Practice and develop your coding skills by building real live interactive autograded projects with solutions and video tutorials
2hrs average
This project focuses on teaching students how to exploit vulnerabilities found in a vulnerable web application (DVWA) using Metasploit. It includes confirming vulnerabilities, exploiting them, performing privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.
Intermediate
1hrs average
This project aims to teach students how to perform the reconnaissance phase on a vulnerable website (bWAPP in BeeBox VM). It includes steps for network scanning, service enumeration, domain information gathering, vulnerability scanning, and brute forcing directories and files.
Beginner
1hrs average
develop practical skills in securing a wordpress installation through the setup of firewalls and ACLs
Easy
2hrs average
This project aims to identify and address unauthorized access within the cybersecurity team at 4Geeks Academy. By analyzing user permissions, system logs, and suspicious activities, we will pinpoint the malicious user, understand their actions, and implement corrective measures to ensure the security of the Ubuntu-based web server. The project involves a detailed review of permissions, continuous monitoring, and enhanced security training for the team to prevent future incidents.
Intermediate
2hrs average
Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.
Intermediate
1hrs average
Based on the requirements presented to you, create a database model that responds to the proposal.
Intermediate
2hrs average
Learn how to install Kali Linux on a virtual machine to explore and use this powerful security tool in a safe and flexible environment.
Beginner
2hrs average
This project aims to teach students how to exploit vulnerabilities found in a vulnerable machine (Metasploitable) during the reconnaissance phase. It includes detecting exploitable vulnerabilities, performing exploitation, privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.
Intermediate
1hrs average
This practice will guide you through the process of installing bWAPP using a pre-configured virtual machine (BeeBox), including steps for setting up and customizing the environment for web security testing.
Beginner
2hrs average
Learn how to use Nmap for network analysis and vulnerability detection by scanning ports, identifying active hosts, and checking services on a target machine to find security weaknesses.
Intermediate
4hrs average
Create an AI-powered Excuse Generator using Python or JavaScript. Learn to connect with ChatGPT's API and generate creative excuses. Perfect for coding practice!
Beginner
2hrs average
This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.
Intermediate
1hrs average
Create a mockup and establish the fundamental visual parameters that will guide the development of your fullstack web application.
Intermediate
3hrs average
Create a script to back up a WordPress website, including the files and the database. The script should generate a compressed file with all the backups made. This project should be executed on a Debian system with WordPress deployed.
Intermediate
1hrs average
This project aims to teach students how to perform the reconnaissance phase on a vulnerable machine (Metasploitable). It includes steps for finding the target's IP address, gathering information about the operating system and versions, enumerating ports and services, and describing potential vulnerabilities and breaches.
Beginner
2hrs average
Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.
Intermediate
3hrs average
Learn how to install DVWA on a virtual machine to practice and report SQL injection vulnerabilities according to ISO 27001 standards.
Intermediate
1hrs average
Once you have defined the scope, it is a good idea to generate the database model before you start coding. This will help you to speed up the development of your project.
Intermediate
Discover key considerations and avoid common mistakes when choosing your final project. Learn from these experienced tips to ensure success in your project journey.