WE ARE HACKADEMY

In the true sense of the word hacking is about exploring, understand how things work and we can change them in order to make them operate as we want too.

Looking for the shop ? It’s right HERE

Information Security Information Security
Get to know some of the ins and outs of cyber security methods and practices
Web Development Web Development
Build responsive WordPress websites with tons of features and a App that fetches the site data using Ionic framework
Virtual Reality Virtual Reality
Build from scratch different Virtual Reality projects and get the knowledge to build your own.

Our goal is to share the passion for IT with the world, you'll find practical lessons based on real life situation that will help you out even if you are a student, professional our just curious to learn something new.

Student testimonials

Telmo Lourenço Telmo Lourenço
I liked very much this course, now I can understand how i can use GPDR.
About: Data anonymization and GDPR
 Abdullah Maghram Abdullah Maghram
The instructor manage successfully to explain the course in a simple way.
About: Car race with Virtual Reality
Gonzales Gonzales
I am a Leap newbie and this course allows me to give the first steps, practical and simple.
About:Labyrinth game in Unity 3D with Leap support
 Joel Serrano Joel Serrano
Valuable information, Clear explanations, Engaging delivery, Helpful practice activities, Accurate course description, Knowledgeable instructor
About: Create an ECommerce website, App and connect them (extended)
 Samantha Carbon Samantha Carbon
So far a great delivery. Lots of detail and enjoying the pace. I am taking lots of notes and looking forward to fully completing. Great engagement.

About: Create an ECommerce website, App and connect them (extended)

All of these reviews, and more, are available HERE.

More than 6.400 students

Average rating of 4.5

FIND OUR COURSES

Data anonymization and GDPR Data anonymization and GDPR

Data anonymization is a type of information sanitisation whose intent is privacy protection. It is the process of either encrypting or removing personally identifiable information from data sets, so that the people whom the data describe remain anonymous.

Ethical Hacking - USB Keystroke injection with DigiSpark Ethical Hacking - USB Keystroke injection with DigiSpark

Automate your processes or perform a stealth pen-test assessment with this new kind of technical approach.

Ethical Hacking - Master Information Security Ethical Hacking - Master Information Security

Get to know some of the ins and outs of cyber security methods and practices

How I created 3 official WordPress plugins How I created 3 official WordPress plugins

Learn how to create real live production plugins from scratch and boost your WordPress knowledge

Create an ECommerce website, App and connect them (extended) Create an ECommerce website, App and connect them (extended)

Build a responsive WordPress website with tons of features and a App that fetches the site data using Ionic framework

Car race with Virtual Reality Car race with Virtual Reality

Build your virtual reality driving experience with unity 3D.

Create your Virtual Reality experiences (extended) Create your Virtual Reality experiences (extended)

Build from scratch 4 different Virtual Reality projects and get the knowledge to build your own.

 Labyrinth game in Unity 3D with Leap support Labyrinth game in Unity 3D with Leap support

Make a digital version of the labyrinth game in Unity 3D with Leap Motion device support for an immersive interaction.

WordPress Gutenberg WordPress Gutenberg

Understand how WordPress’s Gutenberg works and how to create your custom blocks