4Geeks logo
4Geeks logo

Courses

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Coding Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.


LoginGet Started

Lesson

The following lessons explain different programming concepts and have been published by our members. Search for a particular lesson using the filters

  • cybersecurity

  • pentesting

  • wazuh

Wazuh: SIEM and EDR for Cybersecurity

Wazuh is an open-source security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. It offers threat prevention, detection, and response capabilities through its integrated modules.

Read lesson
  • cybersecurity

  • penetration testing

  • red team

What is a buffer overflow and how to exploit this vulnerability

Dive into the world of cybersecurity with our lesson on buffer overflows! Understand this critical vulnerability, learn how to exploit it, and discover its implications for software security. Equip yourself with knowledge to protect systems and enhance your skills in penetration testing. Join us in mastering this essential topic today!

Read lesson
  • cybersecurity

  • penetration testing

  • owasp top 10

Cryptographic Failures

Learn what cryptographic flaws are and how to prevent them. Learn about the OWASP Top 10 vulnerabilities and protect your sensitive data.

Read lesson
  • cybersecurity

  • databases

  • pentesting

NoSQL Injection

Discover the Causes, Consequences, and Solutions of NoSQL Injection: A Comprehensive Guide to Preventing and Mitigating Vulnerabilities in NoSQL Databases

Read lesson
  • Generative AI

  • LLMs

  • AI technology

Generative AI vs LLM: Understanding the Differences and Synergies

Discover the key differences between Generative AI and Large Language Models (LLMs). While Generative AI creates original content, LLMs process and generate text in an advanced way. Together, these technologies can revolutionize industries like marketing, art, and education.

Read lesson
  • Networking

  • cybersecurity

  • pentesting

Mastering Web App Firewall Evasion: Techniques and Best Practices

Learn essential firewall evasion techniques to bypass Web Application Firewalls (WAFs) and enhance your cybersecurity skills. Master methods like encoding, parameter tampering, and more in this concise, practical lesson for security professionals.

Read lesson
  • Machine Learning

  • artificial intelligence

  • AI training

How to Train an AI model: Beginners Guide

🤖 Complete Guide to Training an AI in 5 Steps

Read lesson
  • cybersecurity

  • penetration testing

  • blue-team

Understand Endpoint Detection and Response Systems

Explore the world of Endpoint Detection and Response (EDR) systems, focusing on advanced threat detection and real-time response to safeguard modern businesses. Learn how EDR provides proactive protection, using monitoring, machine learning, and automation to detect and address security risks efficiently.

Read lesson
  • cybersecurity

  • pentesting

  • red team

Understanding Kernel Exploits

How Attackers Use Vulnerabilities to Gain System Control and Perform Privilege Escalation Attack

Read lesson
  • cybersecurity

  • pentesting

  • red team

Understanding and Mitigating The Server Side Request Forgery Vulnerability

Learn about Server-Side Request Forgery (SSRF), its impact on web security, and how to protect against this dangerous vulnerability. Includes real-world examples and prevention techniques.

Read lesson
  • cybersecurity

  • pentesting

  • red team

Broken Authentication: Understanding and Preventing a Critical Web Security Vulnerability

Learn about Broken Authentication, its impact on web security, and how to protect against this OWASP Top 10 vulnerability. Includes real-world examples and prevention techniques.

Read lesson
  • SQL

  • cybersecurity

  • pentesting

Understanding SQL Injection: The Second Most Critical OWASP Vulnerability

Learn everything about SQL Injection

Read lesson
  • Networking

  • cybersecurity

  • pentesting

Bypassing a firewall

How to evade firewalls using tools like NMAP, VPNs and verify bypass Methods for Optimized Network Security**

Read lesson
  • LearnPack

Agent and Mode in LearnPack

Read lesson
  • cybersecurity

  • pentesting

  • red team

Windows CMD Commands for Remote Hacking

Mastering Windows Command Line for Remote System Control

Read lesson
  • cybersecurity

  • pentesting

  • red team

Privilege Escalation Explained

Understanding Privilege Escalation: How Attackers Exploit Vulnerabilities to Gain Unauthorized Access

Read lesson
  • cybersecurity

  • web security

  • penetration testing

Local File Inclusion (LFI) and Remote File Inclusion (RFI)

Learn to identify and exploit Local File Inclusion (LFI) and Remote File Inclusion (RFI) vulnerabilities in web applications. Understand how attackers can access sensitive files, execute malicious code, and discover prevention techniques and key tools to strengthen your application's security.

Read lesson
  • cybersecurity

  • pentesting

  • web security

Broken Access Control: A Critical Web Security Vulnerability

Understanding and exploiting vulnerabilities in access control mechanisms

Read lesson
  • cybersecurity

  • pentesting

XSS (Cross-Site Scripting)

🔍 What is Cross-Site Scripting, examples and how to recreate the attack or prevent it on you web application

Read lesson
  • cybersecurity

  • web security

  • vulnerabilities

OWASP Top 10: The Pillar of Cybersecurity

Master the OWASP Top 10 vulnerabilities and enhance your cybersecurity skills. Discover essential insights for protecting web applications today!

Read lesson
Load more...