Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started

Learn Cybersecurity

Lessons, exercises, and projects about Cybersecurity

Browse our list of curated database of projects, exercises, and lessons to learn cybersecurity

Understanding SQL Injection: The Second Most Critical OWASP Vulnerability

Learn everything about SQL Injection

How to evade firewalls using tools like NMAP, VPNs and verify bypass Methods for Optimized Network Security**

Identify vulnerabilities like lack of anti-CSRF tokens in HTML forms and learn effective solutions to mitigate CSRF attacks and enhance security.

Learn how to install and use Metasploitable 2, a vulnerable virtual machine designed for practicing penetration testing and enhancing cybersecurity skills. This guide covers common vulnerabilities and installation prerequisites, offering detailed instructions for setting up Metasploitable 2 on VirtualBox.

Mastering Information Gathering for Penetration Testing: Essential Techniques and Tools for Effective Reconnaissance

Discover the Top 10 Practices to Ensure Security in Your Web Hosting and Protect Your Data and Business Reputation.

Identify Key Risks and Challenges in Cloud Migration: From Misconfigurations to Data Leaks and Insider Threats

Optimizing Network Security with Firewalls: Types, Advantages, Disadvantages, and Architectures - Complete Guide

Comprehensive Guide to Intrusion Detection Systems (IDS): Types, Functionality, and Best Practices for Network Security

Strengthen the security of your applications: Strategies, tools, and best practices to protect your data and users against cyber threats

Network security protects the access, use, and integrity of network data. It includes firewalls, antivirus, email security, VPNs, and access control. It prevents threats and ensures that only authorized users access resources.

Learn how to enhance network security by configuring packet filtering rules in a firewall.

Explore the critical aspects of network security, including authentication, access control, threat management, and data protection.

Planificación y ejecución de respaldos: Garantiza la seguridad y disponibilidad de tus datos. Aprende estrategias y herramientas para respaldar y recuperar información de manera efectiva.

Prácticas esenciales para la administración segura de usuarios y grupos en servidores Linux: Gestión eficiente y asignación adecuada de permisos.

Manage users and groups in Linux: practical guide for security and efficiency. Create, manage and assign permissions securely. Optimize your system!

Discover the basics of Linux: security, user management, strong passwords and firewalls. Learn how to protect your system and more.

Explore the fundamentals of computer networks, from different types to key protocols and essential devices. Learn more about IP addresses, routers, and switches!

Learn how this powerful tool works, and learn how to create a virtual machine.

Explore the realm of cybersecurity as we delve into the differences between cyber threats and cyber attacks. Uncover the ten most common cyber threats and gain insights into prevalent cyber attacks.

4hrs average

Master red team tactics with dozens of hands-on exercises focused on exploiting the OWASP Top 10 vulnerabilities. Perfect for ethical hackers and penetration testers looking to sharpen their offensive security skills.

2hrs average

This project aims to teach students how to exploit vulnerabilities found in a vulnerable machine (Metasploitable) during the reconnaissance phase. It includes detecting exploitable vulnerabilities, performing exploitation, privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

1hrs average

This practice will guide you through the process of installing bWAPP using a pre-configured virtual machine (BeeBox), including steps for setting up and customizing the environment for web security testing.

2hrs average

Learn the use of Nmap for network analysis and vulnerability detection.

1hrs average

2hrs average

Learn how to install Kali Linux on a virtual machine to explore and use this powerful security tool in a safe and flexible environment.

2hrs average

Learn how to use iptables to block incoming requests by protocol or port

3hrs average

Analyze the elements of a network, and identify where are being applied the concepts you already know

🔍 What is Cross-Site Scripting, examples and how to recreate the attack or prevent it on you web application

🔍 What is OWASP and why is it so important for mastering cibersecurity

Documentation of activities performed during penetration testing: Key Steps for Detailed, Clear, and Effective Reporting

Explore the world of security incidents, incident response, and the importance of an Incident Response Plan (IRP) in Spain's cybersecurity field

Master Pentesting: Essential Tools for Security Assessment - Explore Info Gathering, Exploitation, Vulnerability Analysis & More!

Choosing a web hosting vendor can be challenging, in the article we analyze the most popular web hostings from a security point of view

Protecting Your Digital Assets: Key Concepts of Cloud Security for Businesses and Users - Everything You Need to Know About Cloud Security

Explore the world of Access Control Lists (ACLs) in networking: types, implementation, and application for efficient security.

Protect your information with these practical and effective end user security best practices and decaloge

Explore top virtual machines for cybersecurity training, including Metasploitable, DVWA, and OWASP WebGoat. Master skills like SQL injection, XSS, and network security through hands-on labs. Ideal for beginners to advanced learners. Enhance your cybersecurity expertise effectively.

Discover solutions to common issues on VirtualBox. From installation errors to performance problems, our guide covers everything you need to know to troubleshoot effectively.

Discover the basics of the command line: how to navigate, manipulate files and manage permissions in Linux. Learn from scratch in this complete tutorial!

Optimiza la seguridad de tu servidor: Configuración del firewall, gestión de usuarios y registros de auditoría en Linux. Aprende paso a paso.

