Self-paced

Explore our extensive collection of courses designed to help you master various subjects and skills. Whether you're a beginner or an advanced learner, there's something here for everyone.

Bootcamp

Learn live

Join us for our free workshops, webinars, and other events to learn more about our programs and get started on your journey to becoming a developer.

Upcoming live events

Learning library

For all the self-taught geeks out there, here is our content library with most of the learning materials we have produced throughout the years.

It makes sense to start learning by reading and watching videos about fundamentals and how things work.

Search from all Lessons


LoginGet Started

Learn Networking

Lessons, exercises, and projects about Networking

Browse our list of curated database of projects, exercises, and lessons to learn Networking

Mastering Web App Firewall Evasion: Techniques and Best Practices

Learn essential firewall evasion techniques to bypass Web Application Firewalls (WAFs) and enhance your cybersecurity skills. Master methods like encoding, parameter tampering, and more in this concise, practical lesson for security professionals.

Protecting Data: Wireless Security in Wi-Fi Networks. Avoid Threats and Vulnerabilities, Keep Your Connection Secure.

Intrusion Prevention Systems (IPS) are vital for cybersecurity, actively neutralizing threats in real-time. With 70% of organizations facing cyberattacks, understanding IPS can enhance your network's defense strategy and protect sensitive data effectively.

Protect your information with these practical and effective end user security best practices and decaloge

Explore the fundamentals of computer networks, from different types to key protocols and essential devices. Learn more about IP addresses, routers, and switches!

3hrs average

This final project aims to simulate a comprehensive cybersecurity exercise where students assume the role of cybersecurity analysts tasked with restoring and protecting a compromised server at 4Geeks Academy. The project is divided into three phases: forensic analysis, vulnerability detection and correction, and incident response planning.

2hrs average

Learn the use of Nmap for network analysis and vulnerability detection.

2hrs average

This practice will allow you to better understand spoofing and DoS techniques, as well as their effects in a web environment.

2hrs average

Map your career to properly plan your job-search and find jobs that align with your skills and expectations

How to evade firewalls using tools like NMAP, VPNs and verify bypass Methods for Optimized Network Security**

Optimizing Network Security with Firewalls: Types, Advantages, Disadvantages, and Architectures - Complete Guide

Comprehensive Guide to Intrusion Detection Systems (IDS): Types, Functionality, and Best Practices for Network Security

Protect your web application: Concepts, threats, and security measures to mitigate risks and strengthen defense against cyberattacks.

Empowering Tomorrow's Cyber Guardians: Dive Into Our Intensive 16-Week Cybersecurity Bootcamp for Lucrative Career Opportunities!

4hrs average

Learn how to create a simulated network environment that includes a Demilitarized Zone, configure firewalls, gateways, and network detection systems, and ensure network security.

1hrs average

2hrs average

Learn how to use iptables to block incoming requests by protocol or port

Exploring IDS/IPS Tools: Snort, Suricata, Quickdraw, Zeek, OSSEC, and Wazuh - Advanced Protection for Networks and Control Systems

Explore the world of Access Control Lists (ACLs) in networking: types, implementation, and application for efficient security.

Strengthen the security of your applications: Strategies, tools, and best practices to protect your data and users against cyber threats

Learn how to enhance network security by configuring packet filtering rules in a firewall.

Learn how to use networking to your advantage when looking for a software development job

2hrs average

Learn how to configure a secure server using OpenSSL to provide secure communications via SSL/TLS.

2hrs average

Learn how to generate artificial traffic on the WordPress site and implement monitoring tools to detect surges in requests and evaluate server performance.

3hrs average

Setup a network with Packet Tracer, and implement Access Control List to ensure the correct use of the servers in it.