• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
Log In
Join for Free
Coursera
  • Browse
  • Hacking

Hacking Courses Online

Study ethical hacking for cybersecurity. Learn to identify vulnerabilities, perform penetration tests, and implement security measures.

Skip to search results

Filter by

Subject
Required
 *

Language
Required
 *

The language used throughout the course, in both instruction and assessments.

Learning Product
Required
 *

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required
 *

Duration
Required
 *

Skills
Required
 *

Subtitles
Required
 *

Educator
Required
 *

Explore the Hacking Course Catalog

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Linux Administration, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Management, Vulnerability Assessments, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Network Troubleshooting, Anomaly Detection, Cyber Attacks, Computer Security, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    86 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Certified Ethical Hacking (v12)

    Skills you'll gain: Network Security, Penetration Testing, Threat Modeling, Cryptography, Threat Management, Virtual Machines

    4.7
    Rating, 4.7 out of 5 stars
    ·
    265 reviews

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Ethical Hacking Essentials (EHE)

    Skills you'll gain: Penetration Testing, Threat Modeling, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Security Awareness, Cybersecurity, Cloud Computing, Intrusion Detection and Prevention, Cyber Attacks, Application Security, Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    571 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    The Complete Ethical Hacking Bootcamp: Beginner To Advanced

    Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, General Networking, Scripting Languages, Cyber Security Assessment, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Computer Networking

    4.4
    Rating, 4.4 out of 5 stars
    ·
    40 reviews

    Beginner · Specialization · 3 - 6 Months

  • U

    University of Maryland, College Park

    Cybersecurity for Everyone

    Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security, Threat Modeling, Infrastructure Security, Telecommunications, Threat Detection, Enterprise Security, Security Awareness, General Networking, Data Security, Vulnerability, Public Safety and National Security, Governance

    4.7
    Rating, 4.7 out of 5 stars
    ·
    3.2K reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    G

    Google

    Foundations of Cybersecurity

    Skills you'll gain: Cybersecurity, Security Controls, Cyber Attacks, Security Management, Cyber Security Strategy, Incident Response, Cyber Risk, Security Information and Event Management (SIEM), Information Assurance, Data Ethics, Network Analysis, Ethical Standards And Conduct

    Build toward a degree

    4.9
    Rating, 4.9 out of 5 stars
    ·
    38K reviews

    Beginner · Course · 1 - 4 Weeks

What brings you to Coursera today?

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    IBM

    Ethical Hacking with Kali Linux

    Skills you'll gain: Linux Administration, Bash (Scripting Language), Network Monitoring, Cyber Security Assessment, Exploit development, Intrusion Detection and Prevention, System Configuration, Virtual Machines

    4.9
    Rating, 4.9 out of 5 stars
    ·
    31 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Penetration Testing, Threat Hunting, and Cryptography

    Skills you'll gain: Cyber Threat Hunting, Cyber Threat Intelligence, Threat Modeling, Penetration Testing, Threat Detection, MITRE ATT&CK Framework, Cryptography, Security Testing, Application Security, Encryption, Cybersecurity, Vulnerability Scanning, Open Web Application Security Project (OWASP), Vulnerability Assessments, Exploitation techniques, Test Planning

    4.6
    Rating, 4.6 out of 5 stars
    ·
    2.5K reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Introduction to Cybersecurity Tools & Cyberattacks

    Skills you'll gain: Malware Protection, Identity and Access Management, Incident Response, Cybersecurity, Computer Security Incident Management, Network Security, Threat Detection, Cyber Attacks, Authentications, Distributed Denial-Of-Service (DDoS) Attacks, Security Awareness, Security Controls, Multi-Factor Authentication, Human Factors (Security)

    4.6
    Rating, 4.6 out of 5 stars
    ·
    16K reviews

    Beginner · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security and Ethical Hacking

    Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

    4.4
    Rating, 4.4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Cyber Operations, Security Testing, Vulnerability Scanning, Network Security, Operating Systems, Encryption

    3.5
    Rating, 3.5 out of 5 stars
    ·
    13 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    L

    LearnKartS

    Ethical Hacking Fundamentals

    Skills you'll gain: Cybersecurity, Penetration Testing, Cyber Attacks, Cyber Threat Intelligence, Cyber Security Assessment, Network Security, Intrusion Detection and Prevention, Application Security, Security Awareness, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Web Servers

    4.7
    Rating, 4.7 out of 5 stars
    ·
    186 reviews

    Intermediate · Course · 1 - 4 Weeks

Hacking learners also search

Information Security
Information Science
Privacy
Information Engineering
Data Security
Software Security
Network Security
Web Security
1234…12

In summary, here are 10 of our most popular hacking courses

  • IBM Ethical Hacking with Open Source Tools: IBM
  • Certified Ethical Hacking (v12): LearnKartS
  • Ethical Hacking Essentials (EHE): EC-Council
  • The Complete Ethical Hacking Bootcamp: Beginner To Advanced: Packt
  • Cybersecurity for Everyone: University of Maryland, College Park
  • Foundations of Cybersecurity: Google
  • Ethical Hacking with Kali Linux: IBM
  • Penetration Testing, Threat Hunting, and Cryptography: IBM
  • Introduction to Cybersecurity Tools & Cyberattacks: IBM
  • Security and Ethical Hacking: University of Colorado Boulder

Frequently Asked Questions about Hacking

Whether you’re interested in cybersecurity or ethical hacking, having a clear goal can keep you motivated. Regular practice in coding, cryptography, and network security is essential. Engage in communities like Reddit’s r/hacking to learn and share knowledge. Work on real projects by participating in Capture The Flag (CTF) challenges. A great start is Introduction to Cyber Security Specialization by NYU.‎

Hacking refers to the unauthorized access, manipulation, or exploitation of computer systems, networks, or software. It involves activities such as identifying vulnerabilities, bypassing security measures, and gaining unauthorized access to steal, modify, or destroy data. Hacking can be done for various purposes such as personal gain, activism, or cybersecurity testing. It is important to note that hacking activities are illegal unless carried out with explicit permission and in an ethical manner.‎

If you are interested in learning hacking, there are several skills that are crucial to develop. These skills include:

  1. Basic computer knowledge: Understanding how computers and networks function is essential before diving into hacking. Familiarize yourself with operating systems (such as Windows, Linux, or macOS), network protocols, and computer hardware.

  2. Networking and protocols: Learn about different networking concepts, TCP/IP, routing, and switching. Understanding how data is transmitted and network protocols work is fundamental for being able to exploit vulnerabilities.

  3. Programming: Proficiency in programming languages like Python, JavaScript, C++, or Ruby is essential. Scripting languages will assist you in automating tasks and developing exploits.

  4. Linux: Familiarize yourself with the Linux operating system, as many hacking tools and techniques are more readily available on this platform. Learn basic Linux commands, file systems, and navigation.

  5. Web application security: Understand web technologies like HTML, CSS, JavaScript, and web application frameworks. Being able to identify common web vulnerabilities, such as cross-site scripting (XSS) and SQL injection, is crucial.

  6. Cryptography: Gain knowledge of encryption algorithms, cryptographic protocols, and their vulnerabilities. Understanding cryptography will help you identify weaknesses in cryptographic systems and exploit them.

  7. Ethical hacking: Familiarize yourself with the legal and ethical implications of hacking. Learn about different hacking techniques, tools, and methodologies used by ethical hackers to identify and fix vulnerabilities.

  8. Social engineering: Developing skills in social engineering helps you manipulate or deceive individuals to gain unauthorized access to systems. Understand the psychology behind human behavior and how to exploit it effectively.

  9. Vulnerability assessment and penetration testing: Learn tools and methodologies used for vulnerability assessment and penetration testing, such as Kali Linux, Metasploit, and Burp Suite. These skills enable you to identify and exploit vulnerabilities in systems.

It is important to note that hacking should be used ethically and responsibly. Always obtain proper authorization and never engage in any illegal activities.‎

With hacking skills, you can pursue various job opportunities related to cybersecurity and ethical hacking. Some of the potential jobs include:

  1. Ethical Hacker: As an ethical hacker, you would be responsible for identifying vulnerabilities, testing security systems, and implementing measures to safeguard against cyber threats.

  2. Penetration Tester: Penetration testers simulate cyberattacks to evaluate the security of computer systems and networks. They provide recommendations for enhancing security and fixing vulnerabilities.

  3. Security Analyst: Security analysts monitor systems for potential security breaches, investigate incidents, and develop strategies to protect sensitive information from unauthorized access.

  4. Security Consultant: Security consultants offer expert advice and assistance on cybersecurity practices, risk assessments, and developing security policies for organizations.

  5. Information Security Manager: Information security managers develop and execute strategies to protect an organization's data and information systems. They oversee security operations and ensure compliance with industry regulations.

  6. Incident Response Analyst: Incident response analysts investigate and respond to security incidents, including identifying the cause, containing the breach, and conducting forensic analysis to prevent future incidents.

  7. Cybersecurity Engineer: Cybersecurity engineers design and implement security measures for computer systems, networks, and software applications to defend against cyber threats.

  8. Security Auditor: Security auditors assess an organization's security infrastructure, policies, and procedures. They identify vulnerabilities and provide recommendations for improving security.

  9. Cybersecurity Researcher: Cybersecurity researchers explore emerging threats, vulnerabilities, and develop innovative approaches to enhance security systems and protocols.

  10. Bug Bounty Hunter: Some hackers use their skills to find and report security vulnerabilities in applications or websites through bug bounty programs and earn rewards.

Remember, ethical hacking and cybersecurity careers require continual learning and staying updated with the latest techniques, tools, and regulations to combat ever-evolving cyber threats.‎

People who are curious, analytical, and have a strong problem-solving mindset are best suited for studying hacking. They should have a keen interest in technology, computer systems, and cybersecurity. Additionally, individuals who possess good programming skills, attention to detail, and the ability to think outside the box are likely to excel in this field. It is important for them to have a strong ethical foundation and a commitment to using their skills responsibly and legally.‎

Here are some topics related to Hacking that you can study:

  1. Ethical Hacking: Learn about legal and ethical hacking techniques used to identify vulnerabilities in computer systems and networks.

  2. Cybersecurity: Dive into the world of cybersecurity to understand how to secure computer systems, networks, and data from unauthorized access or attacks.

  3. Penetration Testing: Gain knowledge of conducting security assessments on computer systems and networks to identify potential vulnerabilities that could be exploited by hackers.

  4. Network Security: Explore the field of network security to understand how to protect the integrity and privacy of data transmitted across computer networks.

  5. Cryptography: Study the science of encryption and decryption to learn how cryptographic techniques can be used to secure data and communication channels.

  6. Web Application Security: Focus on securing web applications from common vulnerabilities such as cross-site scripting (XSS), SQL injection, and session hijacking.

  7. Wireless Security: Learn about securing wireless networks and understanding the vulnerabilities associated with wireless communication.

  8. Incident Response: Understand how to respond to and manage security incidents effectively, including incident detection, containment, eradication, and recovery.

  9. Social Engineering: Explore the psychological manipulation techniques used by hackers to exploit human vulnerabilities and learn how to mitigate such attacks.

  10. Malware Analysis: Study the analysis of malicious software to understand their behavior, potential impact, and methods of detection and removal.

Remember, while it is important to study these topics for educational purposes or career development, it is crucial to always follow legal and ethical guidelines when applying this knowledge.‎

Online Hacking courses offer a convenient and flexible way to enhance your knowledge or learn new Hacking refers to the unauthorized access, manipulation, or exploitation of computer systems, networks, or software. It involves activities such as identifying vulnerabilities, bypassing security measures, and gaining unauthorized access to steal, modify, or destroy data. Hacking can be done for various purposes such as personal gain, activism, or cybersecurity testing. It is important to note that hacking activities are illegal unless carried out with explicit permission and in an ethical manner. skills. Choose from a wide range of Hacking courses offered by top universities and industry leaders tailored to various skill levels.‎

When looking to enhance your workforce's skills in Hacking, it's crucial to select a course that aligns with their current abilities and learning objectives. Our Skills Dashboard is an invaluable tool for identifying skill gaps and choosing the most appropriate course for effective upskilling. For a comprehensive understanding of how our courses can benefit your employees, explore the enterprise solutions we offer. Discover more about our tailored programs at Coursera for Business here.‎

This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Manage Cookie Preferences
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok