Browse our list of curated database of projects, exercises, and lessons to learn cybersecurity
Learn everything about SQL Injection
How to evade firewalls using tools like NMAP, VPNs and verify bypass Methods for Optimized Network Security**
Identify vulnerabilities like lack of anti-CSRF tokens in HTML forms and learn effective solutions to mitigate CSRF attacks and enhance security.
Learn how to install and use Metasploitable 2, a vulnerable virtual machine designed for practicing penetration testing and enhancing cybersecurity skills. This guide covers common vulnerabilities and installation prerequisites, offering detailed instructions for setting up Metasploitable 2 on VirtualBox.
Mastering Information Gathering for Penetration Testing: Essential Techniques and Tools for Effective Reconnaissance
Discover the Top 10 Practices to Ensure Security in Your Web Hosting and Protect Your Data and Business Reputation.
Identify Key Risks and Challenges in Cloud Migration: From Misconfigurations to Data Leaks and Insider Threats
Optimizing Network Security with Firewalls: Types, Advantages, Disadvantages, and Architectures - Complete Guide
Comprehensive Guide to Intrusion Detection Systems (IDS): Types, Functionality, and Best Practices for Network Security
Strengthen the security of your applications: Strategies, tools, and best practices to protect your data and users against cyber threats
Network security protects the access, use, and integrity of network data. It includes firewalls, antivirus, email security, VPNs, and access control. It prevents threats and ensures that only authorized users access resources.
Learn how to enhance network security by configuring packet filtering rules in a firewall.
Explore the critical aspects of network security, including authentication, access control, threat management, and data protection.
Planificación y ejecución de respaldos: Garantiza la seguridad y disponibilidad de tus datos. Aprende estrategias y herramientas para respaldar y recuperar información de manera efectiva.
Prácticas esenciales para la administración segura de usuarios y grupos en servidores Linux: Gestión eficiente y asignación adecuada de permisos.
Manage users and groups in Linux: practical guide for security and efficiency. Create, manage and assign permissions securely. Optimize your system!
Discover the basics of Linux: security, user management, strong passwords and firewalls. Learn how to protect your system and more.
Explore the fundamentals of computer networks, from different types to key protocols and essential devices. Learn more about IP addresses, routers, and switches!
Explore the realm of cybersecurity as we delve into the differences between cyber threats and cyber attacks. Uncover the ten most common cyber threats and gain insights into prevalent cyber attacks.
4hrs average
Master red team tactics with dozens of hands-on exercises focused on exploiting the OWASP Top 10 vulnerabilities. Perfect for ethical hackers and penetration testers looking to sharpen their offensive security skills.
2hrs average
This project aims to teach students how to exploit vulnerabilities found in a vulnerable machine (Metasploitable) during the reconnaissance phase. It includes detecting exploitable vulnerabilities, performing exploitation, privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.
1hrs average
This practice will guide you through the process of installing bWAPP using a pre-configured virtual machine (BeeBox), including steps for setting up and customizing the environment for web security testing.
2hrs average
Learn the use of Nmap for network analysis and vulnerability detection.
2hrs average
Learn how to install Kali Linux on a virtual machine to explore and use this powerful security tool in a safe and flexible environment.
2hrs average
Learn how to use iptables to block incoming requests by protocol or port
3hrs average
Analyze the elements of a network, and identify where are being applied the concepts you already know
🔍 What is Cross-Site Scripting, examples and how to recreate the attack or prevent it on you web application
🔍 What is OWASP and why is it so important for mastering cibersecurity
Documentation of activities performed during penetration testing: Key Steps for Detailed, Clear, and Effective Reporting
Explore the world of security incidents, incident response, and the importance of an Incident Response Plan (IRP) in Spain's cybersecurity field
Master Pentesting: Essential Tools for Security Assessment - Explore Info Gathering, Exploitation, Vulnerability Analysis & More!
Choosing a web hosting vendor can be challenging, in the article we analyze the most popular web hostings from a security point of view
Protecting Your Digital Assets: Key Concepts of Cloud Security for Businesses and Users - Everything You Need to Know About Cloud Security
Explore the world of Access Control Lists (ACLs) in networking: types, implementation, and application for efficient security.
Protect your information with these practical and effective end user security best practices and decaloge
Explore top virtual machines for cybersecurity training, including Metasploitable, DVWA, and OWASP WebGoat. Master skills like SQL injection, XSS, and network security through hands-on labs. Ideal for beginners to advanced learners. Enhance your cybersecurity expertise effectively.
Discover solutions to common issues on VirtualBox. From installation errors to performance problems, our guide covers everything you need to know to troubleshoot effectively.
Discover the basics of the command line: how to navigate, manipulate files and manage permissions in Linux. Learn from scratch in this complete tutorial!
Optimiza la seguridad de tu servidor: Configuración del firewall, gestión de usuarios y registros de auditoría en Linux. Aprende paso a paso.
