[π§π· PortuguΓͺs] [π¬π§ English]
A Data-Driven Approach Integrating Web Services, Machine Learning, and Financial Data Infrastructure
This work presents an integrated academic and applied framework for cybersecurity, social engineering analysis, and artificial intelligence system protection. The proposed approach combines data-driven methodologies, distributed systems, and machine learning techniques to address contemporary challenges in cyber risk and intelligent system security.
The environment is supported by a recently established Bloomberg Laboratory at PUC-SP, enabling access to professional financial data, APIs, and analytical tools. This infrastructure allows the integration of real-world financial datasets into cybersecurity and OSINT-oriented workflows.
The project is structured around a complete data pipeline, including data ingestion from external APIs, transformation, storage in relational databases, and exposure through RESTful services, combined with predictive modeling and anomaly detection.
Institution: Pontifical Catholic University of SΓ£o Paulo (PUC-SP Humanistic AI & Data Science β’ 5ΒΊ Semestre β’ 2026
School: FACEI - Faculty of Interdisciplinary Studies
Course Repo: INTEGRATED PROJECT: Cybersecurity and Social Engineering - 72 Hours
Professor: β¨ Eduardo Savino Gomes
Extensionist Activities: Social projects with open-source software for community support.
Note
-
Projects and deliverables may be made publicly available whenever possible.
-
The course emphasizes practical, hands-on experience with real datasets to simulate professional consulting scenarios in the fields of Machine Learning and Neural Networks for partner organizations and institutions affiliated with the university.
-
All activities comply with the academic and ethical guidelines of PUC-SP.
-
Any content not authorized for public disclosure will remain confidential and securely stored in private repositories.
- Overview
- System Architecture
- Security Architecture
- Methodology
- Integrated Extension Project
- Weekly Roadmap
- Applied Projects
- Technologies
- Results and Discussion
- Conclusion
This repository defines a data-driven cybersecurity framework integrating:
- Cybersecurity and social engineering
- Artificial intelligence and anomaly detection
- Web Services and distributed systems
- Financial and OSINT-based intelligence
It connects theory and practice through real-world data pipelines and secure architectures.
[π§π· PortuguΓͺs] [π¬π§ English]
PUC-SP has recently established a dedicated Bloomberg Laboratory on campus, providing access to Bloombergβs professional financial infrastructure, including terminals, datasets, and APIs.
This enables the integration of real-world financial data into cybersecurity, OSINT, and data intelligence applications.
- Overview
- System Architecture
- Security Architecture
- Methodology
- Integrated Extension Project
- Weekly Roadmap
- Applied Projects
- Technologies
- Results and Discussion
- Conclusion
- Keywords
This repository defines a data-driven cybersecurity framework integrating:
- Cybersecurity and social engineering
- Artificial intelligence and anomaly detection
- Web Services and distributed systems
- Financial and OSINT-based intelligence
It connects theory and practice through real-world data pipelines and secure architectures.
The system follows a multi-layered architecture:
- Data Sources (Bloomberg APIs, external APIs, OSINT)
- Secure Access Layer (JWT, OAuth2, RBAC)
- Data Ingestion
- Data Processing
- Secure Storage (SQL / NoSQL)
- Intelligence Layer (ML, anomaly detection)
- Application Layer (REST APIs, dashboards)
- Monitoring Layer
- Continuous verification
- Least privilege
- Encryption (TLS + at rest)
- OWASP protection
- Secure API gateways
- Monitoring and anomaly detection
CRISP-DM:
- Business understanding
- Data understanding
- Data preparation
- Modeling
- Evaluation
- Deployment
- API consumption
- Data processing and visualization
- SQL storage
- Machine learning models
- SQL database design (β₯ 3 tables)
- REST API development
- Authentication (JWT)
- Data exposure
Data Sources β Processing β SQL β ML β REST API β Applications
| Week | Topics | Description |
|---|---|---|
| 1 | Introduction | Security concepts, course structure |
| 2 | Distributed Systems | Client-server, HTTP, REST |
| 3 | CRISP-DM | Data methodology |
| 4 | APIs | Data collection (RapidAPI) |
| 5 | Project Work | API + processing |
| 6 | Data Analysis | Pandas, NumPy, visualization |
| 7 | Dashboards | Data presentation |
| 8 | Presentation | Stage 1 results |
| 9 | Final Project | Definition |
| 10 | Big Data | Concepts |
| 11 | NoSQL | Databases |
| 12 | Hadoop | Distributed processing |
| 13 | Spark | Data processing |
| 14 | Spark | Continuation |
| 15 | Project Dev | Final system |
| 16 | Project Dev | Implementation |
| 17 | Project Dev | Finalization |
| 18 | Presentation | Final evaluation |
- Bloomberg data
- Time-series models
- Risk detection
- Public data
- Pattern recognition
- Threat classification
- Behavioral data
- Risk modeling
- Python (Pandas, NumPy, Plotly)
- REST APIs (FastAPI / Flask)
- SQL / NoSQL
- Machine Learning
- Hadoop / Spark
- Scalable pipelines
- Real-world data integration
- Improved anomaly detection
- Strong alignment with industry
A complete framework integrating cybersecurity, AI, and real-world data infrastructures, validated through an applied extension project.
Cybersecurity, Social Engineering, Machine Learning, APIs, OSINT, Zero Trust, Data Engineering
πΈΰΉ My Contacts Hub
ββββββββββββββ βΉπΰΉ ββββββββββββββ
β£β’β€ Back to Top
Copyright 2026 Quantum Software Development. Code released under the MIT license.
The course aims to develop a comprehensive understanding of vulnerabilities across both technical systems and human behavior, enabling learners to:
- Identify and analyze security weaknesses
- Understand attack methodologies
- Anticipate complex threat scenarios
- Design and implement effective defensive solutions
with a strong focus on AI-driven environments and emerging risks.
πΈΰΉ My Contacts Hub
ββββββββββββββ βΉπΰΉ ββββββββββββββ
β£β’β€ Back to Top
Copyright 2026 Quantum Software Development. Code released under the MIT license.