Administra servidores: Instala Linux en Máquina Virtual. Descubre conceptos, ventajas y más. ¡Comienza ya!

Discover how to manage packages and software in Linux: installation, update, uninstallation and dependency management efficiently and safely.

Explore the essential functions of security incident management. Learn how organizations detect, respond to, and mitigate security threats for damage minimization and regulatory compliance

Explore the basics of IT and ICT, programming languages, understand the importance of cybersecurity and dive into the history of computer science.

Understanding Global Frameworks and Their Impact on Cybersecurity Practices

Explore the diverse disciplines within cybersecurity, its crucial role in protecting sensitive data, and the three pillars: Confidentiality, Availability, and Integrity.

2hrs average

This project aims to consolidate the knowledge gained from previous pentesting exercises to propose preventive measures against identified vulnerabilities. The focus is on developing a comprehensive report that details identified vulnerabilities, exploitation techniques used, and recommendations for preventing future exploits.

1hrs average

This project aims to teach students how to perform the reconnaissance phase on a vulnerable machine (Metasploitable). It includes steps for finding the target's IP address, gathering information about the operating system and versions, enumerating ports and services, and describing potential vulnerabilities and breaches.

2hrs average

Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.

3hrs average

Learn how to install DVWA on a virtual machine to practice and report SQL injection vulnerabilities according to ISO 27001 standards.

2hrs average

Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.

3hrs average

Generate a script to backup a Wordpress website including its data and save it in a compressed file.

2hrs average

Creating an update system script for Debian

3hrs average

Setup a network with Packet Tracer, and implement Access Control List to ensure the correct use of the servers in it.

Learn essential firewall evasion techniques to bypass Web Application Firewalls (WAFs) and enhance your cybersecurity skills. Master methods like encoding, parameter tampering, and more in this concise, practical lesson for security professionals.

Exploring IDS/IPS Tools: Snort, Suricata, Quickdraw, Zeek, OSSEC, and Wazuh - Advanced Protection for Networks and Control Systems

What is Metasploit and how to use it for pentesting, key components and complementary tools

Understanding the Legal Landscape of Cybersecurity in The United States of America: Key Laws, Regulations, and the Role of Incident Response Plans in Protecting Digital Infrastructure.

Planning, Reconnaissance, Scanning, Exploitation, Post-Exploitation, Analysis and Reporting, Remediation and Validation

Discover the Top 10 Security Best Practices for Cloud Clients: From Data Protection to Operational Security and User Management

Protecting Data: Wireless Security in Wi-Fi Networks. Avoid Threats and Vulnerabilities, Keep Your Connection Secure.

Intrusion Prevention Systems (IPS) are vital for cybersecurity, actively neutralizing threats in real-time. With 70% of organizations facing cyberattacks, understanding IPS can enhance your network's defense strategy and protect sensitive data effectively.

Protecting Information: Threats, Vulnerabilities, and Security Measures

Here are ten key strategies for securing web applications, along with top-rated tools like Hydra, OWASP ZAP, Burp Suite, and Acunetix for effective implementation. These strategies cover areas such as secure coding practices, WAF deployment, security testing, authentication, secure communication, updates, monitoring, training, third-party services, and incident response planning.

Explore the significance of cybersecurity awareness in today's digital landscape and its crucial role in protecting individuals and organizations.

Automatización eficiente: Configura cron en Linux para optimizar tareas repetitivas y asegurar la estabilidad del servidor. Aprende paso a paso.

Conoce como configurar los servicios básicos de red para mejorar la seguridad de tu servidor.

Linux security basics and best practices: how to secure your system, manage users, strong passwords, firewalls, and more.

Navigating and manipulating files in Linux: Essential commands and good practices for system administrators.

5hrs average

Get to know the possibilities of connection between virtual machines in VirtualBox

Explore the fundamentals of the Security Triad (CIA: Confidentiality, Integrity, Availability) and safeguard your data in the digital realm.

Empowering Tomorrow's Cyber Guardians: Dive Into Our Intensive 16-Week Cybersecurity Bootcamp for Lucrative Career Opportunities!

Uncover the vital role of legal and regulatory compliance in cybersecurity. Learn about ISO 27001, ENS, and NIST standards.

2hrs average

This project focuses on teaching students how to exploit vulnerabilities found in a vulnerable web application (DVWA) using Metasploit. It includes confirming vulnerabilities, exploiting them, performing privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.

1hrs average

This project aims to teach students how to perform the reconnaissance phase on a vulnerable website (bWAPP in BeeBox VM). It includes steps for network scanning, service enumeration, domain information gathering, vulnerability scanning, and brute forcing directories and files.

1hrs average

develop practical skills in securing a wordpress installation through the setup of firewalls and ACLs

2hrs average

2hrs average

This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.

2hrs average

Learn how to make a basic deployment of a website with Wordpress, one of the most popular content management software.

5hrs average

Create a network between 2 virtual machines and with access to the external network. Perform tests to validate the connection.

3hrs average

Build your first network on Packet Tracer