• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
Log In
Join for Free
  • Browse
  • Ethica Hacking

Results for "ethica hacking"


  • Status: Free Trial
    Free Trial
    U

    University of California San Diego

    Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen

    Skills you'll gain: Bioinformatics, Infectious Diseases, Molecular Biology, Computational Thinking, Microbiology, Biology

    4.4
    Rating, 4.4 out of 5 stars
    ·
    57 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of California San Diego

    Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution

    Skills you'll gain: Bioinformatics, Infectious Diseases, Network Analysis, Tree Maps, Molecular Biology, Biology, Science and Research

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Parsons School of Design, The New School

    Using Design to Generate Innovative Business Solutions

    Skills you'll gain: Design Thinking, Sustainable Business, Business Solutions, Business Modeling, Growth Strategies, Innovation, Design, Value Propositions, User Experience, Sales Process, Prototyping, Customer experience improvement, Consumer Behaviour

    4.7
    Rating, 4.7 out of 5 stars
    ·
    12 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Penetration Techniques

    Skills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Network Security, Distributed Denial-Of-Service (DDoS) Attacks, Virtual Local Area Network (VLAN), Cloud Security, Wireless Networks, Application Programming Interface (API)

    Advanced · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Techniques

    Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Exploitation techniques, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cyber Security Assessment, Vulnerability Scanning, Cybersecurity, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Encryption, Network Protocols, Authentications

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    S

    SAS

    Machine Learning Under the Hood: The Technical Tips, Tricks, and Pitfalls

    Skills you'll gain: Responsible AI, Machine Learning, Data Ethics, Predictive Analytics, Statistical Modeling, Supervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Data Science, Machine Learning Algorithms, Decision Tree Learning, Data Analysis, Regression Analysis, Performance Analysis, Deep Learning, Artificial Neural Networks

    4.9
    Rating, 4.9 out of 5 stars
    ·
    64 reviews

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

  • Status: Preview
    Preview
    E

    Erasmus University Rotterdam

    Cybersecurity in Healthcare (Hospitals & Care Centres)

    Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications

    4.6
    Rating, 4.6 out of 5 stars
    ·
    399 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Advanced Cybersecurity Topics

    Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture

    3.7
    Rating, 3.7 out of 5 stars
    ·
    6 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    I

    IBM

    Capstone Project: Digital Marketing and Growth Hacking

    Skills you'll gain: Digital Advertising, Paid media, Presentations, Social Media Campaigns, Advertising Campaigns, Digital Marketing, Web Analytics, Search Engine Optimization, Content Strategy, LinkedIn, Content Marketing, Social Media Marketing, Marketing Analytics, Target Audience, E-Commerce, Social Media Strategy, Smart Goals, Business Analysis, Market Analysis

    Advanced · Course · 1 - 3 Months

  • P

    Packt

    Risk Management for Cyber Security Managers

    Skills you'll gain: Cyber Risk, Risk Management, Threat Management, IT Management, Security Controls, Security Management, Business Risk Management, Vulnerability Assessments, Cyber Security Assessment, Cyber Security Strategy, Cybersecurity, Threat Modeling, Cyber Security Policies, Information Assurance, Data Security, Technical Communication, Stakeholder Communications, Business Communication

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Technical Deep Dive with Incident Response Tools

    Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Threat Hunting, Cyber Threat Intelligence, Cyber Operations, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Cybersecurity, Network Security, Network Monitoring, Data Security, Network Analysis, Exploitation techniques, Malware Protection, Vulnerability Assessments, Operating Systems

    4.8
    Rating, 4.8 out of 5 stars
    ·
    90 reviews

    Beginner · Course · 1 - 3 Months

Searches related to ethica hacking

ethical hacking
ethical hacking fundamentals
ethical hacking foundations
ethical hacking essentials (ehe)
advanced ethical hacking & cybersecurity
introduction to ethical hacking
ethical hacking with kali linux
security and ethical hacking
1…8910…13

In summary, here are 10 of our most popular ethica hacking courses

  • Hacking COVID-19 — Course 1: Identifying a Deadly Pathogen: University of California San Diego
  • Hacking COVID-19 — Course 5: Tracing SARS-CoV-2's Evolution: University of California San Diego
  • Using Design to Generate Innovative Business Solutions: Parsons School of Design, The New School
  • Advanced Penetration Techniques: Packt
  • Advanced Cybersecurity Techniques: Johns Hopkins University
  • Machine Learning Under the Hood: The Technical Tips, Tricks, and Pitfalls: SAS
  • Web Hacking Expert - Full-Stack Exploitation Mastery: Packt
  • Cybersecurity in Healthcare (Hospitals & Care Centres): Erasmus University Rotterdam
  • Advanced Cybersecurity Topics: Johns Hopkins University
  • Capstone Project: Digital Marketing and Growth Hacking: IBM

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok