- Teacher: Hugo Rodrigues
- Teacher: AI User
e-learning.hckr.pt
Site announcements
Skip available courses
Available courses
- Teacher: Hugo Rodrigues
- Teacher: AI User
tgerqewr
- Teacher: Hugo Rodrigues
SIEM & SOAR
Security Information and Event Management with Wazuh
About This Course
Practical training on SIEM and SOAR focused on the open-source platform Wazuh. Participants will learn to deploy, configure and operate a SIEM for threat detection, incident response and compliance.
The course covers SIEM/SOAR fundamentals through to advanced agent configuration, intrusion detection rules, threat intelligence, vulnerability management and compliance management.
What You Will Learn
SIEM Fundamentals
What is a SIEM, architecture, log collection and event correlation
Wazuh Platform
Installation, configuration, dashboards and agent management
Intrusion Detection
IDS rules, anomaly detection and real-time alerting
Incident Response
Automated incident response with playbooks and workflows
Threat Intelligence
TI feed integration, IOCs and alert enrichment
Compliance
CIS Benchmarks, PCI-DSS, GDPR and audit reporting
Course Structure
Target Audience
SOC Analysts
Operating or planning to operate a SIEM daily
Security Engineers
Responsible for SIEM deployment and tuning
IT Managers
Evaluating open-source SIEM solutions
Prerequisites
- Basic networking and security knowledge
- Familiarity with Linux (command line)
- Basic understanding of log management and monitoring
- Teacher: Hugo Rodrigues

Introdução ao Bash
Do Básico ao Avançado — Com Exemplos Práticos e Laboratórios de Cibersegurança
Sobre o Curso
Curso completo de Bash scripting organizado em 15 módulos progressivos, desde os conceitos fundamentais até projectos práticos complexos, com ênfase especial em aplicações de cibersegurança.
Os participantes dominarão a linha de comando Linux, automação de tarefas, processamento de texto com regex/grep/sed/AWK, gestão de processos, networking e scripting para segurança ofensiva e defensiva.
O que Vai Aprender
Terminal & FHS
Navegação, ficheiros, permissões, links e wildcards
Pipes & Filtros
Redirecionamento, pipelines, sort, uniq, cut, tr e xargs
Regex, Grep & Sed
Expressões regulares, pesquisa avançada e transformação de texto
AWK
Processamento avançado de dados, relatórios e análise de logs
Scripting Seguro
Debug, error handling, set -euo pipefail e ShellCheck
Cibersegurança
Auditoria, brute-force detection, hardening e resposta a incidentes
Estrutura do Curso
Destinatários
Administradores de Sistemas
Que pretendam automatizar tarefas e gerir servidores Linux
Analistas de Cibersegurança
Que usam a CLI para análise, auditoria e resposta a incidentes
Estudantes e Profissionais de TI
Que queiram dominar a linha de comando Linux
Pré-Requisitos
- Conhecimentos básicos de informática
- Acesso a um sistema Linux (VM, WSL2 ou nativo)
- Motivação para aprender e praticar regularmente
- Teacher: Hugo Rodrigues
Know Metasploit
Master the World's Most Used Penetration Testing Framework
About This Course
The most comprehensive training on the Metasploit Framework — from installation and MSFconsole mastery to custom module development in Ruby, automation with resource scripts, and advanced evasion techniques.
With 16 modules, 37 lessons and hands-on labs in every module, this course covers the complete Metasploit ecosystem: 4000+ exploits, msfvenom payload generation, Meterpreter deep dive, post-exploitation, privilege escalation, pivoting, client-side attacks, AV evasion, and Python/Ruby API integration for automated security operations.
What You Will Learn
MSFconsole & Database
Master navigation, search, workspaces, db_nmap integration and session management
Exploitation & Payloads
4000+ exploits, msfvenom for all platforms, staged/stageless, bind/reverse, encoders
Meterpreter & Post-Exploit
Credentials (hashdump, kiwi), persistence, privilege escalation, token manipulation
Pivoting & Lateral Movement
Autoroute, port forwarding, SOCKS proxy, PsExec, Pass-the-Hash, double pivot
Evasion & Stealth
AV evasion, encoders, custom templates, HTTPS transport, process migration, cleanup
Automation & Development
Resource scripts, Ruby custom modules, IRB scripting, RPC API, Python integration
Course Structure
Target Audience
Penetration Testers
Who want to master the primary tool of the trade
Red Team Operators
Seeking advanced automation and custom module development
Security Engineers
Integrating Metasploit into security testing pipelines and SOC workflows
Prerequisites
- Solid understanding of TCP/IP networking and protocols
- Linux command line proficiency (Bash)
- Basic information security knowledge
- Python basics (recommended for automation module)
- Ruby basics (introduced in custom module development)
Certification
This course provides deep Metasploit expertise essential for OSCP (Offensive Security), eJPT (INE), CompTIA PenTest+ and CEH certifications.
- Teacher: Hugo Rodrigues

Intro to Cortex XSOAR
Security Orchestration, Automation & Response — From Fundamentals to Advanced
About This Course
This comprehensive training on Palo Alto Networks Cortex XSOAR (formerly Demisto) empowers security professionals to automate, orchestrate and accelerate security operations with the market-leading SOAR platform.
The course covers XSOAR 8.x (cloud-native) and includes an introduction to Cortex AgentiX, the next-generation agentic AI evolution launched in October 2025.
What You Will Learn
Incident Management
Full lifecycle: triage, investigation, containment, remediation and closure
Automated Playbooks
Design and deploy automated responses with the visual editor. Loops, error handling and sub-playbooks
Python Automation
Develop custom scripts and integrations with CommonServerPython, Docker and demisto-sdk
Threat Intelligence
Integrate and enrich TI from multiple sources. Feeds, indicators, reputation scoring and TI workflows
Integrations & Marketplace
Configure 850+ integrations: SIEM, EDR, email, ticketing, firewall, sandbox and cloud
Dashboards & Reporting
Build SOC dashboards with KPIs (MTTR, SLA), automated reports and performance metrics
Course Structure
Target Audience
SOC Analysts
Tier 1-3 looking to automate triage and incident response
Security Engineers
Integrating and automating security tools in the SOC
SOC Managers
Optimising operations with metrics, dashboards and automation
Prerequisites
- Basic networking and information security knowledge
- Familiarity with SOC concepts (incidents, triage, SIEM)
- Basic Python (recommended for the scripting module)
- Access to an XSOAR environment (provided or trial)
Certification
This course prepares for the Palo Alto Networks XSOAR Engineer certification (specialist level). Path: Cybersecurity Practitioner → Security Operations Professional → XSOAR Engineer.
- Teacher: Hugo Rodrigues

Wireless Security Fundamentals
From 802.11 Basics to Advanced Wireless Attacks
About This Course
Comprehensive training on wireless security, from 802.11 fundamentals to advanced attacks on WPA3, Bluetooth, RFID and NFC.
Participants will learn to identify wireless vulnerabilities, execute attacks in controlled environments and implement effective countermeasures.
What You Will Learn
802.11 Fundamentals
Standards, frequencies, channels, frames and wireless protocols
WEP/WPA/WPA2 Attacks
Cracking, deauthentication, handshake capture and dictionary attacks
WPA3 & Advanced
Dragonfly handshake, downgrade attacks and side-channel analysis
Client-Side Attacks
Evil twin, karma attacks, rogue AP and captive portal
Bluetooth Security
Bluejacking, bluesnarfing, BLE exploitation and KNOB attack
RFID & NFC
Cloning, relay attacks, skimming and Proxmark3
Course Structure
Target Audience
Pentesters
Specialising in wireless security assessment
Network Engineers
Responsible for wireless infrastructure security
Security Auditors
Assessing wireless security posture of organisations
Prerequisites
- Basic networking knowledge (TCP/IP, DNS, DHCP)
- Familiarity with Linux (command line)
- Wireless adapter compatible with monitor mode (recommended)
- Teacher: Hugo Rodrigues

Open Source Intelligence (OSINT)
Master the Art of Gathering and Analysing Publicly Available Information
About This Course
Practical training in OSINT (Open Source Intelligence) — the art of collecting, processing and analysing publicly available information to produce actionable intelligence.
Participants will learn advanced search techniques, reconnaissance tools, social media analysis, infrastructure enumeration and data collection for security investigations.
What You Will Learn
Advanced Search
Google Dorking, Shodan, Censys and specialised search engines
People & Identities
Sherlock, HIBP, social media and metadata analysis
Infrastructure
DNS, WHOIS, subdomains, SSL certificates and ASN mapping
Web Intelligence
Wayback Machine, cache, dark web and paste sites
Analysis & Reporting
Maltego, link analysis, timeline and OSINT reports
Legal & Ethics
GDPR, legal boundaries and responsible disclosure
Course Structure
Target Audience
Security Researchers
Investigating threats and malicious actors
Pentesters
Reconnaissance phase of penetration testing
Investigators
Fraud analysis, compliance and due diligence
Prerequisites
- Basic Internet and web browsing knowledge
- Familiarity with security concepts (recommended)
- Social media accounts for practical exercises

Secure Software Development Life Cycle
Build Security into Every Phase of Software Development
About This Course
This comprehensive training on the Secure Software Development Life Cycle (S-SDLC) teaches how to integrate security into every phase of development — from design to deployment.
Participants will learn to apply threat modeling, secure coding practices, OWASP Top 10, security testing (SAST/DAST/SCA) and DevSecOps, with practical examples in Python, Java, JavaScript, C# and Go.
What You Will Learn
Secure Design
Threat modeling with STRIDE, security requirements and privacy by design
OWASP Top 10
The 10 most critical web vulnerabilities with examples in 5 languages
Security Testing
SAST, DAST and SCA integrated into the CI/CD pipeline
DevSecOps
Security automation in pipelines with open-source tools
Compliance
GDPR, NIS2, ISO 27001 and Portuguese regulations
Supply Chain
Dependency security, SBOM and software integrity
Course Structure
Target Audience
Developers
Who want to write secure code from the start
Security Engineers
Who integrate security into the development pipeline
Tech Leads / Architects
Responsible for secure design decisions
Prerequisites
- Experience in software development (any language)
- Basic information security knowledge
- Familiarity with web concepts (HTTP, APIs, databases)
- Teacher: Hugo Rodrigues
Análise de Malware
Laboratório e Técnicas de Investigação
Sobre o Curso
Formação prática em Análise de Malware focada na construção de um laboratório seguro e na aplicação de técnicas de investigação para analisar amostras maliciosas.
Os participantes aprenderão a configurar um ambiente isolado com máquinas virtuais e OPNsense, capturar e analisar tráfego de rede, e utilizar ferramentas de análise estática e dinâmica para dissecar malware de forma segura.
O que Vai Aprender
Laboratório Seguro
Arquitectura isolada com VMs, snapshots e segmentação de rede
OPNsense
Firewall/router virtual para controlo e captura de tráfego
Análise de Tráfego
Wireshark, tcpdump e análise de comunicações C2
Ferramentas de Análise
Análise estática (strings, PE headers) e dinâmica (sandbox)
Segurança
Procedimentos de emergência, contenção e boas práticas
Documentação
IOCs, relatórios de análise e partilha de intelligence
Estrutura do Curso
Destinatários
Malware Analysts
Que pretendam iniciar ou aprofundar competências de análise
SOC Analysts
Que lidam com alertas de malware e precisam de investigar
Incident Responders
Que analisam artefactos durante resposta a incidentes
Pré-Requisitos
- Conhecimentos de redes TCP/IP
- Familiaridade com Linux e Windows
- Computador com 16GB+ RAM (para executar VMs)
- Noções básicas de virtualização (VirtualBox ou VMware)
- Teacher: Hugo Rodrigues
Hardcore NMAP
Dominar o Network Mapper do Fundamento ao Desenvolvimento de Scripts NSE
Sobre o Curso
A formação mais completa e aprofundada sobre o Nmap — a ferramenta de network scanning mais utilizada no mundo. Do fundamento ao desenvolvimento de scripts NSE em Lua, passando por todas as técnicas de scanning, evasão, detecção de serviços e integração com ferramentas profissionais.
Com 17 módulos, 134 tópicos e 17 laboratórios práticos, este curso cobre em profundidade: host discovery, port scanning (12 técnicas diferentes), service/OS detection, firewall evasion, o Nmap Scripting Engine (NSE) incluindo desenvolvimento de scripts personalizados em Lua, ferramentas complementares (Ncat, Socat, Nping, Ndiff, Zenmap) e cenários avançados em IPv6, cloud, IoT e ambientes industriais.
O que Vai Aprender
Host Discovery
ARP, ICMP, TCP, SCTP e IP Protocol Ping. Combinação de técnicas e análise com --packet-trace e Wireshark.
Port Scanning (12 técnicas)
SYN, Connect, UDP, FIN, NULL, Xmas, ACK, Window, Maimon, SCTP, Idle Scan e Custom TCP Scan.
Service & OS Detection
Version probing, intensity levels, banner grabbing, SSL/TLS enumeration e TCP/IP stack fingerprinting.
Firewall Evasion & IDS Bypass
Fragmentação, decoys, source port, IP/MAC spoofing, TTL manipulation, proxychains, timing e IPv6.
NSE & Lua Scripting
4 módulos dedicados: scripts essenciais, desenvolvimento em Lua, threading, brute force framework e vulnerability reporting.
Ferramentas & Integração
Ncat, Socat, Nping, Ndiff, Zenmap. Integração com Metasploit, ELK Stack, SIEM e CI/CD pipelines.
Estrutura do Curso
Destinatários
Pentesters
Que pretendam dominar a ferramenta #1 de network reconnaissance
Network Engineers
Que auditam e monitorizam infraestrutura de rede
SOC Analysts
Que usam Nmap para detecção de vulnerabilidades e asset discovery
Pré-Requisitos
- Conhecimentos sólidos de redes TCP/IP (modelo OSI, protocolos, portas)
- Familiaridade com Linux (linha de comando)
- Noções básicas de segurança da informação
- Python básico (recomendado para o módulo de automação)
- Lua (introduzido no curso para desenvolvimento NSE)
Certificação
Este curso fornece uma base sólida para certificações que incluem scanning e enumeration como componente principal: OSCP (Offensive Security), CompTIA PenTest+, CEH e eJPT.
- Teacher: Hugo Rodrigues

Operational Security (OPSEC) 101
Protecting Critical Information in the Digital Age
About This Course
Comprehensive training in Operational Security (OPSEC) — the process of protecting critical information against adversaries, from the four pillars of security to advanced counter-surveillance techniques.
Participants will learn to identify critical information, analyse threats, assess vulnerabilities and apply effective countermeasures to protect personal and organisational operations.
What You Will Learn
Four Pillars
Confidentiality, integrity, availability and authenticity
Identity & Access
IAM, MFA, least privilege and identity management
Breach Awareness
Recognise, respond to and recover from data breaches
Secure Comms
Encryption, VPNs, secure messaging and email security
Digital Footprint
Minimise online exposure, metadata and tracking
Physical & Deception
Physical security, device hardening and honeypots
Course Structure
Target Audience
Security Professionals
Protecting operations and critical information
Privacy-Conscious Users
Minimising their digital footprint
IT Administrators
Responsible for organisational security policies
Prerequisites
- Basic computer and Internet knowledge
- Interest in privacy and personal security
- Teacher: M0rpH0g3n3s1s |
- Teacher: Hugo Rodrigues

Offensive Penetration Testing Services
Formação Profissional em Segurança Ofensiva — Do Pre-Engagement ao Relatório Final
Sobre o Curso
Formação profissional completa em Penetration Testing Ofensivo, cobrindo todo o ciclo de um engagement — desde o pre-engagement e enquadramento legal até à exploração, pós-exploração e relatório final.
Os participantes aprenderão a executar pentests profissionais seguindo metodologias reconhecidas (PTES, OWASP, MITRE ATT&CK), com 74 lições detalhadas, exemplos práticos e exercícios hands-on em ambientes controlados.
O que Vai Aprender
Pre-Engagement
Rules of Engagement, scope, legal (Lei 109/2009), NDAs e SoW
OSINT & Recon
Intelligence gathering, sock puppets, Google Dorking e Shodan
Scanning & Enumeration
Nmap, Masscan, Nessus, OpenVAS e service enumeration
Exploitation
SQLi, XSS, RCE, Metasploit, buffer overflow e web attacks
Reporting
Relatório profissional, CVSS, MITRE mapping e debrief
Estrutura do Curso
Destinatários
Pentesters
Profissionais ou aspirantes a penetration testers
Security Analysts
SOC analysts que pretendam transitar para offensive security
Red Team Operators
Que procuram uma base sólida e metodológica
Pré-Requisitos
- Conhecimentos de redes TCP/IP e protocolos
- Familiaridade com Linux e Windows
- Noções básicas de segurança da informação
- Python básico (recomendado para módulos de scripting)
Certificação
Este curso prepara para certificações como OSCP (Offensive Security), eJPT (INE) e CompTIA PenTest+.
- Teacher: Hugo Rodrigues