• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Hack

Results for "hack"


  • I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    ★ 4.3 (32) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Pearson

    Certified Ethical Hacker (CEH): Unit 6

    Skills you'll gain: Mobile Security, Wireless Networks, Network Security, Application Security, Internet Of Things, Endpoint Security, Cybersecurity, Information Systems Security, Infrastructure Security, Penetration Testing, Exploitation techniques, Vulnerability Assessments, Data Security, Encryption

    Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • B

    Board Infinity

    Kali Linux

    Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Security Testing, Linux Commands, Cyber Operations, Cybersecurity, Information Systems Security, Linux, Software Installation, Network Security, Linux Administration, Network Analysis

    ★ 4.3 (238) · Intermediate · Course · 1 - 4 Weeks

    Category: Preview
    Preview
    Category: Credit offered
    Credit offered
  • P

    Packt

    Introduction to Ethical Hacking and Recon Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Threat Modeling, Cyber Threat Intelligence, Penetration Testing, Threat Management, Threat Detection, Cyber Security Assessment, Cybersecurity, Cyber Security Strategy, Cyber Operations, Vulnerability Scanning, Cyber Attacks, Computer Security, Vulnerability Assessments, Security Strategy, Cyber Security Policies, Network Security, Network Analysis, Network Protocols

    ★ 4.8 (14) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Intermediate Ethical Hacking Techniques

    Skills you'll gain: Metasploit, Open Web Application Security Project (OWASP), Penetration Testing, Exploit development, Vulnerability Scanning, Exploitation techniques, Security Testing, Vulnerability Assessments, Hardening, Brute-force attacks, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Network Analysis, SQL

    ★ 3.8 (9) · Intermediate · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Ethical Hacking Foundations

    Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, General Networking, Network Administration, Exploitation techniques, Cybersecurity, Data Ethics, Vulnerability Scanning, Network Security, System Configuration, Software Installation, Virtual Machines

    ★ 4.3 (36) · Beginner · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • I

    IBM

    Capstone Project: Digital Marketing and Growth Hacking

    Skills you'll gain: Digital Advertising, Online Advertising, Campaign Planning, Paid media, Digital Analysis, Presentations, Digital Marketing Campaigns, Content Development and Management, Social Media Campaigns, Content Performance Analysis, Advertising Campaigns, Digital Marketing, Search Engine Optimization, Content Strategy, LinkedIn, Social Media Marketing, Target Audience, E-Commerce, Business Analysis, Market Analysis

    ★ 4.8 (6) · Advanced · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Cyber Operations, Network Monitoring, Exploitation techniques, Vulnerability Scanning, Cryptographic Protocols, Remote Access Systems, Network Protocols, Encryption, General Networking, Command-Line Interface, Network Analysis, Proxy Servers

    ★ 4.7 (13) · Intermediate · Course · 1 - 3 Months

    Status: Free Trial
    Free Trial
    Category: Build toward a degree
    Build toward a degree
  • E

    EDUCBA

    Python Cryptography: Analyze & Break Ciphers

    Skills you'll gain: Cryptography, Encryption, Brute-force attacks, Python Programming, Programming Principles, Computational Logic, Program Development, Algorithms, Code Reusability, File I/O, File Management

    Mixed · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • N

    New York University

    Introduction to Cyber Attacks

    Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Threat Management, Cyber Risk, Cyber Security Assessment, Information Systems Security, Network Security, Computer Security, Exploitation techniques, Risk Management Framework, Cryptography, Data Integrity

    ★ 4.7 (2.9K) · Beginner · Course · 1 - 4 Weeks

    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
  • P

    Packt

    Web Hacker's Toolbox - Tools Used by Successful Hackers

    Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Application Security, Exploitation techniques, Hardening, Vulnerability Assessments, Test Tools, Web Applications, SQL

    Intermediate · Course · 1 - 3 Months

    Category: Credit offered
    Credit offered
  • A

    Alex Genadinik

    Time Management

    Skills you'll gain: Prioritization, Productivity, Time Management, Professional Development, Personal Development, Stress Management, Strategic Prioritization, Organizational Skills, Mental Concentration, Business Priorities, Scheduling, Business Strategy, Microsoft Excel, Data-Driven Decision-Making

    Mixed · Course · 1 - 3 Months

    Category: New
    New
    Status: Free Trial
    Free Trial
    Category: Credit offered
    Credit offered
1…678…9

In summary, here are 10 of our most popular hack courses

  • Exploitation and Penetration Testing with Metasploit: IBM
  • Certified Ethical Hacker (CEH): Unit 6: Pearson
  • Kali Linux: Board Infinity
  • Introduction to Ethical Hacking and Recon Techniques: Packt
  • Intermediate Ethical Hacking Techniques: Packt
  • Ethical Hacking Foundations: Packt
  • Capstone Project: Digital Marketing and Growth Hacking: IBM
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Python Cryptography: Analyze & Break Ciphers: EDUCBA
  • Introduction to Cyber Attacks: New York University

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok