Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started

Projects

Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials

4hrs average

Master Red Team Exercises: Exploit the OWASP Top 10 Vulnerabilities

Master red team tactics with dozens of hands-on exercises focused on exploiting the OWASP Top 10 vulnerabilities. Perfect for ethical hackers and penetration testers looking to sharpen their offensive security skills.

Intermediate

2hrs average

This project aims to teach students how to exploit vulnerabilities found in a vulnerable machine (Metasploitable) during the reconnaissance phase. It includes detecting exploitable vulnerabilities, performing exploitation, privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

Intermediate

1hrs average

This practice will guide you through the process of installing bWAPP using a pre-configured virtual machine (BeeBox), including steps for setting up and customizing the environment for web security testing.

Beginner

2hrs average

Learn the use of Nmap for network analysis and vulnerability detection.

Intermediate

4hrs average

Create an AI-powered Excuse Generator using Python or JavaScript. Learn to connect with ChatGPT's API and generate creative excuses. Perfect for coding practice!

Beginner

2hrs average

This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.

Intermediate

1hrs average

Create a mockup and establish the fundamental visual parameters that will guide the development of your fullstack web application.

Intermediate

2hrs average

This project aims to consolidate the knowledge gained from previous pentesting exercises to propose preventive measures against identified vulnerabilities. The focus is on developing a comprehensive report that details identified vulnerabilities, exploitation techniques used, and recommendations for preventing future exploits.

Intermediate

1hrs average

This project aims to teach students how to perform the reconnaissance phase on a vulnerable machine (Metasploitable). It includes steps for finding the target's IP address, gathering information about the operating system and versions, enumerating ports and services, and describing potential vulnerabilities and breaches.

Beginner

2hrs average

Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.

Intermediate

3hrs average

Learn how to install DVWA on a virtual machine to practice and report SQL injection vulnerabilities according to ISO 27001 standards.

Intermediate

1hrs average

Beginner

1hrs average

Once you have defined the scope, it is a good idea to generate the database model before you start coding. This will help you to speed up the development of your project.

Intermediate

Discover key considerations and avoid common mistakes when choosing your final project. Learn from these experienced tips to ensure success in your project journey.

2hrs average

This project focuses on teaching students how to exploit vulnerabilities found in a vulnerable web application (DVWA) using Metasploit. It includes confirming vulnerabilities, exploiting them, performing privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

Intermediate

1hrs average

This project aims to teach students how to perform the reconnaissance phase on a vulnerable website (bWAPP in BeeBox VM). It includes steps for network scanning, service enumeration, domain information gathering, vulnerability scanning, and brute forcing directories and files.

Beginner

1hrs average

develop practical skills in securing a wordpress installation through the setup of firewalls and ACLs

Easy

2hrs average

Intermediate

2hrs average

Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.

Intermediate

1hrs average

Based on the requirements presented to you, create a database model that responds to the proposal.

Intermediate

Load more...