Browse our list of curated database of projects, exercises, and lessons to learn Networking
Learn essential firewall evasion techniques to bypass Web Application Firewalls (WAFs) and enhance your cybersecurity skills. Master methods like encoding, parameter tampering, and more in this concise, practical lesson for security professionals.
Protecting Data: Wireless Security in Wi-Fi Networks. Avoid Threats and Vulnerabilities, Keep Your Connection Secure.
Intrusion Prevention Systems (IPS) are vital for cybersecurity, actively neutralizing threats in real-time. With 70% of organizations facing cyberattacks, understanding IPS can enhance your network's defense strategy and protect sensitive data effectively.
Protect your information with these practical and effective end user security best practices and decaloge
Explore the fundamentals of computer networks, from different types to key protocols and essential devices. Learn more about IP addresses, routers, and switches!
3hrs average
This final project aims to simulate a comprehensive cybersecurity exercise where students assume the role of cybersecurity analysts tasked with restoring and protecting a compromised server at 4Geeks Academy. The project is divided into three phases: forensic analysis, vulnerability detection and correction, and incident response planning.
2hrs average
Learn the use of Nmap for network analysis and vulnerability detection.
2hrs average
This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.
2hrs average
Map your career to properly plan your job-search and find jobs that align with your skills and expectations
How to evade firewalls using tools like NMAP, VPNs and verify bypass Methods for Optimized Network Security**
Optimizing Network Security with Firewalls: Types, Advantages, Disadvantages, and Architectures - Complete Guide
Comprehensive Guide to Intrusion Detection Systems (IDS): Types, Functionality, and Best Practices for Network Security
Protect your web application: Concepts, threats, and security measures to mitigate risks and strengthen defense against cyberattacks.
Empowering Tomorrow's Cyber Guardians: Dive Into Our Intensive 16-Week Cybersecurity Bootcamp for Lucrative Career Opportunities!
4hrs average
Learn how to create a simulated network environment that includes a Demilitarized Zone, configure firewalls, gateways, and network detection systems, and ensure network security.
2hrs average
Learn how to use iptables to block incoming requests by protocol or port
Exploring IDS/IPS Tools: Snort, Suricata, Quickdraw, Zeek, OSSEC, and Wazuh - Advanced Protection for Networks and Control Systems
Explore the world of Access Control Lists (ACLs) in networking: types, implementation, and application for efficient security.
Strengthen the security of your applications: Strategies, tools, and best practices to protect your data and users against cyber threats
Learn how to enhance network security by configuring packet filtering rules in a firewall.
Learn how to use networking to your advantage when looking for a software development job
2hrs average
Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.
2hrs average
Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.
3hrs average
Setup a network with Packet Tracer, and implement Access Control List to ensure the correct use of the servers in it.