4Geeks logo
4Geeks logo

Courses

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Coding Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Full-Stack Software Developer - 16w

Data Science and Machine Learning - 16 wks

Search from all Lessons


LoginGet Started

Projects

Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials

  • cybersecurity

  • penetration testing

Pentesting Exploitation Project on a Vulnerable Machine

  • intermediate

This project aims to teach students how to exploit vulnerabilities found in a vulnerable machine (Metasploitable) during the reconnaissance phase. It includes detecting exploitable vulnerabilities, performing exploitation, privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

Start project
  • cybersecurity

  • penetration testing

Installing bWAPP Using a Virtual Machine (BeeBox)

  • beginner

This practice will guide you through the process of installing bWAPP using a pre-configured virtual machine (BeeBox), including steps for setting up and customizing the environment for web security testing.

Start project
  • Networking

  • cybersecurity

  • Nmap

Scan ports with nmap

  • intermediate

Learn how to use Nmap for network analysis and vulnerability detection by scanning ports, identifying active hosts, and checking services on a target machine to find security weaknesses.

Start project
  • Javascript

  • Python

  • The DOM

Code an Excuse Generator Using AI

  • beginner

Create an AI-powered Excuse Generator using Python or JavaScript. Learn to connect with ChatGPT's API and generate creative excuses. Perfect for coding practice!

Start project
  • Networking

  • cybersecurity

Attacking with spoofing and DoS on a WordPress website

  • intermediate

This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.

Start project
  • GitHub

  • Agile Methodologies

  • final-project

Visual design for a Fullstack Developer project

  • intermediate

Create a mockup and establish the fundamental visual parameters that will guide the development of your fullstack web application.

Start project
  • linux

  • cybersecurity

Scheduling automatic Wordpress backup

  • intermediate

Create a script to back up a WordPress website, including the files and the database. The script should generate a compressed file with all the backups made. This project should be executed on a Debian system with WordPress deployed.

Start project
  • cybersecurity

  • penetration testing

Pentesting Reconnaissance Vulnerable Machine Project

  • beginner

This project aims to teach students how to perform the reconnaissance phase on a vulnerable machine (Metasploitable). It includes steps for finding the target's IP address, gathering information about the operating system and versions, enumerating ports and services, and describing potential vulnerabilities and breaches.

Start project
  • Networking

  • cybersecurity

Configuring a Secure Server with SSL/TLS Using OpenSSL

  • intermediate

Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.

Start project
  • SQL

  • linux

  • cybersecurity

Installing DVWA on a Virtual Machine for SQL Injection Practice

  • intermediate

Learn how to install DVWA on a virtual machine to practice and report SQL injection vulnerabilities according to ISO 27001 standards.

Start project
  • Networking

  • cybersecurity

Matrix Game About Data Security

  • beginner

Start project
  • postgre

  • final-project

  • SQL

Modeling the database of your Fullstack Developer project

  • intermediate

Once you have defined the scope, it is a good idea to generate the database model before you start coding. This will help you to speed up the development of your project.

Start project
  • Javascript

  • Flask

  • React.js

Full Stack Project User Stories

Discover key considerations and avoid common mistakes when choosing your final project. Learn from these experienced tips to ensure success in your project journey.

Start project
  • Networking

  • cybersecurity

Deploying Wordpress Site on Debian

  • intermediate

Learn to deploy a basic WordPress website on an Apache server running on Debian. Set up a LAMP stack, one of the most popular web development environments, and understand how web servers work. This project will help you explore website deployment, monitoring, and security testing for real-world applications.

Start project
  • cybersecurity

  • penetration testing

Pentesting Reconnaissance Vulnerable Web Project

  • beginner

This project aims to teach students how to perform the reconnaissance phase on a vulnerable website (bWAPP in BeeBox VM). It includes steps for network scanning, service enumeration, domain information gathering, vulnerability scanning, and brute forcing directories and files.

Start project
  • cybersecurity

  • wordpress

  • access control list

Configuring Firewall and ACL using iptables to improve WordPress security

  • easy

develop practical skills in securing a wordpress installation through the setup of firewalls and ACLs

Start project
  • linux

  • cybersecurity

  • ubuntu

Find The Malicius User Ubuntu Linux

  • intermediate

This project aims to identify and address unauthorized access within the cybersecurity team at 4Geeks Academy. By analyzing user permissions, system logs, and suspicious activities, we will pinpoint the malicious user, understand their actions, and implement corrective measures to ensure the security of the Ubuntu-based web server. The project involves a detailed review of permissions, continuous monitoring, and enhanced security training for the team to prevent future incidents.

Start project
  • Networking

  • cybersecurity

  • wordpress

Example Traffic Simulation on Wordpress using Apache Benchmark

  • intermediate

Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.

Start project
  • SQL

  • postgre

  • databases

Modeling a Zoo database

  • intermediate

Based on the requirements presented to you, create a database model that responds to the proposal.

Start project
  • linux

  • cybersecurity

Installing Kali Linux on a Virtual Machine

  • beginner

Learn how to install Kali Linux on a virtual machine to explore and use this powerful security tool in a safe and flexible environment.

Start project
Load more...