Site announcements

There are no discussion topics yet in this forum.

Available courses

This is not a training it is just a place holder to gather some important information related with AI, agents and workers. 

Things that while I am improving my knowledge I find it important and I will need to go a bit deeper and share with others challenges, knowledge and interesting information. 

The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.

Starting with Framework essentials you’ll progress to advanced methodologies aligned with the Penetration Test Execution Standard (PTES). 

HCKR

Security Awareness for Users

Practical Cybersecurity for Everyone

A comprehensive security awareness training programme designed for all users. Learn to recognise phishing attacks, create strong passwords, protect sensitive data, use public Wi-Fi safely, identify social engineering tactics, and respond to security incidents. Practical, scenario-based learning that builds a security-first mindset.

🔒
Practical
🎓
Certificate

This comprehensive training on Palo Alto Networks Cortex XSOAR (formerly Demisto) will empower security professionals to automate, orchestrate, and accelerate security operations like never before.

XSOAR is a powerful security orchestration, automation, and response (SOAR) platform that integrates disparate security tools, streamlines workflows, and provides real-time incident response capabilities to enhance the efficiency and effectiveness of security teams.

Throughout this course, participants will dive deep into XSOAR’s core functionalities, learning how to automate repetitive tasks, build playbooks, and orchestrate cross-platform workflows to speed up incident detection and resolution.

The training will cover key features, including:

  • Incident Management: Streamlining investigation and remediation of security incidents across the entire lifecycle.
  • Automated Playbooks: Designing and deploying automated responses for common and complex security tasks, reducing response times and human error.
  • Threat Intelligence Integration: Using XSOAR to seamlessly integrate and enrich threat intelligence from multiple sources to enhance decision-making.
  • Collaboration & Communication: Using XSOAR’s collaboration features to enhance communication within security teams and with external stakeholders during incidents.
  • Reporting and Dashboards: Creating insightful reports and dashboards to monitor security performance and improve response capabilities.

This course is ideal for SOC analysts, security engineers, and anyone looking to maximize their use of Cortex XSOAR to streamline security operations.

By the end of the training, participants will have the knowledge and hands-on experience to configure and customize XSOAR to meet the specific needs of their organization’s security operations, driving efficiency and improving threat response capabilities.

HCKR

Wireless Security Fundamentals

From 802.11 Basics to Advanced Wireless Attacks

Understand the foundations of wireless networking and security. This course covers 802.11 fundamentals, WEP/WPA/WPA2/WPA3 attacks, client-side wireless attacks, Bluetooth exploitation, and RFID/NFC security. Learn to identify vulnerabilities in wireless infrastructure and apply defensive countermeasures.

7
Modules
📡
Hands-on
🎓
Certificate
  • Understand the fundamentals of OSINT.

  • Learn legal and ethical considerations.

  • Master the use of OSINT tools and frameworks.

  • Apply OSINT techniques in real-world scenarios.

HCKR

Análise de Malware

Laboratório e Técnicas de Investigação

Aprende a construir um laboratório completamente isolado para analisar malware real. Este curso cobre os fundamentos da análise de malware, arquitectura de laboratório com VMware e OPNsense, configuração de DNS logging, proxy SSL com Squid, Suricata IDS, captura e análise de tráfego C2, identificação de IOCs, e procedimentos de análise dinâmica com Flare-VM. Inclui narração áudio profissional e exemplos de casos reais como WannaCry, SUNBURST, Emotet e APT29.

8
Tópicos
13
Lições
305
Perguntas
🎧
Áudio
HCKR

Operational Security (OPSEC) 101

Protecting Critical Information in the Digital Age

Master the fundamentals of operational security — protect your identity, communications, and digital footprint. This course covers the 4 SECs framework (OPSEC, COMSEC, INFOSEC, PERSEC), identity management with sock puppets and password managers, data breach awareness, secure communications (VPNs, Signal, PGP), digital footprint control, physical security, and deception techniques.

8
Topics
16
Lessons
280
Questions
🎓
Certificate

In this dynamic and engaging offensive security training course, participants will gain the critical skills and knowledge needed to identify, exploit, and defend against cybersecurity threats.

From vulnerability assessments to penetration testing, we will dive deep into the tools, methodologies, and best practices used by industry experts to simulate real-world cyberattacks.

Throughout this hands-on training, students will learn how to think like an attacker, utilizing ethical hacking techniques to uncover weaknesses in networks, systems, and applications.

They'll gain proficiency in reconnaissance, exploitation, post-exploitation, and reporting, while also learning how to leverage tools like Metasploit, Nmap, and more.

This course is designed for professionals eager to sharpen their offensive security skills and stay ahead of evolving cyber threats.

With real-world case studies, practical exercises, and live demonstrations, students will leave equipped with the expertise to take on the challenges of modern cybersecurity defense.

By the end of the course, participants will have a comprehensive understanding of offensive security tactics and techniques, and the ability to apply them to bolster security measures in their own organizations or personal projects.