Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started

Learn Cybersecurity

Lessons, exercises, and projects about Cybersecurity

Browse our list of curated database of projects, exercises, and lessons to learn cybersecurity

Vulnerabilities and Threats to Data Security

Protecting Information: Threats, Vulnerabilities, and Security Measures


Types of Network Security

Network security protects the access, use, and integrity of network data. It includes firewalls, antivirus, email security, VPNs, and access control. It prevents threats and ensures that only authorized users access resources.


Basic concepts in network security

Learn how to enhance network security by configuring packet filtering rules in a firewall.


1hrs average


2hrs average

Installing Kali Linux on a Virtual Machine

Learn how to install Kali Linux on a virtual machine to explore and use this powerful security tool in a safe and flexible environment.


2hrs average

Blocking ping requests with iptables

Learn how to use iptables to block incoming requests by protocol or port


3hrs average

Understanding the network internals

Analyze the elements of a network, and identify where are being applied the concepts you already know


End user security best practices

Protect your information with these practical and effective end user security best practices and decaloge


Virtual Machines to practice cybersecurity

Explore top virtual machines for cybersecurity training, including Metasploitable, DVWA, and OWASP WebGoat. Master skills like SQL injection, XSS, and network security through hands-on labs. Ideal for beginners to advanced learners. Enhance your cybersecurity expertise effectively.


Common issues on Virtualbox

Discover solutions to common issues on VirtualBox. From installation errors to performance problems, our guide covers everything you need to know to troubleshoot effectively.


2hrs average

Example Traffic Simulation on Wordpress using Apache Benchmark

Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.


3hrs average

Scheduling automatic Wordpress backup

Generate a script to backup a Wordpress website including its data and save it in a compressed file.


2hrs average

Creating an update system script for Debian

Creating an update system script for Debian


3hrs average

Network Troubleshooting Packet Tracer

Setup a network with Packet Tracer, and implement Access Control List to ensure the correct use of the servers in it.


Web application security best practices

Here are ten key strategies for securing web applications, along with top-rated tools like Hydra, OWASP ZAP, Burp Suite, and Acunetix for effective implementation. These strategies cover areas such as secure coding practices, WAF deployment, security testing, authentication, secure communication, updates, monitoring, training, third-party services, and incident response planning.



2hrs average


2hrs average

Attacking with spoofing and DoS on a WordPress website

This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.


2hrs average

Deploying Wordpress Site on Debian

Learn how to make a basic deployment of a website with Wordpress, one of the most popular content management software.


5hrs average

Creating a NAT network on VirtualBox

Create a network between 2 virtual machines and with access to the external network. Perform tests to validate the connection.


3hrs average

Introduction to Packet Tracer

Build your first network on Packet Tracer