Site announcements

There are no discussion topics yet in this forum.

Available courses

HCKR

SIEM & SOAR

Security Information and Event Management with Wazuh

28h
Duration
9
Modules
11
Lessons
3
Hands-On Labs

About This Course

Practical training on SIEM and SOAR focused on the open-source platform Wazuh. Participants will learn to deploy, configure and operate a SIEM for threat detection, incident response and compliance.

The course covers SIEM/SOAR fundamentals through to advanced agent configuration, intrusion detection rules, threat intelligence, vulnerability management and compliance management.

What You Will Learn

🔎

SIEM Fundamentals

What is a SIEM, architecture, log collection and event correlation

Wazuh Platform

Installation, configuration, dashboards and agent management

🔒

Intrusion Detection

IDS rules, anomaly detection and real-time alerting

💥

Incident Response

Automated incident response with playbooks and workflows

📈

Threat Intelligence

TI feed integration, IOCs and alert enrichment

Compliance

CIS Benchmarks, PCI-DSS, GDPR and audit reporting

Course Structure

# Module Hours
01 What is a SIEM? 3h
02 Wazuh Basics 4h
03 Deploying a Wazuh Agent 3h
04 Intrusion Detection (IDS) with Wazuh 3h
05 What is a SOAR? 3h
06 Incident Response 3h
07 Threat Intelligence & Analysis 3h
08 Compliance Management 3h
09 Vulnerability Detection & Assessment 3h
TOTAL 28h

Target Audience

👤

SOC Analysts

Operating or planning to operate a SIEM daily

Security Engineers

Responsible for SIEM deployment and tuning

📈

IT Managers

Evaluating open-source SIEM solutions

Prerequisites

  • Basic networking and security knowledge
  • Familiarity with Linux (command line)
  • Basic understanding of log management and monitoring
HCKR

Introdução ao Bash

Do Básico ao Avançado — Com Exemplos Práticos e Laboratórios de Cibersegurança

46h
Duração
15
Módulos
29
Lições
4
Projectos Finais

Sobre o Curso

Curso completo de Bash scripting organizado em 15 módulos progressivos, desde os conceitos fundamentais até projectos práticos complexos, com ênfase especial em aplicações de cibersegurança.

Os participantes dominarão a linha de comando Linux, automação de tarefas, processamento de texto com regex/grep/sed/AWK, gestão de processos, networking e scripting para segurança ofensiva e defensiva.

O que Vai Aprender

💻

Terminal & FHS

Navegação, ficheiros, permissões, links e wildcards

Pipes & Filtros

Redirecionamento, pipelines, sort, uniq, cut, tr e xargs

🔎

Regex, Grep & Sed

Expressões regulares, pesquisa avançada e transformação de texto

📈

AWK

Processamento avançado de dados, relatórios e análise de logs

🔒

Scripting Seguro

Debug, error handling, set -euo pipefail e ShellCheck

💥

Cibersegurança

Auditoria, brute-force detection, hardening e resposta a incidentes

Estrutura do Curso

# Módulo Horas
01 Introdução ao Bash e Ambiente Linux 3h
02 Comandos Essenciais e Manipulação de Ficheiros 4h
03 Redirecionamento, Pipes e Filtros 3h
04 Variáveis, Tipos de Dados e Expansões 3h
05 Estruturas de Controlo 3h
06 Funções e Modularidade 3h
07 Expressões Regulares, Grep e Sed 4h
08 AWK — Processamento Avançado 3h
09 Tratamento de Argumentos e Input 2h
10 Gestão de Processos e Sinais 3h
11 Debug, Erros e Boas Práticas 2h
12 Automação com Cron e Systemd 2h
13 Networking e Comunicação 3h
14 Scripting para Cibersegurança 4h
15 Projectos Práticos e Integração 4h
TOTAL 46h

Destinatários

💻

Administradores de Sistemas

Que pretendam automatizar tarefas e gerir servidores Linux

🔒

Analistas de Cibersegurança

Que usam a CLI para análise, auditoria e resposta a incidentes

👤

Estudantes e Profissionais de TI

Que queiram dominar a linha de comando Linux

Pré-Requisitos

  • Conhecimentos básicos de informática
  • Acesso a um sistema Linux (VM, WSL2 ou nativo)
  • Motivação para aprender e praticar regularmente
HCKR

Know Metasploit

Master the World's Most Used Penetration Testing Framework

43h
Duration
16
Modules
37
Lessons
16
Hands-On Labs

About This Course

The most comprehensive training on the Metasploit Framework — from installation and MSFconsole mastery to custom module development in Ruby, automation with resource scripts, and advanced evasion techniques.

With 16 modules, 37 lessons and hands-on labs in every module, this course covers the complete Metasploit ecosystem: 4000+ exploits, msfvenom payload generation, Meterpreter deep dive, post-exploitation, privilege escalation, pivoting, client-side attacks, AV evasion, and Python/Ruby API integration for automated security operations.

What You Will Learn

💻

MSFconsole & Database

Master navigation, search, workspaces, db_nmap integration and session management

💥

Exploitation & Payloads

4000+ exploits, msfvenom for all platforms, staged/stageless, bind/reverse, encoders

🔒

Meterpreter & Post-Exploit

Credentials (hashdump, kiwi), persistence, privilege escalation, token manipulation

🚀

Pivoting & Lateral Movement

Autoroute, port forwarding, SOCKS proxy, PsExec, Pass-the-Hash, double pivot

🛠

Evasion & Stealth

AV evasion, encoders, custom templates, HTTPS transport, process migration, cleanup

Automation & Development

Resource scripts, Ruby custom modules, IRB scripting, RPC API, Python integration

Course Structure

# Module Hours
01 Introduction & Architecture 2h
02 Lab Environment Setup 2h
03 MSFconsole Mastery 3h
04 Information Gathering 3h
05 Vulnerability Scanning 2h
06 Exploitation Fundamentals 3h
07 Payload Generation (msfvenom) 3h
08 Meterpreter Deep Dive 3h
09 Post-Exploitation 3h
10 Privilege Escalation 3h
11 Pivoting & Lateral Movement 3h
12 Web Application Exploitation 2h
13 Client-Side & Social Engineering 2h
14 Evasion Techniques 2h
15 Automation & Custom Development 4h
16 Advanced Scenarios & Final Project 3h
TOTAL 43h

Target Audience

🔒

Penetration Testers

Who want to master the primary tool of the trade

🔴

Red Team Operators

Seeking advanced automation and custom module development

👤

Security Engineers

Integrating Metasploit into security testing pipelines and SOC workflows

Prerequisites

  • Solid understanding of TCP/IP networking and protocols
  • Linux command line proficiency (Bash)
  • Basic information security knowledge
  • Python basics (recommended for automation module)
  • Ruby basics (introduced in custom module development)

Certification

This course provides deep Metasploit expertise essential for OSCP (Offensive Security), eJPT (INE), CompTIA PenTest+ and CEH certifications.

HCKR

Intro to Cortex XSOAR

Security Orchestration, Automation & Response — From Fundamentals to Advanced

42h
Duration
15
Modules
35
Lessons
3
Final Projects

About This Course

This comprehensive training on Palo Alto Networks Cortex XSOAR (formerly Demisto) empowers security professionals to automate, orchestrate and accelerate security operations with the market-leading SOAR platform.

The course covers XSOAR 8.x (cloud-native) and includes an introduction to Cortex AgentiX, the next-generation agentic AI evolution launched in October 2025.

What You Will Learn

Incident Management

Full lifecycle: triage, investigation, containment, remediation and closure

Automated Playbooks

Design and deploy automated responses with the visual editor. Loops, error handling and sub-playbooks

💻

Python Automation

Develop custom scripts and integrations with CommonServerPython, Docker and demisto-sdk

🔎

Threat Intelligence

Integrate and enrich TI from multiple sources. Feeds, indicators, reputation scoring and TI workflows

🌐

Integrations & Marketplace

Configure 850+ integrations: SIEM, EDR, email, ticketing, firewall, sandbox and cloud

📈

Dashboards & Reporting

Build SOC dashboards with KPIs (MTTR, SLA), automated reports and performance metrics

Course Structure

# Module Hours
01 Introduction to SOAR & Cortex XSOAR 2h
02 Platform Navigation 2h
03 Integrations 4h
04 Incident Management 3h
05 Playbooks — Fundamentals 4h
06 Playbooks — Advanced 3h
07 Automation & Scripting (Python) 4h
08 Indicators & Threat Intelligence 3h
09 War Room & Collaboration 2h
10 Dashboards & Reporting 2h
11 Content Packs & Marketplace 2h
12 Advanced Administration 3h
13 Real-World Use Cases 3h
14 XSOAR in the Palo Alto Ecosystem 2h
15 Final Projects 3h
TOTAL 42h

Target Audience

👤

SOC Analysts

Tier 1-3 looking to automate triage and incident response

Security Engineers

Integrating and automating security tools in the SOC

📈

SOC Managers

Optimising operations with metrics, dashboards and automation

Prerequisites

  • Basic networking and information security knowledge
  • Familiarity with SOC concepts (incidents, triage, SIEM)
  • Basic Python (recommended for the scripting module)
  • Access to an XSOAR environment (provided or trial)

Certification

This course prepares for the Palo Alto Networks XSOAR Engineer certification (specialist level). Path: Cybersecurity Practitioner → Security Operations Professional → XSOAR Engineer.

HCKR

Wireless Security Fundamentals

From 802.11 Basics to Advanced Wireless Attacks

28h
Duration
7
Modules
14
Lessons
5
Attack Types

About This Course

Comprehensive training on wireless security, from 802.11 fundamentals to advanced attacks on WPA3, Bluetooth, RFID and NFC.

Participants will learn to identify wireless vulnerabilities, execute attacks in controlled environments and implement effective countermeasures.

What You Will Learn

📡

802.11 Fundamentals

Standards, frequencies, channels, frames and wireless protocols

🔒

WEP/WPA/WPA2 Attacks

Cracking, deauthentication, handshake capture and dictionary attacks

🛡

WPA3 & Advanced

Dragonfly handshake, downgrade attacks and side-channel analysis

👤

Client-Side Attacks

Evil twin, karma attacks, rogue AP and captive portal

🔌

Bluetooth Security

Bluejacking, bluesnarfing, BLE exploitation and KNOB attack

💳

RFID & NFC

Cloning, relay attacks, skimming and Proxmark3

Course Structure

# Module Hours
01 Wireless Fundamentals 4h
02 WEP Attacks 4h
03 WPA/WPA2 Attacks 4h
04 WPA3 & Advanced Attacks 4h
05 Wireless Client Attacks 4h
06 Bluetooth Security & Attacks 4h
07 RFID & NFC Security 4h
TOTAL 28h

Target Audience

👤

Pentesters

Specialising in wireless security assessment

Network Engineers

Responsible for wireless infrastructure security

🔎

Security Auditors

Assessing wireless security posture of organisations

Prerequisites

  • Basic networking knowledge (TCP/IP, DNS, DHCP)
  • Familiarity with Linux (command line)
  • Wireless adapter compatible with monitor mode (recommended)
HCKR

Open Source Intelligence (OSINT)

Master the Art of Gathering and Analysing Publicly Available Information

20h
Duration
6
Modules
Hands-On
🔎
OSINT Tools

About This Course

Practical training in OSINT (Open Source Intelligence) — the art of collecting, processing and analysing publicly available information to produce actionable intelligence.

Participants will learn advanced search techniques, reconnaissance tools, social media analysis, infrastructure enumeration and data collection for security investigations.

What You Will Learn

🔎

Advanced Search

Google Dorking, Shodan, Censys and specialised search engines

👥

People & Identities

Sherlock, HIBP, social media and metadata analysis

💻

Infrastructure

DNS, WHOIS, subdomains, SSL certificates and ASN mapping

🌐

Web Intelligence

Wayback Machine, cache, dark web and paste sites

📈

Analysis & Reporting

Maltego, link analysis, timeline and OSINT reports

Legal & Ethics

GDPR, legal boundaries and responsible disclosure

Course Structure

# Module Hours
01 Introduction to OSINT 3h
02 Search Engine Intelligence 3h
03 People & Social Media OSINT 4h
04 Infrastructure & Technical OSINT 4h
05 Dark Web & Specialised Sources 3h
06 Analysis, Reporting & Legal 3h
TOTAL 20h

Target Audience

🔎

Security Researchers

Investigating threats and malicious actors

👤

Pentesters

Reconnaissance phase of penetration testing

Investigators

Fraud analysis, compliance and due diligence

Prerequisites

  • Basic Internet and web browsing knowledge
  • Familiarity with security concepts (recommended)
  • Social media accounts for practical exercises
HCKR

Secure Software Development Life Cycle

Build Security into Every Phase of Software Development

24h
Duration
8
Modules
13
Lessons
5
Code Languages

About This Course

This comprehensive training on the Secure Software Development Life Cycle (S-SDLC) teaches how to integrate security into every phase of development — from design to deployment.

Participants will learn to apply threat modeling, secure coding practices, OWASP Top 10, security testing (SAST/DAST/SCA) and DevSecOps, with practical examples in Python, Java, JavaScript, C# and Go.

What You Will Learn

🔒

Secure Design

Threat modeling with STRIDE, security requirements and privacy by design

💻

OWASP Top 10

The 10 most critical web vulnerabilities with examples in 5 languages

Security Testing

SAST, DAST and SCA integrated into the CI/CD pipeline

🚀

DevSecOps

Security automation in pipelines with open-source tools

Compliance

GDPR, NIS2, ISO 27001 and Portuguese regulations

📄

Supply Chain

Dependency security, SBOM and software integrity

Course Structure

# Module Hours
01 Introduction to Secure SDLC 3h
02 Security Requirements & Threat Modeling 3h
03 Secure Design Practices 3h
04 OWASP Top 10 Part 1 (A01-A05) 3h
05 OWASP Top 10 Part 2 (A06-A10) & Secure Coding 3h
06 Security Testing (SAST/DAST/SCA) 3h
07 DevSecOps & Supply Chain Security 3h
08 Compliance & Incident Response 3h
TOTAL 24h

Target Audience

💻

Developers

Who want to write secure code from the start

Security Engineers

Who integrate security into the development pipeline

📈

Tech Leads / Architects

Responsible for secure design decisions

Prerequisites

  • Experience in software development (any language)
  • Basic information security knowledge
  • Familiarity with web concepts (HTTP, APIs, databases)
HCKR

Análise de Malware

Laboratório e Técnicas de Investigação

24h
Duração
7
Módulos
13
Lições
1
Laboratório Completo

Sobre o Curso

Formação prática em Análise de Malware focada na construção de um laboratório seguro e na aplicação de técnicas de investigação para analisar amostras maliciosas.

Os participantes aprenderão a configurar um ambiente isolado com máquinas virtuais e OPNsense, capturar e analisar tráfego de rede, e utilizar ferramentas de análise estática e dinâmica para dissecar malware de forma segura.

O que Vai Aprender

💻

Laboratório Seguro

Arquitectura isolada com VMs, snapshots e segmentação de rede

OPNsense

Firewall/router virtual para controlo e captura de tráfego

🔎

Análise de Tráfego

Wireshark, tcpdump e análise de comunicações C2

🔒

Ferramentas de Análise

Análise estática (strings, PE headers) e dinâmica (sandbox)

Segurança

Procedimentos de emergência, contenção e boas práticas

📄

Documentação

IOCs, relatórios de análise e partilha de intelligence

Estrutura do Curso

# Módulo Horas
01 Introdução à Análise de Malware 3h
02 Arquitectura do Laboratório 3h
03 Configuração do Ambiente Virtual 4h
04 Configuração do OPNsense 4h
05 Captura e Análise de Tráfego 4h
06 Ferramentas e Procedimento de Análise 4h
07 Segurança, Emergência e Boas Práticas 2h
TOTAL 24h

Destinatários

🔎

Malware Analysts

Que pretendam iniciar ou aprofundar competências de análise

🔒

SOC Analysts

Que lidam com alertas de malware e precisam de investigar

Incident Responders

Que analisam artefactos durante resposta a incidentes

Pré-Requisitos

  • Conhecimentos de redes TCP/IP
  • Familiaridade com Linux e Windows
  • Computador com 16GB+ RAM (para executar VMs)
  • Noções básicas de virtualização (VirtualBox ou VMware)
HCKR

Hardcore NMAP

Dominar o Network Mapper do Fundamento ao Desenvolvimento de Scripts NSE

68h
Duração Total
17
Módulos
134
Tópicos
17
Labs Práticos

Sobre o Curso

A formação mais completa e aprofundada sobre o Nmap — a ferramenta de network scanning mais utilizada no mundo. Do fundamento ao desenvolvimento de scripts NSE em Lua, passando por todas as técnicas de scanning, evasão, detecção de serviços e integração com ferramentas profissionais.

Com 17 módulos, 134 tópicos e 17 laboratórios práticos, este curso cobre em profundidade: host discovery, port scanning (12 técnicas diferentes), service/OS detection, firewall evasion, o Nmap Scripting Engine (NSE) incluindo desenvolvimento de scripts personalizados em Lua, ferramentas complementares (Ncat, Socat, Nping, Ndiff, Zenmap) e cenários avançados em IPv6, cloud, IoT e ambientes industriais.

O que Vai Aprender

🔎

Host Discovery

ARP, ICMP, TCP, SCTP e IP Protocol Ping. Combinação de técnicas e análise com --packet-trace e Wireshark.

💻

Port Scanning (12 técnicas)

SYN, Connect, UDP, FIN, NULL, Xmas, ACK, Window, Maimon, SCTP, Idle Scan e Custom TCP Scan.

Service & OS Detection

Version probing, intensity levels, banner grabbing, SSL/TLS enumeration e TCP/IP stack fingerprinting.

🔒

Firewall Evasion & IDS Bypass

Fragmentação, decoys, source port, IP/MAC spoofing, TTL manipulation, proxychains, timing e IPv6.

🛠

NSE & Lua Scripting

4 módulos dedicados: scripts essenciais, desenvolvimento em Lua, threading, brute force framework e vulnerability reporting.

🚀

Ferramentas & Integração

Ncat, Socat, Nping, Ndiff, Zenmap. Integração com Metasploit, ELK Stack, SIEM e CI/CD pipelines.

Estrutura do Curso

# Módulo Tópicos Horas
01 Introdução e Fundamentos do Nmap 7 4h
02 Descoberta de Hosts (Host Discovery) 9 4h
03 Técnicas de Port Scanning 17 6h
04 Detecção de Serviços e Versões 8 4h
05 Detecção de Sistema Operativo 8 4h
06 Output, Logging e Reporting 6 3h
07 Firewall Evasion e IDS/IPS Bypass 13 5h
08 NSE — Fundamentos 7 4h
09 NSE — Categorias e Scripts Essenciais 9 4h
10 Desenvolvimento NSE Parte 1 (Lua) 5 4h
11 Desenvolvimento NSE Parte 2 (Avançado) 7 5h
12 Ncat — O Canivete Suíço de Rede 11 4h
13 Socat — Relay e Tunneling Avançado 8 4h
14 Nping, Ndiff, Zenmap e Complementares 5 3h
15 Automação e Integração com Nmap 7 4h
16 Cenários Avançados e Casos Reais 6 3h
17 Projecto Final: Auditoria Completa de Rede 1 3h
TOTAL 134 68h

Destinatários

🔒

Pentesters

Que pretendam dominar a ferramenta #1 de network reconnaissance

Network Engineers

Que auditam e monitorizam infraestrutura de rede

📈

SOC Analysts

Que usam Nmap para detecção de vulnerabilidades e asset discovery

Pré-Requisitos

  • Conhecimentos sólidos de redes TCP/IP (modelo OSI, protocolos, portas)
  • Familiaridade com Linux (linha de comando)
  • Noções básicas de segurança da informação
  • Python básico (recomendado para o módulo de automação)
  • Lua (introduzido no curso para desenvolvimento NSE)

Certificação

Este curso fornece uma base sólida para certificações que incluem scanning e enumeration como componente principal: OSCP (Offensive Security), CompTIA PenTest+, CEH e eJPT.

HCKR

Operational Security (OPSEC) 101

Protecting Critical Information in the Digital Age

20h
Duration
7
Modules
20
Lessons
🔒
OPSEC Skills

About This Course

Comprehensive training in Operational Security (OPSEC) — the process of protecting critical information against adversaries, from the four pillars of security to advanced counter-surveillance techniques.

Participants will learn to identify critical information, analyse threats, assess vulnerabilities and apply effective countermeasures to protect personal and organisational operations.

What You Will Learn

🔒

Four Pillars

Confidentiality, integrity, availability and authenticity

👤

Identity & Access

IAM, MFA, least privilege and identity management

💥

Breach Awareness

Recognise, respond to and recover from data breaches

📡

Secure Comms

Encryption, VPNs, secure messaging and email security

🔎

Digital Footprint

Minimise online exposure, metadata and tracking

💻

Physical & Deception

Physical security, device hardening and honeypots

Course Structure

# Module Hours
01 The Four Pillars of Security 3h
02 Identity & Access Management 3h
03 Data Exposure & Breach Awareness 3h
04 Secure Communications & Infrastructure 3h
05 Digital Footprint & Exposure Control 3h
06 Physical Security & Device Hardening 3h
07 Deception, Disinformation & Honeypots 2h
TOTAL 20h

Target Audience

🔒

Security Professionals

Protecting operations and critical information

👤

Privacy-Conscious Users

Minimising their digital footprint

IT Administrators

Responsible for organisational security policies

Prerequisites

  • Basic computer and Internet knowledge
  • Interest in privacy and personal security
HCKR

Offensive Penetration Testing Services

Formação Profissional em Segurança Ofensiva — Do Pre-Engagement ao Relatório Final

96h
Duração
11
Módulos
74
Lições
3
CTF Challenges

Sobre o Curso

Formação profissional completa em Penetration Testing Ofensivo, cobrindo todo o ciclo de um engagement — desde o pre-engagement e enquadramento legal até à exploração, pós-exploração e relatório final.

Os participantes aprenderão a executar pentests profissionais seguindo metodologias reconhecidas (PTES, OWASP, MITRE ATT&CK), com 74 lições detalhadas, exemplos práticos e exercícios hands-on em ambientes controlados.

O que Vai Aprender

Pre-Engagement

Rules of Engagement, scope, legal (Lei 109/2009), NDAs e SoW

🔎

OSINT & Recon

Intelligence gathering, sock puppets, Google Dorking e Shodan

💻

Scanning & Enumeration

Nmap, Masscan, Nessus, OpenVAS e service enumeration

💥

Exploitation

SQLi, XSS, RCE, Metasploit, buffer overflow e web attacks

🔒

Post-Exploitation

Persistence, privilege escalation, lateral movement e exfiltration

📄

Reporting

Relatório profissional, CVSS, MITRE mapping e debrief

Estrutura do Curso

# Módulo Horas
01 Pre-Engagement e Enquadramento Legal 8h
02 Sock Puppets e Identidade Operacional 4h
03 Recolha de Informação e OSINT 10h
04 Threat Modeling 4h
05 Scanning e Enumeração de Serviços 8h
06 Vulnerability Analysis 8h
07 Exploitation 12h
08 Network Exploitation 10h
09 Post-Exploitation 8h
10 C2 Frameworks 4h
11 Reporting e Exercício Final 12h
TOTAL 88h

Destinatários

👤

Pentesters

Profissionais ou aspirantes a penetration testers

🔒

Security Analysts

SOC analysts que pretendam transitar para offensive security

Red Team Operators

Que procuram uma base sólida e metodológica

Pré-Requisitos

  • Conhecimentos de redes TCP/IP e protocolos
  • Familiaridade com Linux e Windows
  • Noções básicas de segurança da informação
  • Python básico (recomendado para módulos de scripting)

Certificação

Este curso prepara para certificações como OSCP (Offensive Security), eJPT (INE) e CompTIA PenTest+.