- Professor: Hugo Rodrigues
e-learning.hckr.pt
Site announcements
Ignorar disciplinas disponíveis
Disciplinas disponíveis
- Professor: Hugo Rodrigues

- Professor: Hugo Rodrigues
- Professor: Hugo Rodrigues
The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless.
Starting with Framework essentials you’ll progress to advanced methodologies aligned with the Penetration Test Execution Standard (PTES).
- Professor: Hugo Rodrigues

- Professor: Hugo Rodrigues

This comprehensive training on Palo Alto Networks Cortex XSOAR (formerly Demisto) will empower security professionals to automate, orchestrate, and accelerate security operations like never before.
XSOAR is a powerful security orchestration, automation, and response (SOAR) platform that integrates disparate security tools, streamlines workflows, and provides real-time incident response capabilities to enhance the efficiency and effectiveness of security teams.
Throughout this course, participants will dive deep into XSOAR’s core functionalities, learning how to automate repetitive tasks, build playbooks, and orchestrate cross-platform workflows to speed up incident detection and resolution.
The training will cover key features, including:
- Incident Management: Streamlining investigation and remediation of security incidents across the entire lifecycle.
- Automated Playbooks: Designing and deploying automated responses for common and complex security tasks, reducing response times and human error.
- Threat Intelligence Integration: Using XSOAR to seamlessly integrate and enrich threat intelligence from multiple sources to enhance decision-making.
- Collaboration & Communication: Using XSOAR’s collaboration features to enhance communication within security teams and with external stakeholders during incidents.
- Reporting and Dashboards: Creating insightful reports and dashboards to monitor security performance and improve response capabilities.
This course is ideal for SOC analysts, security engineers, and anyone looking to maximize their use of Cortex XSOAR to streamline security operations.
By the end of the training, participants will have the knowledge and hands-on experience to configure and customize XSOAR to meet the specific needs of their organization’s security operations, driving efficiency and improving threat response capabilities.
- Professor: Hugo Rodrigues

Wireless fundamentals.
The objective of this training is to explain the multiple options to implement and use wireless networks.
Choosing the correct implementation to the context where it is needed can improve greatly the security and efficiency of the wireless network.
When this training is finished you would be able to understand:
- Differences between the multiple wireless systems
- Differences between the multiple protocols
- Differences in security
- Differences in access controls
- Professor: Hugo Rodrigues

- Professor: M0rpH0g3n3s1s |
- Professor: Hugo Rodrigues

-
Understand the fundamentals of OSINT.
-
Learn legal and ethical considerations.
-
Master the use of OSINT tools and frameworks.
-
Apply OSINT techniques in real-world scenarios.
- Professor: M0rpH0g3n3s1s |
- Professor: Hugo Rodrigues

- Professor: M0rpH0g3n3s1s |
- Professor: Hugo Rodrigues

In this dynamic and engaging offensive security training course, participants will gain the critical skills and knowledge needed to identify, exploit, and defend against cybersecurity threats.
From vulnerability assessments to penetration testing, we will dive deep into the tools, methodologies, and best practices used by industry experts to simulate real-world cyberattacks.
Throughout this hands-on training, students will learn how to think like an attacker, utilizing ethical hacking techniques to uncover weaknesses in networks, systems, and applications.
They'll gain proficiency in reconnaissance, exploitation, post-exploitation, and reporting, while also learning how to leverage tools like Metasploit, Nmap, and more.
This course is designed for professionals eager to sharpen their offensive security skills and stay ahead of evolving cyber threats.
With real-world case studies, practical exercises, and live demonstrations, students will leave equipped with the expertise to take on the challenges of modern cybersecurity defense.
By the end of the course, participants will have a comprehensive understanding of offensive security tactics and techniques, and the ability to apply them to bolster security measures in their own organizations or personal projects.
- Professor: Hugo Rodrigues