Ethical hacking courses can help you learn penetration testing, vulnerability assessment, and risk management techniques. You can build skills in network security, incident response, and ethical guidelines for cybersecurity practices. Many courses introduce tools like Metasploit, Wireshark, and Nmap, that support identifying security weaknesses and testing defenses in real-time scenarios. By engaging with these tools, you’ll gain practical experience in protecting systems and understanding the mindset of potential attackers.

Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Network Security, Network Analysis, Network Protocols, Open Source Technology
Intermediate · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Human Factors (Security), Security Awareness, Cyber Security Strategy, Cyber Governance, Data Ethics, User Experience Design, Cyber Security Policies, Cyber Security Assessment, Cyber Attacks, Cyber Risk, Security Management, Cybersecurity, Security Strategy, Culture Transformation, Cyber Threat Intelligence, Cyber Threat Hunting, Data Security, Network Security, Cloud Security, Mobile Security
Beginner · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Data Ethics, Computer Security Awareness Training, Ethical Standards And Conduct, Cybersecurity, Information Technology, Responsible AI, Information Privacy, Media and Communications, Personally Identifiable Information, Artificial Intelligence, Law, Regulation, and Compliance, Data Collection
Build toward a degree
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Security Testing, Cybersecurity, Virtual Machines, Technical Writing, Web Servers, Linux
Beginner · Course · 1 - 3 Months

Skills you'll gain: Threat Modeling, MITRE ATT&CK Framework, LangChain, Threat Detection, Responsible AI, Large Language Modeling, Continuous Monitoring, Information Systems Security, Generative AI, Vulnerability Assessments, Incident Response, LangGraph, Prompt Engineering, Security Strategy, Artificial Intelligence
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Cybersecurity, Information Systems Security, Infrastructure Security, Vulnerability Assessments, Encryption
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Legal Risk, Responsible AI, Data Ethics, Generative AI, Personally Identifiable Information, Law, Regulation, and Compliance, Engineering Software, Information Privacy, Regulation and Legal Compliance, Artificial Intelligence, Data Security, Case Studies, Diversity Awareness, Ethical Standards And Conduct, Governance, Mitigation
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Cryptography, Encryption, Cloud Security, Cyber Security Assessment, Cloud Computing, Advanced Encryption Standard (AES), Data Security, Public Key Infrastructure
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Strategy, Threat Detection, Vulnerability Assessments, Firewall, Exploitation techniques, Human Factors (Security), Network Analysis
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Penetration Testing, OSI Models, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Network Security, Vulnerability Scanning, Cybersecurity, Prompt Engineering, Large Language Modeling, Scripting, Python Programming, SQL
Intermediate · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Intermediate · Course · 1 - 3 Months