• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Keylogging Techniques

Results for "keylogging techniques"


  • E

    EDUCBA

    Ethical Hacking with Kali Linux: Learn & Secure

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Hardening, Cybersecurity, Security Testing, Vulnerability Assessments, Network Analysis, Exploitation techniques, Linux, System Configuration, Linux Administration, Virtual Machines, Linux Commands, Operating Systems, Software Installation

    ★ 4.9 (30) · Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Exploitation techniques, Hardening, Vulnerability Assessments, Intrusion Detection and Prevention, Brute-force attacks, Application Security, Network Security, Virtual Local Area Network (VLAN), Business Logic, Cloud Security, API Testing, Wireless Networks, Data Persistence, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 2

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Threat Intelligence, Vulnerability Assessments, Exploitation techniques, Network Security, Network Analysis, Network Protocols

    ★ 4.6 (7) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • D

    DeepLearning.AI

    TensorFlow: Advanced Techniques

    Skills you'll gain: Generative Adversarial Networks (GANs), Autoencoders, Generative AI, Tensorflow, Computer Vision, Image Analysis, Transfer Learning, Convolutional Neural Networks, Generative Model Architectures, Fine-tuning, Deep Learning, Keras (Neural Network Library), Model Training, Model Optimization, Applied Machine Learning, Artificial Neural Networks, Classification Algorithms, Model Evaluation, Distributed Computing, Visualization (Computer Graphics)

    ★ 4.8 (1.7K) · Intermediate · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Hands-on Hacking

    Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Cyber Security Assessment, Active Directory, Security Testing, Web Applications, Microsoft Windows, Bash (Scripting Language), Apache Tomcat, Scripting, Microsoft SQL Servers

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • M

    Microsoft

    Technical Diagnostics and Troubleshooting Techniques

    Skills you'll gain: Desktop Support, Network Troubleshooting, Technical Support, Hardware Troubleshooting, System Support, Help Desk Support, Debugging, Microsoft Windows, Mac OS, Unix, Problem Management, Network Monitoring, Issue Tracking, Generative AI, Operating Systems, Technical Communication, Performance Tuning

    ★ 4.8 (172) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    ★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Ethical Hacking - Capture the Flag Walkthroughs - v2

    Skills you'll gain: Technical Documentation, Cybersecurity, Virtual Machines, System Configuration, Virtualization, Virtual Environment, Software Installation, Network Analysis

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • E

    EDUCBA

    Ethical Hacking with Kali Linux: Analyze & Apply

    Skills you'll gain: Penetration Testing, Exploit development, Exploitation techniques, Security Testing, Brute-force attacks, Vulnerability Assessments, Authentications, Wireless Networks, Network Security, Linux, Encryption, Microsoft Windows, Network Analysis, Data Persistence

    Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Public Key Infrastructure, Cybersecurity, Cryptography, Exploitation techniques, Security Testing, Key Management, Encryption, Technical Writing, Human Factors (Security), Technical Communication

    ★ 3.9 (9) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • M

    Macquarie University

    Cyber Security: Mobile Security

    Skills you'll gain: Mobile Security, Digital Forensics, Investigation, Mobile Development, Criminal Investigation and Forensics, Endpoint Security, Cybersecurity, iOS Development, Application Security, Cyber Security Strategy, Computer Security Incident Management, Computer Security, Data Analysis Software, Authentications, Data Integrity, Data Storage

    ★ 4.6 (14) · Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    ISC2

    Cryptography

    Skills you'll gain: Cryptography, Key Management, Public Key Infrastructure, Encryption, Cryptographic Protocols, Data Security, Data Encryption Standard, Public Key Cryptography Standards (PKCS), Cybersecurity, Advanced Encryption Standard (AES), Authentications, Brute-force attacks, Data Integrity, Algorithms

    ★ 4.8 (95) · Beginner · Course · 1 - 4 Weeks

    Category: Credit offered
    Credit offered
1…456…454

In summary, here are 10 of our most popular keylogging techniques courses

  • Ethical Hacking with Kali Linux: Learn & Secure: EDUCBA
  • Advanced Penetration Techniques: Packt
  • Certified Ethical Hacker (CEH): Unit 2: Pearson
  • TensorFlow: Advanced Techniques: DeepLearning.AI
  • Hands-on Hacking: Packt
  • Technical Diagnostics and Troubleshooting Techniques: Microsoft
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Ethical Hacking - Capture the Flag Walkthroughs - v2: Packt
  • Ethical Hacking with Kali Linux: Analyze & Apply: EDUCBA
  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok