4Geeks logo
4Geeks logo

Courses

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Coding Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Full-Stack Software Developer - 16w

Data Science and Machine Learning - 16 wks

Search from all Lessons


LoginGet Started

Projects

Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials

  • Javascript

  • React.js

Create Your Own Snake Game in React!

  • intermediate

Create a Snake game in React! Build the classic game where you control a snake to eat food and grow while avoiding collisions. Learn to manage state, implement movement logic, and handle user input.

Start project
  • linux

  • cybersecurity

  • penetration testing

Wazuh: Installation and Endpoint Configuration to protect your machines with with this endpoint detection and response agent

  • intermediate

Learn how to install Wazuh on a virtual machine, configure Linux endpoints, and simulate threat activities to monitor with Wazuh's EDR (Endpoint Detection and Response) capabilities.

Start project
  • cybersecurity

  • pentesting

  • red team

Buffer overflow exploit

  • intermediate

Learn how to perform a buffer overflow exploit vulnerable from a Kali Linux machine.

Start project
  • cybersecurity

  • pentesting

Pentesting Prevention Proposal Project

  • intermediate

This project aims to consolidate the knowledge gained from previous pentesting exercises to propose preventive measures against identified vulnerabilities. The focus is on developing a comprehensive report that details identified vulnerabilities, exploitation techniques used, and recommendations for preventing future exploits.

Start project
  • cybersecurity

  • penetration testing

Pentesting Reconnaissance Vulnerable Machine Project

  • beginner

This project aims to teach students how to perform the reconnaissance phase on a vulnerable machine (Metasploitable). It includes steps for finding the target's IP address, gathering information about the operating system and versions, enumerating ports and services, and describing potential vulnerabilities and breaches.

Start project
  • Networking

  • cybersecurity

Configuring a Secure Server with SSL/TLS Using OpenSSL

  • intermediate

Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.

Start project
  • SQL

  • linux

  • cybersecurity

Installing DVWA on a Virtual Machine for SQL Injection Practice

  • intermediate

Learn how to install DVWA on a virtual machine to practice and report SQL injection vulnerabilities according to ISO 27001 standards.

Start project
  • Javascript

  • React.js

Build a Memory Game with React: Find the Pairs!

  • intermediate

Build a Memory Game with React: Find the Pairs! Develop a classic memory game where the objective is to find matching pairs of cards. Learn to manage card states and implement game logic to check for matches. Enhance your React skills with this engaging project!

Start project
  • Networking

  • cybersecurity

  • firewall

Building and Securing a Network with a Demilitarized Zone

  • intermediate

Learn how to create a simulated network environment that includes a Demilitarized Zone, configure firewalls, gateways, and network detection systems, and ensure network security.

Start project
  • Javascript

  • React.js

  • Generative AI

Logo generator using AI

  • intermediate

Create a Company Logo Generator using AI. Build a React app using ChatGPT’s API to generate logo descriptions from user input. Enhance your coding skills with this interactive project!

Start project
  • cybersecurity

  • pentesting

Pentesting Exploitation Project on a Vulnerable Website

  • intermediate

This project focuses on teaching students how to exploit vulnerabilities found in a vulnerable web application (DVWA) using Metasploit. It includes confirming vulnerabilities, exploiting them, performing privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

Start project
  • cybersecurity

  • penetration testing

Pentesting Reconnaissance Vulnerable Web Project

  • beginner

This project aims to teach students how to perform the reconnaissance phase on a vulnerable website (bWAPP in BeeBox VM). It includes steps for network scanning, service enumeration, domain information gathering, vulnerability scanning, and brute forcing directories and files.

Start project
  • cybersecurity

  • wordpress

  • access control list

Configuring Firewall and ACL using iptables to improve WordPress security

  • easy

develop practical skills in securing a wordpress installation through the setup of firewalls and ACLs

Start project
  • linux

  • cybersecurity

  • ubuntu

Find The Malicius User Ubuntu Linux

  • intermediate

Start project
  • linux

  • cybersecurity

  • penetration testing

Configure and use Wazuh as a SIEM

  • intermediate

Learn how to install Wazuh on a virtual machine, configure Linux endpoints, collect and analyze logs from multiple sources, and simulate attacks to monitor with Wazuh's SIEM (Security Information and Event Management) capabilities.

Start project
  • The Command Line

  • cybersecurity

  • hacking

Reverse shell and remote remote hacking a Windows machine

  • intermediate

Learn how to execute one of the most popular hacks on Windows: The Reverse Shell, and also learn to execute basic and administrative Windows commands remotely through a reverse shell, simulating a hacking attack from Kali Linux to Windows 10.

Start project
  • cybersecurity

  • penetration testing

  • red team

Master Red Team Exercises: Exploit the OWASP Top 10 Vulnerabilities

  • intermediate

Master red team tactics with dozens of hands-on exercises focused on exploiting the OWASP Top 10 vulnerabilities. Perfect for ethical hackers and penetration testers looking to sharpen their offensive security skills.

Start project
  • cybersecurity

  • penetration testing

Pentesting Exploitation Project on a Vulnerable Machine

  • intermediate

This project aims to teach students how to exploit vulnerabilities found in a vulnerable machine (Metasploitable) during the reconnaissance phase. It includes detecting exploitable vulnerabilities, performing exploitation, privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

Start project
  • cybersecurity

  • penetration testing

Installing bWAPP Using a Virtual Machine (BeeBox)

  • beginner

This practice will guide you through the process of installing bWAPP using a pre-configured virtual machine (BeeBox), including steps for setting up and customizing the environment for web security testing.

Start project
  • Networking

  • cybersecurity

  • Nmap

Scan ports with nmap

  • intermediate

Learn how to use Nmap for network analysis and vulnerability detection by scanning ports, identifying active hosts, and checking services on a target machine to find security weaknesses.

Start project
Load more...