• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Hacking

Hacking Courses

Hacking courses can help you learn network security, penetration testing, ethical hacking techniques, and vulnerability assessment. You can build skills in threat analysis, incident response, and secure coding practices. Many courses introduce tools like Metasploit, Wireshark, and Burp Suite, that support testing and securing systems against potential attacks.

Popular Hacking Courses and Certifications


  • P

    Packt

    Reporting and Advanced Practices

    Skills you'll gain: Penetration Testing, Exploitation techniques, Test Script Development, Technical Communication, Scripting, Technical Writing, Programming Principles, Automation, Data Security

    ★ 4.6 (11) · Intermediate · Course · 1 - 4 Weeks

  • T

    Total Seminars

    Vulnerability Scanning Network Attacks

    Skills you'll gain: Vulnerability Scanning, Metasploit, Penetration Testing, Vulnerability Assessments, Cyber Security Assessment, Network Security, Vulnerability Management, Brute-force attacks, Exploitation techniques, Network Monitoring, Network Troubleshooting, Security Engineering, Network Analysis, Wireless Networks, Network Protocols, Data Manipulation

    Advanced · Course · 1 - 4 Weeks

  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 8

    Skills you'll gain: AI Security, Threat Modeling, Threat Management, LLM Application, MITRE ATT&CK Framework, LangChain, Threat Detection, Large Language Modeling, Continuous Monitoring, Event Monitoring, Security Testing, Cyber Threat Intelligence, Generative AI, Embeddings, LangGraph, Prompt Engineering, Vector Databases

    Intermediate · Course · 1 - 4 Weeks

  • K

    Kennesaw State University

    Cybersecurity: What to Do When You Are a Victim

    Skills you'll gain: Incident Response, Cybersecurity, Cyber Attacks, Computer Security Incident Management, Security Awareness, Computer Security Awareness Training, Personally Identifiable Information, Cyber Risk, Incident Management, Threat Detection, Information Privacy, Network Security, Multi-Factor Authentication

    ★ 5 (12) · Beginner · Course · 1 - 3 Months

  • U

    University of London

    Introduction to Network Security

    Skills you'll gain: Network Security, IT Security Architecture, OSI Models, TCP/IP, Threat Modeling, Network Protocols, Computer Networking, Cybersecurity, Application Security, Network Architecture, General Networking, Cryptographic Protocols, Vulnerability Assessments, Network Infrastructure, Exploit development, Network Model, Network Routing, Communication Systems

    ★ 4.9 (33) · Beginner · Course · 1 - 3 Months

  • U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Security Strategy, Vulnerability Scanning, Security Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Exploitation techniques, Java, Security Controls, Java Programming, Patch Management, Dependency Analysis, Docker (Software)

    ★ 4.4 (67) · Intermediate · Course · 1 - 4 Weeks

  • K

    Kennesaw State University

    Cybersecurity: Protecting your Information on the Go

    Skills you'll gain: Wireless Networks, Mobile Security, General Networking, Proxy Servers, Network Security, Cybersecurity, Telecommunications, Virtual Private Networks (VPN), Infrastructure Security, Data Security, Security Awareness, Remote Access Systems, Network Protocols, Information Privacy, Communication Systems, Emerging Technologies

    ★ 4.9 (9) · Beginner · Course · 1 - 3 Months

  • N

    New York University

    Introduction to Cyber Attacks

    Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Cyber Security Assessment, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Risk Management Framework, Cryptography, Data Integrity

    ★ 4.7 (2.9K) · Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Network Security, Access Control, and Automation

    Skills you'll gain: Network Security, Virtual Private Networks (VPN), Authentications, Firewall, Authorization (Computing), Computer Security, Remote Access Systems, Cybersecurity, General Networking, Network Monitoring, Security Controls, IT Automation, Software-Defined Networking, Wireless Networks, Dynamic Host Configuration Protocol (DHCP), Virtual Local Area Network (VLAN), Automation, Network Routing, Encryption, Application Programming Interface (API)

    Intermediate · Course · 1 - 3 Months

  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 7

    Skills you'll gain: Cryptography, Encryption, Cloud Security, Cryptographic Protocols, Cyber Security Assessment, Cloud Computing, Data Security, Key Management, Public Key Infrastructure

    Intermediate · Course · 1 - 4 Weeks

  • R

    Royal Holloway, University of London

    Cybercrime

    Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Security Awareness, Social Sciences, Exploitation techniques, Culture, Psychology, Persuasive Communication

    ★ 4.8 (120) · Beginner · Course · 1 - 4 Weeks

  • K

    Kennesaw State University

    Cybersecurity: Developing a Program for Your Business

    Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Computer Security Incident Management, Cyber Security Policies, IT Management, Cyber Security Strategy, Cyber Governance, Risk Management Framework, Human Factors (Security), Business Risk Management, Cybersecurity, Incident Management, Threat Management, Security Awareness, Mobile Security, Cyber Attacks, Information Systems Security

    ★ 4.5 (2.7K) · Beginner · Specialization · 3 - 6 Months

1…11121314

In summary, here are 10 of our most popular hacking courses

  • Reporting and Advanced Practices: Packt
  • Vulnerability Scanning Network Attacks: Total Seminars
  • Certified Ethical Hacker (CEH): Unit 8: Pearson
  • Cybersecurity: What to Do When You Are a Victim: Kennesaw State University
  • Introduction to Network Security: University of London
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Cybersecurity: Protecting your Information on the Go: Kennesaw State University
  • Introduction to Cyber Attacks: New York University
  • Network Security, Access Control, and Automation: Packt
  • Certified Ethical Hacker (CEH): Unit 7: Pearson

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications
  • Share your Coursera learning story

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Udemy

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok