4Geeks logo
4Geeks logo

Courses

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Coding Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.


LoginGet Started

Lesson

The following lessons explain different programming concepts and have been published by our members. Search for a particular lesson using the filters

  • cybersecurity

  • spain-national-security-framework

ENS Organizational and Operational Framework

🏛️ Understanding the key components of the organizational and operational framework in Spain's National Security Scheme (ENS)

Read lesson
  • cybersecurity

  • ISO 27001

  • ISMS

ISMS Framework Implementation and Risk Assessment

🔒 Understanding the framework and how to implement it for ISO 27001 certification. Conducting risk assessment and implementing controls.

Read lesson
  • cybersecurity

  • dlp

  • data loss prevention

Regulatory Compliance in Data Loss Prevention (DLP)

🛡️ Understanding the key aspects of regulatory compliance in data loss prevention (DLP) for GDPR, PCI-DSS e HIPAA. Implementing DLP controls and managing exceptions and false positives

Read lesson
  • cybersecurity

  • dlp

  • data loss prevention

Introduction to Data Loss Prevention (DLP)

🛡️ Understanding the critical role of DLP in protecting sensitive information. Types of sensitive data and data leakage channels.

Read lesson
  • cybersecurity

  • pentesting

  • red team

Windows CMD Commands for Remote Hacking

Mastering Windows Command Line for Remote System Control

Read lesson
  • cybersecurity

  • pentesting

  • red team

Privilege Escalation Explained

Understanding Privilege Escalation: How Attackers Exploit Vulnerabilities to Gain Unauthorized Access

Read lesson
  • cybersecurity

  • web security

  • penetration testing

Local File Inclusion (LFI) and Remote File Inclusion (RFI)

Learn to identify and exploit Local File Inclusion (LFI) and Remote File Inclusion (RFI) vulnerabilities in web applications. Understand how attackers can access sensitive files, execute malicious code, and discover prevention techniques and key tools to strengthen your application's security.

Read lesson
  • cybersecurity

  • spain-national-security-framework

ENS Implementation and Security Measures

🛡️ Understanding the key components of the implementation and security measures in Spain's National Security Scheme (ENS)

Read lesson
  • cybersecurity

  • ISO 27001

  • ISMS

ISO 27001 Auditing and Certification Process

🔒 Understanding the certification process, audit preparation, common findings, and maintenance of certification

Read lesson
  • cybersecurity

  • dlp

  • data loss prevention

DLP Policies and Controls

🛡️ Understanding the key aspects of designing effective DLP policies, implementing DLP controls, and managing exceptions and false positives

Read lesson
  • cybersecurity

  • pentesting

  • wazuh

Wazuh: SIEM and EDR for Cybersecurity

Wazuh is an open-source security platform that provides unified XDR and SIEM protection for endpoints and cloud workloads. It offers threat prevention, detection, and response capabilities through its integrated modules.

Read lesson
  • cybersecurity

  • pentesting

  • red team

What is a buffer overflow and how to exploit this vulnerability

Learn all about Buffer overflow and how to exploit this vulnerability

Read lesson
  • cybersecurity

  • pentesting

  • owasp top 10

Cryptographic Failures

Understanding Cryptographic Failures: How to Identify and Prevent Them

Read lesson
  • cybersecurity

  • databases

  • pentesting

NoSQL Injection

Discover the Causes, Consequences, and Solutions of NoSQL Injection: A Comprehensive Guide to Preventing and Mitigating Vulnerabilities in NoSQL Databases

Read lesson
  • cybersecurity

  • spain-national-security-framework

Introduction to ENS (Spain National Security Scheme)

🛡️ Understanding the fundamentals of spain's National Security Scheme, its importance in information security management, and the certification process

Read lesson
  • cybersecurity

  • ISO 27001

  • ISMS

Introduction to ISO 27001

🔒 Understanding the fundamentals of ISO 27001, its importance in information security management, and the certification process

Read lesson
  • cybersecurity

  • dlp

  • data loss prevention

DLP Strategies and Technologies

🛡️ Understanding the key strategies and technologies for Data Loss Prevention (DLP). Protecting data at rest, in motion and in use. Implementing DLP controls and integrating DLP into existing infrastructure.

Read lesson
  • cybersecurity

  • penetration testing

  • blue-team

Understand Endpoint Detection and Response Systems

Explore the world of Endpoint Detection and Response (EDR) systems, focusing on advanced threat detection and real-time response to safeguard modern businesses. Learn how EDR provides proactive protection, using monitoring, machine learning, and automation to detect and address security risks efficiently.

Read lesson
  • cybersecurity

  • pentesting

  • red team

Understanding Kernel Exploits

How Attackers Use Vulnerabilities to Gain System Control and Perform Privilege Escalation Attack

Read lesson
  • cybersecurity

  • pentesting

  • red team

Understanding and Mitigating The Server Side Request Forgery Vulnerability

Learn about Server-Side Request Forgery (SSRF), its impact on web security, and how to protect against this dangerous vulnerability. Includes real-world examples and prevention techniques.

Read lesson
Load more...