continuity
-
Image recovery and communication
5th Module
Cybersecurity Law
(3 hours)
Dra. Magda Coco (VdA)
-
The importance of the legal dimension
-
Main legal concepts
-
Cybersecurity legal and regulatory framework – main trends
-
The legal impacts of a cyber incident
-
A strategic approach to cybersecurity regulatory framework (general and sector-specific legislation)