• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Hack

Results for "hack"


  • I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    181 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • P

    Packt

    The Complete Ethical Hacking Bootcamp: Beginner To Advanced

    Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration

    4.3
    Rating, 4.3 out of 5 stars
    ·
    47 reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Packt

    Bug Bounty from Scratch

    Skills you'll gain: Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Cyber Security Assessment, Patch Management, Cybersecurity, Data Ethics, Cyber Engineering, Technical Communication, Technical Writing

    Beginner · Course · 3 - 6 Months

  • L

    LearnKartS

    Ethical Hacking

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Security Testing, Cyber Security Assessment, Cyber Threat Hunting, Threat Detection, Cryptographic Protocols, Cybersecurity, Cyber Threat Intelligence, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Cyber Security Strategy, Cyber Attacks, Application Security, Security Awareness, Security Controls, Data Security, Cyber Risk, Security Strategy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    291 reviews

    Beginner · Specialization · 1 - 3 Months

  • P

    Packt

    Certified Ethical Hacker (CEH) v.12

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    30 reviews

    Beginner · Specialization · 3 - 6 Months

  • I

    IBM

    Ethical Hacking with Kali Linux

    Skills you'll gain: Bash (Scripting Language), Network Monitoring, Exploit development, Intrusion Detection and Prevention, System Configuration, Digital Forensics, Virtual Machines

    4.7
    Rating, 4.7 out of 5 stars
    ·
    53 reviews

    Intermediate · Course · 1 - 3 Months

What brings you to Coursera today?

  • U

    University of Colorado Boulder

    Security and Ethical Hacking

    Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

    4.6
    Rating, 4.6 out of 5 stars
    ·
    17 reviews

    Intermediate · Specialization · 3 - 6 Months

  • E

    EC-Council

    Ethical Hacking Essentials (EHE)

    Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    610 reviews

    Beginner · Course · 1 - 3 Months

  • L

    LearnKartS

    Ethical Hacking Fundamentals

    Skills you'll gain: Penetration Testing, Security Testing, Cybersecurity, Open Web Application Security Project (OWASP), Cyber Attacks, Cyber Security Assessment, Network Security, Security Awareness, Information Systems Security, Application Security, Cyber Risk, Network Monitoring, Cloud Security, Linux Commands, Artificial Intelligence, ChatGPT

    4.6
    Rating, 4.6 out of 5 stars
    ·
    198 reviews

    Beginner · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Hacking and Patching

    Skills you'll gain: Penetration Testing, Application Security, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Operating Systems, C (Programming Language)

    4
    Rating, 4 out of 5 stars
    ·
    279 reviews

    Intermediate · Course · 1 - 4 Weeks

  • U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Application Security, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques, Software Design Patterns

    4
    Rating, 4 out of 5 stars
    ·
    597 reviews

    Intermediate · Specialization · 3 - 6 Months

  • I

    IBM

    IBM Digital Marketing and Growth Hacking with GenAI

    Skills you'll gain: Responsible AI, Social Media Management, Social Media, Social Media Marketing, Google Ads, Digital Marketing, Email Marketing, Social Media Strategy, Digital Advertising, Web Analytics and SEO, Online Advertising, Social Media Campaigns, Digital Media Strategy, Paid media, Pay Per Click Advertising, Content Creation, Customer Retention, Search Engine Optimization, Presentations, Generative AI

    4.8
    Rating, 4.8 out of 5 stars
    ·
    177 reviews

    Beginner · Professional Certificate · 3 - 6 Months

1234…9

In summary, here are 10 of our most popular hack courses

  • IBM Ethical Hacking with Open Source Tools: IBM
  • The Complete Ethical Hacking Bootcamp: Beginner To Advanced: Packt
  • Bug Bounty from Scratch: Packt
  • Ethical Hacking: LearnKartS
  • Certified Ethical Hacker (CEH) v.12: Packt
  • Ethical Hacking with Kali Linux: IBM
  • Security and Ethical Hacking: University of Colorado Boulder
  • Ethical Hacking Essentials (EHE): EC-Council
  • Ethical Hacking Fundamentals: LearnKartS
  • Hacking and Patching: University of Colorado System

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok