4Geeks logo
4Geeks logo

Courses

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Coding Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Full-Stack Software Developer - 16w

Data Science and Machine Learning - 16 wks

Search from all Lessons


LoginGet Started

Projects

Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials

  • cybersecurity

  • incident response

  • linux security

Final project - Live Incident Response

  • intermediate

In this final cybersecurity project, students must take immediate action to identify, contain, and remediate a live cyberattack on a compromised Linux server. Acting as cybersecurity analysts, they will investigate malicious processes, identify persistence mechanisms, remove backdoors, and restore system integrity.

Start project
  • ftp

  • burpsuite

  • cybersecurity

Intercepting traffic and cryptographic failures

  • intermediate

Learn to intercept unencrypted HTTP traffic, identify information leaks, and access FTP services using hashes and decoding techniques.

Start project
  • windows

  • cybersecurity

  • smb

Elevation 2 - Hidden Privileges in Windows

  • intermediate

Explore a corporate Windows server, identify poor security practices, and perform brute force attacks to access a privileged user and escalate to administrator.

Start project
  • linux

  • cybersecurity

  • red team

Gossip Lab- SQL injection

  • intermediate

Investigate a web application vulnerable to SQL Injection, access internal data from the Alabama Suites hotel system, and uncover who is sabotaging Diego by analyzing user panels.

Start project
  • read-team

  • apache

  • web

Customer Service - Broken access control and Password Cracking

  • intermediate

Explore a web application to detect hidden routes and broken access control. Crack MD5 passwords and simulate logins to retrieve sensitive information.

Start project
  • cybersecurity

  • digital forensics

  • análisis forense

Digital Forensic Analysis with Autopsy: The John Doe Case

  • beginner

This project guides students through a practical digital forensic analysis using a segmented .E01 forensic image and Autopsy. The objective is to investigate possible data exfiltration by analyzing file manipulation, compression, suspicious browsing, and evidence deletion, and to document findings in a structured technical report.

Start project
  • owasp-a05-security-misconfiguration

  • red team

  • ssh

Telefonika - CTF machine for vulnerability exposed Code Analysis

  • intermediate

In this lab, you'll analyze a website for poor development practices, discover exposed credentials, and access via SSH to retrieve a flag.

Start project
  • Data Science

  • Machine Learning

Alternative time series project

  • beginner

Use ARIMA model to forecast sales using time series analysis to estimate future sales rate.

Start project
  • linux

  • cybersecurity

  • wordpress

Cheers! - Remote Vulnerability Analysis in WordPress

  • intermediate

Explore a realistic vulnerability in a WordPress site by identifying and analyzing the vulnerable TimThumb script. Learn to recognize suspicious paths and formulate attack hypotheses.

Start project
  • suid

  • cybersecurity

  • linux

Elevation - Escalating from Common to Root

  • intermediate

Access a corporate Linux system and use brute force and privilege escalation techniques to become root and retrieve a protected flag.

Start project
  • windows

  • cybersecurity

  • smb

Capture Flag Ntlm Hash Attack Lab

  • intermediate

Gain Administrator access to a Windows machine using an NTLM hash exposed in a public SMB share. Learn to exploit insecure configurations and perform Pass-the-Hash authentication.

Start project
  • linux

  • cybersecurity

  • red team

The lovers - SQL injection y and escalate privileges

  • intermediate

Exploit a SQL Injection vulnerability in a dating app to access as admin, retrieve credentials, uncover hidden secrets, and escalate privileges to gain root access.

Start project
  • prompt engineering

  • Generative AI

Your First Ai First Coding Implementation Plan

  • beginner

Learn to create a comprehensive implementation plan to guide your AI coding partner in building any project you can imagine!

Start project
  • HTTP

  • node.js

  • Express

Http Foundations Ctf Project

  • beginner

A Capture The Flag (CTF) project designed to solidify your understanding of core HTTP concepts. By solving a series of challenges.

Start project
  • evil-winrm

  • A01:2021 - Broken Access Control

  • windows

Final boss Red Team - The Final Corporate Challenge

  • intermediate

Analyze a web server full of decoys, discover an exposed backup file, and exploit a misconfigured scheduled task to escalate privileges in a Windows system.

Start project
  • windows

  • cybersecurity

  • smb

Capture Flag Enumeration And Access To Exposed Credentials Lab

  • intermediate

Explore a Windows server hosting a WordPress site and vulnerable SMB shares. Enumerate users, build custom dictionaries, and use discovered credentials to capture a flag.

Start project
  • linux

  • cybersecurity

  • red team

Casino LFI - Dangerous File Inclusion on Casino Server

  • intermediate

Analyze a casino web app and exploit a Local File Inclusion (LFI) vulnerability to access sensitive server content.

Start project
  • windows

  • cybersecurity

  • red team

Eternal blue - Remote Access on Windows 7

  • intermediate

Analyze a Windows 7 system vulnerable to EternalBlue, exploit the flaw using Metasploit, and remotely access the system to retrieve a flag from the user's desktop.

Start project
  • linux

  • cybersecurity

  • penetration testing

FTP Brute Force Lab

  • intermediate

Learn to perform brute force attacks and privilege escalation in a controlled environment using tools like Hydra and password dictionaries.

Start project
  • prompt engineering

  • Generative AI

Cursor Configuration

  • beginner

Learn to customize Cursor settings, create powerful custom rules, and use advanced features like MCPs to build a personalized AI-assisted workflow that boosts your development productivity.

Start project
Load more...