Learn ethical hacking from reconnaissance to exploitation. Set up a home lab, practice on legal targets, and write security reports.
Build a password strength analyzer that evaluates complexity, entropy, and common password patterns.
Build a multi-threaded port scanner that detects open ports, services, and banners on target hosts.
Build a cipher app supporting multiple classical ciphers with brute-force breaking capability.
Capture and analyze network packets, identify protocols, and detect suspicious traffic patterns.
Conduct a security assessment of a sample vulnerable web application and document findings.
+35 more projects available after enrollment
Build a real project in 4 weeks