Browse our list of curated database of projects, exercises, and lessons to learn cybersecurity
Protecting Information: Threats, Vulnerabilities, and Security Measures
Network security protects the access, use, and integrity of network data. It includes firewalls, antivirus, email security, VPNs, and access control. It prevents threats and ensures that only authorized users access resources.
Learn how to enhance network security by configuring packet filtering rules in a firewall.
2hrs average
Learn how to install Kali Linux on a virtual machine to explore and use this powerful security tool in a safe and flexible environment.
2hrs average
Learn how to use iptables to block incoming requests by protocol or port
3hrs average
Analyze the elements of a network, and identify where are being applied the concepts you already know
Protect your information with these practical and effective end user security best practices and decaloge
Explore top virtual machines for cybersecurity training, including Metasploitable, DVWA, and OWASP WebGoat. Master skills like SQL injection, XSS, and network security through hands-on labs. Ideal for beginners to advanced learners. Enhance your cybersecurity expertise effectively.
Discover solutions to common issues on VirtualBox. From installation errors to performance problems, our guide covers everything you need to know to troubleshoot effectively.
2hrs average
Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.
3hrs average
Generate a script to backup a Wordpress website including its data and save it in a compressed file.
3hrs average
Setup a network with Packet Tracer, and implement Access Control List to ensure the correct use of the servers in it.
Here are ten key strategies for securing web applications, along with top-rated tools like Hydra, OWASP ZAP, Burp Suite, and Acunetix for effective implementation. These strategies cover areas such as secure coding practices, WAF deployment, security testing, authentication, secure communication, updates, monitoring, training, third-party services, and incident response planning.
2hrs average
This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.
2hrs average
Learn how to make a basic deployment of a website with Wordpress, one of the most popular content management software.
5hrs average
Create a network between 2 virtual machines and with access to the external network. Perform tests to validate the connection.