tgerqewr
- Teacher: Hugo Rodrigues
tgerqewr
Security Information and Event Management with Wazuh
Practical training on SIEM and SOAR focused on the open-source platform Wazuh. Participants will learn to deploy, configure and operate a SIEM for threat detection, incident response and compliance.
The course covers SIEM/SOAR fundamentals through to advanced agent configuration, intrusion detection rules, threat intelligence, vulnerability management and compliance management.
What is a SIEM, architecture, log collection and event correlation
Installation, configuration, dashboards and agent management
IDS rules, anomaly detection and real-time alerting
Automated incident response with playbooks and workflows
TI feed integration, IOCs and alert enrichment
CIS Benchmarks, PCI-DSS, GDPR and audit reporting
Operating or planning to operate a SIEM daily
Responsible for SIEM deployment and tuning
Evaluating open-source SIEM solutions

Do Básico ao Avançado — Com Exemplos Práticos e Laboratórios de Cibersegurança
Curso completo de Bash scripting organizado em 15 módulos progressivos, desde os conceitos fundamentais até projectos práticos complexos, com ênfase especial em aplicações de cibersegurança.
Os participantes dominarão a linha de comando Linux, automação de tarefas, processamento de texto com regex/grep/sed/AWK, gestão de processos, networking e scripting para segurança ofensiva e defensiva.
Navegação, ficheiros, permissões, links e wildcards
Redirecionamento, pipelines, sort, uniq, cut, tr e xargs
Expressões regulares, pesquisa avançada e transformação de texto
Processamento avançado de dados, relatórios e análise de logs
Debug, error handling, set -euo pipefail e ShellCheck
Auditoria, brute-force detection, hardening e resposta a incidentes
Que pretendam automatizar tarefas e gerir servidores Linux
Que usam a CLI para análise, auditoria e resposta a incidentes
Que queiram dominar a linha de comando Linux
Master the World's Most Used Penetration Testing Framework
The most comprehensive training on the Metasploit Framework — from installation and MSFconsole mastery to custom module development in Ruby, automation with resource scripts, and advanced evasion techniques.
With 16 modules, 37 lessons and hands-on labs in every module, this course covers the complete Metasploit ecosystem: 4000+ exploits, msfvenom payload generation, Meterpreter deep dive, post-exploitation, privilege escalation, pivoting, client-side attacks, AV evasion, and Python/Ruby API integration for automated security operations.
Master navigation, search, workspaces, db_nmap integration and session management
4000+ exploits, msfvenom for all platforms, staged/stageless, bind/reverse, encoders
Credentials (hashdump, kiwi), persistence, privilege escalation, token manipulation
Autoroute, port forwarding, SOCKS proxy, PsExec, Pass-the-Hash, double pivot
AV evasion, encoders, custom templates, HTTPS transport, process migration, cleanup
Resource scripts, Ruby custom modules, IRB scripting, RPC API, Python integration
Who want to master the primary tool of the trade
Seeking advanced automation and custom module development
Integrating Metasploit into security testing pipelines and SOC workflows
This course provides deep Metasploit expertise essential for OSCP (Offensive Security), eJPT (INE), CompTIA PenTest+ and CEH certifications.

Security Orchestration, Automation & Response — From Fundamentals to Advanced
This comprehensive training on Palo Alto Networks Cortex XSOAR (formerly Demisto) empowers security professionals to automate, orchestrate and accelerate security operations with the market-leading SOAR platform.
The course covers XSOAR 8.x (cloud-native) and includes an introduction to Cortex AgentiX, the next-generation agentic AI evolution launched in October 2025.
Full lifecycle: triage, investigation, containment, remediation and closure
Design and deploy automated responses with the visual editor. Loops, error handling and sub-playbooks
Develop custom scripts and integrations with CommonServerPython, Docker and demisto-sdk
Integrate and enrich TI from multiple sources. Feeds, indicators, reputation scoring and TI workflows
Configure 850+ integrations: SIEM, EDR, email, ticketing, firewall, sandbox and cloud
Build SOC dashboards with KPIs (MTTR, SLA), automated reports and performance metrics
Tier 1-3 looking to automate triage and incident response
Integrating and automating security tools in the SOC
Optimising operations with metrics, dashboards and automation
This course prepares for the Palo Alto Networks XSOAR Engineer certification (specialist level). Path: Cybersecurity Practitioner → Security Operations Professional → XSOAR Engineer.

From 802.11 Basics to Advanced Wireless Attacks
Comprehensive training on wireless security, from 802.11 fundamentals to advanced attacks on WPA3, Bluetooth, RFID and NFC.
Participants will learn to identify wireless vulnerabilities, execute attacks in controlled environments and implement effective countermeasures.
Standards, frequencies, channels, frames and wireless protocols
Cracking, deauthentication, handshake capture and dictionary attacks
Dragonfly handshake, downgrade attacks and side-channel analysis
Evil twin, karma attacks, rogue AP and captive portal
Bluejacking, bluesnarfing, BLE exploitation and KNOB attack
Cloning, relay attacks, skimming and Proxmark3
Specialising in wireless security assessment
Responsible for wireless infrastructure security
Assessing wireless security posture of organisations

Master the Art of Gathering and Analysing Publicly Available Information
Practical training in OSINT (Open Source Intelligence) — the art of collecting, processing and analysing publicly available information to produce actionable intelligence.
Participants will learn advanced search techniques, reconnaissance tools, social media analysis, infrastructure enumeration and data collection for security investigations.
Google Dorking, Shodan, Censys and specialised search engines
Sherlock, HIBP, social media and metadata analysis
DNS, WHOIS, subdomains, SSL certificates and ASN mapping
Wayback Machine, cache, dark web and paste sites
Maltego, link analysis, timeline and OSINT reports
GDPR, legal boundaries and responsible disclosure
Investigating threats and malicious actors
Reconnaissance phase of penetration testing
Fraud analysis, compliance and due diligence

Build Security into Every Phase of Software Development
This comprehensive training on the Secure Software Development Life Cycle (S-SDLC) teaches how to integrate security into every phase of development — from design to deployment.
Participants will learn to apply threat modeling, secure coding practices, OWASP Top 10, security testing (SAST/DAST/SCA) and DevSecOps, with practical examples in Python, Java, JavaScript, C# and Go.
Threat modeling with STRIDE, security requirements and privacy by design
The 10 most critical web vulnerabilities with examples in 5 languages
SAST, DAST and SCA integrated into the CI/CD pipeline
Security automation in pipelines with open-source tools
GDPR, NIS2, ISO 27001 and Portuguese regulations
Dependency security, SBOM and software integrity
Who want to write secure code from the start
Who integrate security into the development pipeline
Responsible for secure design decisions
Laboratório e Técnicas de Investigação
Formação prática em Análise de Malware focada na construção de um laboratório seguro e na aplicação de técnicas de investigação para analisar amostras maliciosas.
Os participantes aprenderão a configurar um ambiente isolado com máquinas virtuais e OPNsense, capturar e analisar tráfego de rede, e utilizar ferramentas de análise estática e dinâmica para dissecar malware de forma segura.
Arquitectura isolada com VMs, snapshots e segmentação de rede
Firewall/router virtual para controlo e captura de tráfego
Wireshark, tcpdump e análise de comunicações C2
Análise estática (strings, PE headers) e dinâmica (sandbox)
Procedimentos de emergência, contenção e boas práticas
IOCs, relatórios de análise e partilha de intelligence
Que pretendam iniciar ou aprofundar competências de análise
Que lidam com alertas de malware e precisam de investigar
Que analisam artefactos durante resposta a incidentes
Dominar o Network Mapper do Fundamento ao Desenvolvimento de Scripts NSE
A formação mais completa e aprofundada sobre o Nmap — a ferramenta de network scanning mais utilizada no mundo. Do fundamento ao desenvolvimento de scripts NSE em Lua, passando por todas as técnicas de scanning, evasão, detecção de serviços e integração com ferramentas profissionais.
Com 17 módulos, 134 tópicos e 17 laboratórios práticos, este curso cobre em profundidade: host discovery, port scanning (12 técnicas diferentes), service/OS detection, firewall evasion, o Nmap Scripting Engine (NSE) incluindo desenvolvimento de scripts personalizados em Lua, ferramentas complementares (Ncat, Socat, Nping, Ndiff, Zenmap) e cenários avançados em IPv6, cloud, IoT e ambientes industriais.
ARP, ICMP, TCP, SCTP e IP Protocol Ping. Combinação de técnicas e análise com --packet-trace e Wireshark.
SYN, Connect, UDP, FIN, NULL, Xmas, ACK, Window, Maimon, SCTP, Idle Scan e Custom TCP Scan.
Version probing, intensity levels, banner grabbing, SSL/TLS enumeration e TCP/IP stack fingerprinting.
Fragmentação, decoys, source port, IP/MAC spoofing, TTL manipulation, proxychains, timing e IPv6.
4 módulos dedicados: scripts essenciais, desenvolvimento em Lua, threading, brute force framework e vulnerability reporting.
Ncat, Socat, Nping, Ndiff, Zenmap. Integração com Metasploit, ELK Stack, SIEM e CI/CD pipelines.
Que pretendam dominar a ferramenta #1 de network reconnaissance
Que auditam e monitorizam infraestrutura de rede
Que usam Nmap para detecção de vulnerabilidades e asset discovery
Este curso fornece uma base sólida para certificações que incluem scanning e enumeration como componente principal: OSCP (Offensive Security), CompTIA PenTest+, CEH e eJPT.

Protecting Critical Information in the Digital Age
Comprehensive training in Operational Security (OPSEC) — the process of protecting critical information against adversaries, from the four pillars of security to advanced counter-surveillance techniques.
Participants will learn to identify critical information, analyse threats, assess vulnerabilities and apply effective countermeasures to protect personal and organisational operations.
Confidentiality, integrity, availability and authenticity
IAM, MFA, least privilege and identity management
Recognise, respond to and recover from data breaches
Encryption, VPNs, secure messaging and email security
Minimise online exposure, metadata and tracking
Physical security, device hardening and honeypots
Protecting operations and critical information
Minimising their digital footprint
Responsible for organisational security policies

Formação Profissional em Segurança Ofensiva — Do Pre-Engagement ao Relatório Final
Formação profissional completa em Penetration Testing Ofensivo, cobrindo todo o ciclo de um engagement — desde o pre-engagement e enquadramento legal até à exploração, pós-exploração e relatório final.
Os participantes aprenderão a executar pentests profissionais seguindo metodologias reconhecidas (PTES, OWASP, MITRE ATT&CK), com 74 lições detalhadas, exemplos práticos e exercícios hands-on em ambientes controlados.
Rules of Engagement, scope, legal (Lei 109/2009), NDAs e SoW
Intelligence gathering, sock puppets, Google Dorking e Shodan
Nmap, Masscan, Nessus, OpenVAS e service enumeration
SQLi, XSS, RCE, Metasploit, buffer overflow e web attacks
Relatório profissional, CVSS, MITRE mapping e debrief
Profissionais ou aspirantes a penetration testers
SOC analysts que pretendam transitar para offensive security
Que procuram uma base sólida e metodológica
Este curso prepara para certificações como OSCP (Offensive Security), eJPT (INE) e CompTIA PenTest+.