4Geeks logo
4Geeks logo

Courses

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Coding Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Full-Stack Software Developer - 16w

Data Science and Machine Learning - 16 wks

Search from all Lessons


LoginGet Started

Projects

Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials

  • Generative AI

  • Krea.ai

  • Image Generation

Generate Images With Flux

  • beginner

A comprehensive guide and lesson on how to create AI-generated images using Krea.ai, explore Flux models, and craft effective prompts for image generation.

Start project
  • Javascript

  • React.js

Build a Basic E-commerce App with Next.js!

  • intermediate

Build a basic e-commerce app with Next.js! Create a simple online store with product listings, a shopping cart, and a checkout page. Learn Next.js fundamentals and enhance your web development skills.

Start project
  • cybersecurity

  • ISO 27001

  • ISMS

Developing a Basic Information Security Management System (ISMS) for a Public Organization

  • intermediate

This project guides students through the process of developing a foundational Information Security Management System (ISMS) for a public organization. Students will define the scope, conduct a risk assessment, select appropriate controls, and document security policies and procedures. The project aims to develop practical skills in risk assessment, policy development, and applying a risk-based approach to information security in a public sector context.

Start project
  • Javascript

  • React.js

Create Your Own Snake Game in React!

  • intermediate

Create a Snake game in React! Build the classic game where you control a snake to eat food and grow while avoiding collisions. Learn to manage state, implement movement logic, and handle user input.

Start project
  • linux

  • cybersecurity

  • penetration testing

Wazuh: Installation and Endpoint Configuration to protect your machines with with this endpoint detection and response agent

  • intermediate

Learn how to install Wazuh on a virtual machine, configure Linux endpoints, and simulate threat activities to monitor with Wazuh's EDR (Endpoint Detection and Response) capabilities.

Start project
  • cybersecurity

  • pentesting

  • red team

Buffer overflow exploit

  • intermediate

Learn how to perform a buffer overflow exploit vulnerable from a Kali Linux machine.

Start project
  • cybersecurity

  • penetration testing

Pentesting Prevention Proposal Project

  • intermediate

This project aims to consolidate the knowledge gained from previous pentesting exercises to propose preventive measures against identified vulnerabilities. The focus is on developing a comprehensive report that details identified vulnerabilities, exploitation techniques used, and recommendations for preventing future exploits.

Start project
  • Generative AI

  • Ollama

  • OpenWebUI

A Complete Guide to Installing Ollama and OpenWebUI Locally

  • intermediate

A step-by-step guide to installing Ollama and OpenWebUI locally on your device. Learn how to set up and run large language models like Llama 3.2, ensuring privacy, flexibility, and offline access.

Start project
  • Javascript

  • React.js

  • prompt engineering

Project Ideas Generator using AI and React

  • intermediate

Build a Project Ideas Generator using AI and React! Create a React app that uses ChatGPT's API to generate project ideas based on user input. Enhance your coding skills with this interactive project!

Start project
  • cybersecurity

  • dlp

  • data loss prevention

Data Loss Prevention (DLP) Policies for external devices

  • beginner

This project aims to guide students in creating security policies for Data Loss Prevention (DLP) within an organization. The first part focuses on applying the principle of least privilege to ensure that only authorized personnel have access to sensitive data. The goal is to protect confidential information through structured policies and procedures. The second part involves implementing restrictions on USB device usage to prevent data leaks, directly linked to the DLP policies established in the first part.

Start project
  • Javascript

  • React.js

Build a Memory Game with React: Find the Pairs!

  • intermediate

Build a Memory Game with React: Find the Pairs! Develop a classic memory game where the objective is to find matching pairs of cards. Learn to manage card states and implement game logic to check for matches. Enhance your React skills with this engaging project!

Start project
  • Networking

  • cybersecurity

  • firewall

Building and Securing a Network with a Demilitarized Zone

  • intermediate

Learn to build a simulated network environment with a Demilitarized Zone (DMZ). Configure firewalls, gateways, and network detection systems to ensure security. Design internal, external, and DMZ networks, set up firewall rules, deploy services, monitor traffic, and document security measures for a complete network defense experience.

Start project
  • Javascript

  • React.js

  • Generative AI

Logo generator using AI

  • intermediate

Create a Company Logo Generator using AI. Build a React app using ChatGPT’s API to generate logo descriptions from user input. Enhance your coding skills with this interactive project!

Start project
  • cybersecurity

  • penetration testing

Pentesting Exploitation Project on a Vulnerable Website

  • intermediate

This project focuses on teaching students how to exploit vulnerabilities found in a vulnerable web application (DVWA) using Metasploit. It includes confirming vulnerabilities, exploiting them, performing privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

Start project
  • Javascript

  • React.js

  • Generative AI

Create a Multi-Language Translator in React using ChatGPT

  • intermediate

Build a Multi-Language Translator in React using ChatGPT! Create an app where users can translate text into different languages using AI. Improve your React and AI skills with this project!

Start project
  • Networking

  • cybersecurity

  • penetration testing

Cybersecurity Final Project

  • intermediate

This final project aims to simulate a comprehensive cybersecurity exercise where students assume the role of cybersecurity analysts tasked with restoring and protecting a compromised server at 4Geeks Academy. The project is divided into three phases: forensic analysis, vulnerability detection and correction, and incident response planning.

Start project
  • Data Analysis

  • cybersecurity

  • dlp

Sensitive Data Analysis in a Fictional Organization

  • intermediate

Conduct a sensitive data analysis for a fictional organization. Identify and classify sensitive data types, map data flows, and identify risk points. Learn essential skills for implementing effective DLP strategies.

Start project
  • linux

  • cybersecurity

  • penetration testing

Configure and use Wazuh as a SIEM

  • intermediate

Learn how to install Wazuh on a virtual machine, configure Linux endpoints, collect and analyze logs from multiple sources, and simulate attacks to monitor with Wazuh's SIEM (Security Information and Event Management) capabilities.

Start project
  • The Command Line

  • cybersecurity

  • hacking

Reverse shell and remote remote hacking a Windows machine

  • intermediate

Learn how to execute one of the most popular hacks on Windows: The Reverse Shell, and also learn to execute basic and administrative Windows commands remotely through a reverse shell, simulating a hacking attack from Kali Linux to Windows 10.

Start project
  • cybersecurity

  • penetration testing

  • red team

Master Red Team Exercises: Exploit the OWASP Top 10 Vulnerabilities

  • intermediate

Master red team tactics with dozens of hands-on exercises focused on exploiting the OWASP Top 10 vulnerabilities. Perfect for ethical hackers and penetration testers looking to sharpen their offensive security skills.

Start project
Load more...