• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • System Hacking

Results for "system hacking"


  • R

    Royal Holloway, University of London

    Cyber Security – Technology and Governance

    Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, IT Security Architecture, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks

    ★ 4.8 (207) · Beginner · Specialization · 3 - 6 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • J

    Johns Hopkins University

    Introduction to Intrusion Detection Systems (IDS)

    Skills you'll gain: Intrusion Detection and Prevention, Threat Detection, Distributed Denial-Of-Service (DDoS) Attacks, Threat Management, Anomaly Detection, Continuous Monitoring, System Monitoring, Virtual Machines, Network Security, Virtualization and Virtual Machines, Event Monitoring, Network Monitoring, Network Analysis

    ★ 4.9 (7) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    ★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado System

    Hacking and Patching

    Skills you'll gain: Penetration Testing, Exploit development, Metasploit, Application Security, Security Testing, Cyber Security Assessment, Vulnerability Scanning, Brute-force attacks, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Memory Management, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation

    ★ 4 (279) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 3

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Vulnerability Management, Malware Protection, Threat Detection, Penetration Testing, Threat Management, Cybersecurity, Exploitation techniques, Infrastructure Security, Network Security, Information Systems Security

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    The Complete Pentesting and Privilege Escalation Course

    Skills you'll gain: Penetration Testing, Exploitation techniques, Scenario Testing, Cybersecurity, Vulnerability Assessments, Linux Administration, Linux Servers, Linux, Command-Line Interface, Linux Commands, Cryptography, File Management, Microsoft Windows, Unix Shell, Virtual Machines

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • I

    IBM

    Ethical Hacking Capstone Project: Breach, Response, AI

    Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Cybersecurity, AI Security, Data Persistence, Incident Management, Technical Communication, Risk Analysis

    ★ 4.9 (11) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    Infosec

    Operating System Foundations

    Skills you'll gain: Penetration Testing, Linux Commands, Command-Line Interface, Security Testing, Linux, Cybersecurity, Vulnerability Scanning, Operating Systems, Exploitation techniques, Microsoft Windows, File Systems, Mac OS

    ★ 4.6 (98) · Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • N

    New York University

    Introduction to Cyber Attacks

    Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Cyber Security Assessment, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Risk Management Framework, Cryptography, Data Integrity

    ★ 4.7 (2.9K) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • C

    CertNexus

    CFR: Reconnaissance, Attack, and Post-Attack Analysis

    Skills you'll gain: Threat Modeling, Cybersecurity, Malware Protection, Penetration Testing, Cyber Security Assessment, Threat Detection, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Exploitation techniques, Mobile Security, Information Systems Security, Computer Security, Network Security, Vulnerability Assessments, Human Factors (Security), Cloud Security, Persistence

    Mixed · Course · 1 - 4 Weeks

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Ethical Password Cracking

    Skills you'll gain: Penetration Testing, Brute-force attacks, Cyber Security Assessment, Exploitation techniques, Cyber Security Policies, Hardening, Encryption, Network Security, Security Testing, Cybersecurity, Application Security, Security Strategy, Data Storage, Vulnerability Assessments, Wireless Networks, Authentications, Cryptography, Data Security, Cyber Attacks, Drupal

    Intermediate · Course · 1 - 3 Months

    Category: New
    New
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 5

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Security Testing, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…456…604

In summary, here are 10 of our most popular system hacking courses

  • Cyber Security – Technology and Governance: Royal Holloway, University of London
  • Introduction to Intrusion Detection Systems (IDS): Johns Hopkins University
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Hacking and Patching: University of Colorado System
  • Certified Ethical Hacker (CEH): Unit 3: Pearson
  • The Complete Pentesting and Privilege Escalation Course: Packt
  • Ethical Hacking Capstone Project: Breach, Response, AI: IBM
  • Operating System Foundations: Infosec
  • Introduction to Cyber Attacks: New York University
  • CFR: Reconnaissance, Attack, and Post-Attack Analysis: CertNexus

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok