Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Hacking Course Catalog
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Cybersecurity, Information Systems Security Assessment Framework (ISSAF), Cyber Security Strategy, Vulnerability Assessments, Cyber Threat Intelligence, Threat Modeling, Exploitation techniques, Cyber Security Policies, Computer Security, Security Controls, Data Security
- Status: Free Trial
University of Colorado System
Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
Skills you'll gain: General Networking, TCP/IP, Network Security, Penetration Testing, Wireless Networks, Exploitation techniques, Linux, Vulnerability Scanning, Linux Commands, Encryption, Network Analysis, Command-Line Interface, Virtual Machines
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
- Status: Free Trial
University of Colorado System
Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques
Coursera Project Network
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
- Status: Preview
University of Cape Town
Skills you'll gain: Design Thinking, Financial Inclusion, Risk Management, Business Modeling, Innovation, Performance Measurement, Resource Management, Strategic Partnership, Entrepreneurial Finance, Finance, Stakeholder Management, Due Diligence, Case Studies
Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
- Status: Free Trial
Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Cybersecurity, Malware Protection, Penetration Testing, Exploitation techniques, Threat Detection, Network Security, Information Systems Security, Security Awareness, Human Factors (Security), Lightweight Directory Access Protocols, Network Protocols
- Status: Free Trial
Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Software Installation, Virtual Machines, SQL
In summary, here are 10 of our most popular hacking courses
- Certified Ethical Hacker (CEH): Unit 1:Â Pearson
- Hacking and Patching:Â University of Colorado System
- Ethical Hacking Essentials: Hands-On Edition:Â EC-Council
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux:Â Packt
- Security & Ethical Hacking: Attacking Unix and Windows :Â University of Colorado Boulder
- Fundamentals of Computer Network Security:Â University of Colorado System
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Project Network
- An Introduction to Ethical Hacking with Kali Linux:Â Packt
- Innovative Finance: Hacking finance to change the world :Â University of Cape Town
- Web Hacking Expert - Full-Stack Exploitation Mastery:Â Packt