Administra servidores: Instala Linux en Máquina Virtual. Descubre conceptos, ventajas y más. ¡Comienza ya!
Discover how to manage packages and software in Linux: installation, update, uninstallation and dependency management efficiently and safely.
Explore the essential functions of security incident management. Learn how organizations detect, respond to, and mitigate security threats for damage minimization and regulatory compliance
Explore the basics of IT and ICT, programming languages, understand the importance of cybersecurity and dive into the history of computer science.
Understanding Global Frameworks and Their Impact on Cybersecurity Practices
Explore the diverse disciplines within cybersecurity, its crucial role in protecting sensitive data, and the three pillars: Confidentiality, Availability, and Integrity.
2hrs average
This project aims to consolidate the knowledge gained from previous pentesting exercises to propose preventive measures against identified vulnerabilities. The focus is on developing a comprehensive report that details identified vulnerabilities, exploitation techniques used, and recommendations for preventing future exploits.
1hrs average
This project aims to teach students how to perform the reconnaissance phase on a vulnerable machine (Metasploitable). It includes steps for finding the target's IP address, gathering information about the operating system and versions, enumerating ports and services, and describing potential vulnerabilities and breaches.
2hrs average
Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.
3hrs average
Learn how to install DVWA on a virtual machine to practice and report SQL injection vulnerabilities according to ISO 27001 standards.
2hrs average
Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.
3hrs average
Generate a script to backup a Wordpress website including its data and save it in a compressed file.
3hrs average
Setup a network with Packet Tracer, and implement Access Control List to ensure the correct use of the servers in it.
Learn essential firewall evasion techniques to bypass Web Application Firewalls (WAFs) and enhance your cybersecurity skills. Master methods like encoding, parameter tampering, and more in this concise, practical lesson for security professionals.
Exploring IDS/IPS Tools: Snort, Suricata, Quickdraw, Zeek, OSSEC, and Wazuh - Advanced Protection for Networks and Control Systems
What is Metasploit and how to use it for pentesting, key components and complementary tools
Understanding the Legal Landscape of Cybersecurity in The United States of America: Key Laws, Regulations, and the Role of Incident Response Plans in Protecting Digital Infrastructure.
Planning, Reconnaissance, Scanning, Exploitation, Post-Exploitation, Analysis and Reporting, Remediation and Validation
Discover the Top 10 Security Best Practices for Cloud Clients: From Data Protection to Operational Security and User Management
Protecting Data: Wireless Security in Wi-Fi Networks. Avoid Threats and Vulnerabilities, Keep Your Connection Secure.
Intrusion Prevention Systems (IPS) are vital for cybersecurity, actively neutralizing threats in real-time. With 70% of organizations facing cyberattacks, understanding IPS can enhance your network's defense strategy and protect sensitive data effectively.
Protecting Information: Threats, Vulnerabilities, and Security Measures
Here are ten key strategies for securing web applications, along with top-rated tools like Hydra, OWASP ZAP, Burp Suite, and Acunetix for effective implementation. These strategies cover areas such as secure coding practices, WAF deployment, security testing, authentication, secure communication, updates, monitoring, training, third-party services, and incident response planning.
Explore the significance of cybersecurity awareness in today's digital landscape and its crucial role in protecting individuals and organizations.
Automatización eficiente: Configura cron en Linux para optimizar tareas repetitivas y asegurar la estabilidad del servidor. Aprende paso a paso.
Conoce como configurar los servicios básicos de red para mejorar la seguridad de tu servidor.
Linux security basics and best practices: how to secure your system, manage users, strong passwords, firewalls, and more.
Navigating and manipulating files in Linux: Essential commands and good practices for system administrators.
5hrs average
Get to know the possibilities of connection between virtual machines in VirtualBox
Explore the fundamentals of the Security Triad (CIA: Confidentiality, Integrity, Availability) and safeguard your data in the digital realm.
Empowering Tomorrow's Cyber Guardians: Dive Into Our Intensive 16-Week Cybersecurity Bootcamp for Lucrative Career Opportunities!
Uncover the vital role of legal and regulatory compliance in cybersecurity. Learn about ISO 27001, ENS, and NIST standards.
2hrs average
This project focuses on teaching students how to exploit vulnerabilities found in a vulnerable web application (DVWA) using Metasploit. It includes confirming vulnerabilities, exploiting them, performing privilege escalation, and documenting the process. Note: Post-exploitation activities are not included.
1hrs average
This project aims to teach students how to perform the reconnaissance phase on a vulnerable website (bWAPP in BeeBox VM). It includes steps for network scanning, service enumeration, domain information gathering, vulnerability scanning, and brute forcing directories and files.
1hrs average
develop practical skills in securing a wordpress installation through the setup of firewalls and ACLs
2hrs average
This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.
2hrs average
Learn how to make a basic deployment of a website with Wordpress, one of the most popular content management software.
5hrs average
Create a network between 2 virtual machines and with access to the external network. Perform tests to validate the connection.