4Geeks logo
4Geeks logo

Courses

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Full-Stack Software Developer - 16w

Data Science and Machine Learning - 16 wks

Search from all Lessons

Lesson

The following lessons explain different programming concepts and have been published by our members. Search for a particular lesson using the filters

  • cybersecurity

  • pentesting

  • red team

Broken Authentication: Understanding and Preventing a Critical Web Security Vulnerability

Learn about Broken Authentication, its impact on web security, and how to protect against this OWASP Top 10 vulnerability. Includes real-world examples and prevention techniques.

Read lesson
  • SQL

  • cybersecurity

  • pentesting

Understanding SQL Injection: The Second Most Critical OWASP Vulnerability

Learn everything about SQL Injection

Read lesson
  • Networking

  • cybersecurity

  • pentesting

Bypassing a firewall

How to evade firewalls using tools like NMAP, VPNs and verify bypass Methods for Optimized Network Security**

Read lesson
  • LearnPack

Agent and Mode in LearnPack

Read lesson
  • cybersecurity

  • pentesting

How to create a pentesting report (with examples)

Documentation of activities performed during penetration testing: Key Steps for Detailed, Clear, and Effective Reporting

Read lesson
  • Generative AI

Quickstart: How to Use the 4Geeks Prompt Builder

Enhance your AI model prompts with the 4Geeks Prompt Builder! Follow this detailed guide to get the best results.

Read lesson
  • cybersecurity

Legal and Regulatory Compliance in The United States of America

Understanding the Legal Landscape of Cybersecurity in The United States of America: Key Laws, Regulations, and the Role of Incident Response Plans in Protecting Digital Infrastructure.

Read lesson
  • cybersecurity

  • pentesting

  • web security

Broken Access Control: A Critical Web Security Vulnerability

Understanding and exploiting vulnerabilities in access control mechanisms

Read lesson
  • cybersecurity

  • pentesting

XSS (Cross-Site Scripting)

🔍 What is Cross-Site Scripting, examples and how to recreate the attack or prevent it on you web application

Read lesson
  • cybersecurity

  • web security

  • OWASP

OWASP Top 10: The Pillar of Cybersecurity

🔍 What is OWASP and why is it so important for mastering cibersecurity

Read lesson
  • Networking

  • cybersecurity

Tools examples for intruder detection systems (and prevention)

Exploring IDS/IPS Tools: Snort, Suricata, Quickdraw, Zeek, OSSEC, and Wazuh - Advanced Protection for Networks and Control Systems

Read lesson
  • cybersecurity

  • pentesting

Metasploit pentesting tool

What is Metasploit and how to use it for pentesting, key components and complementary tools

Read lesson
  • cybersecurity

  • pentesting

Installation of Metasploitable 2

Learn how to install and use Metasploitable 2, a vulnerable virtual machine designed for practicing penetration testing and enhancing cybersecurity skills. This guide covers common vulnerabilities and installation prerequisites, offering detailed instructions for setting up Metasploitable 2 on VirtualBox.

Read lesson
  • cybersecurity

  • pentesting

Pentesting Reconnaissance: Gathering information about the target

Mastering Information Gathering for Penetration Testing: Essential Techniques and Tools for Effective Reconnaissance

Read lesson
  • Generative AI

  • LLMs

  • AI technology

Generative AI vs LLM: Understanding the Differences and Synergies

Discover the key differences between Generative AI and Large Language Models (LLMs). While Generative AI creates original content, LLMs process and generate text in an advanced way. Together, these technologies can revolutionize industries like marketing, art, and education.

Read lesson
  • Networking

  • cybersecurity

  • pentesting

Mastering Web App Firewall Evasion: Techniques and Best Practices

Learn essential firewall evasion techniques to bypass Web Application Firewalls (WAFs) and enhance your cybersecurity skills. Master methods like encoding, parameter tampering, and more in this concise, practical lesson for security professionals.

Read lesson
  • Machine Learning

  • artificial intelligence

  • AI training

How to Train an AI model: Beginners Guide

🤖 Complete Guide to Training an AI in 5 Steps

Read lesson
  • cybersecurity

  • pentesting

Communication of vulnerabilities found and mitigation recommendations

Identify vulnerabilities like lack of anti-CSRF tokens in HTML forms and learn effective solutions to mitigate CSRF attacks and enhance security.

Read lesson
  • Generative AI

  • AI-ethics

Disadvantages of Artificial Intelligence

Artificial Intelligence has brought many benefits, but it also has its disadvantages. In this article, we explore some of the most common disadvantages of AI and how we can mitigate them.

Read lesson
  • cybersecurity

Legal and Regulatory Cybersecurity Compliance in Spain

Explore the world of security incidents, incident response, and the importance of an Incident Response Plan (IRP) in Spain's cybersecurity field

Read lesson