Coursera
  • Online DegreeExplore Bachelor’s & Master’s degrees
  • MasterTrack™Earn credit towards a Master’s degree
  • University CertificatesAdvance your career with graduate-level learning
Find your New CareerFor EnterpriseFor Universities
  • Browse
  • Top Courses
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Ethical Hacking

    Filter by

    18 results for "ethical hacking"

    • Placeholder
      IBM

      IBM Cybersecurity Analyst

      Skills you'll gain: Security Engineering, Cyberattacks, Computer Security Incident Management, Network Security, System Security, Network Model, Computer Networking, Cryptography, Python Programming, Security Strategy, System Software, Cloud Infrastructure, Human Factors (Security), Operating Systems, Computer Programming, Databases, Other Programming Languages, Cloud Computing, Cloud Engineering, DevOps, Linux, Mobile Security, Software Security, Agile Software Development, Application Development, Cloud Management, Computer Architecture, Computer Security Models, Data Analysis, Data Management, Data Structures, Data Warehousing, Database Administration, Database Application, Distributed Computing Architecture, Entrepreneurship, Finance, Leadership and Management, Marketing, Mathematics, Mobile Development, Network Analysis, Network Architecture, Networking Hardware, Regulations and Compliance, SQL, Sales, Security Software, Software Engineering, Software Testing, Statistical Programming, Strategy, Strategy and Operations, Theoretical Computer Science

      4.6

      (18.8k reviews)

      Beginner · Professional Certificate · 3-6 Months

    • Placeholder
      EC-Council

      Ethical Hacking Essentials (EHE)

      Skills you'll gain: Security Engineering, Computer Networking, Network Security, Cyberattacks, Operating Systems, System Security, Computer Architecture, Software Engineering, Data Management, Network Architecture, Cloud Computing, Cloud Infrastructure, Computer Programming, Computer Security Incident Management, Computer Security Models, Databases, Docker (Software), Finance, Internet Of Things, Mobile Development, Mobile Security, Network Model, Other Programming Languages, Regulations and Compliance, SQL, Software Security, Software Testing, Statistical Programming, Supply Chain Systems, Supply Chain and Logistics

      4.7

      (29 reviews)

      Beginner · Course · 1-3 Months

    • Placeholder
      IBM

      Introduction to Cybersecurity Tools & Cyber Attacks

      Skills you'll gain: Security Engineering, Computer Security Incident Management, Cryptography, Cyberattacks, Network Security, System Security, Computer Networking, Leadership and Management, Operating Systems, Theoretical Computer Science

      4.5

      (13k reviews)

      Beginner · Course · 1-4 Weeks

    • Placeholder
      EC-Council

      Cybersecurity Attack and Defense Fundamentals

      Skills you'll gain: Security Engineering, Computer Networking, Network Security, Cyberattacks, Operating Systems, System Security, Software Security, Data Management, Computer Architecture, Software Engineering, Computer Security Incident Management, Mobile Development, Mobile Security, Network Architecture, Extract, Transform, Load, Cloud Computing, Cloud Infrastructure, Computer Programming, Computer Security Models, Databases, Docker (Software), Finance, Internet Of Things, Network Model, Other Programming Languages, Regulations and Compliance, SQL, Security Strategy, Software Testing, Statistical Programming, Supply Chain Systems, Supply Chain and Logistics

      4.6

      (36 reviews)

      Beginner · Specialization · 3-6 Months

    • Placeholder
      University of Maryland, College Park

      Cybersecurity

      Skills you'll gain: Security Engineering, Computer Science, Cryptography, Theoretical Computer Science, Software Security, Cyberattacks, Design and Product, Human Computer Interaction, Product Design, Security Strategy, User Experience, User Research, Computer Architecture, Hardware Design, Security Software, Business Psychology, Mathematical Theory & Analysis, Mathematics, Operating Systems, Research and Design, Software Engineering, System Security, Systems Design, User Experience Design

      4.6

      (5.2k reviews)

      Intermediate · Specialization · 3-6 Months

    • Placeholder
      IBM

      Penetration Testing, Incident Response and Forensics

      Skills you'll gain: Security Engineering, Computer Programming, Computer Security Incident Management, Cyberattacks, Other Programming Languages, Python Programming, Security Strategy, Computer Networking, Leadership and Management, Network Security, Software Engineering, Software Testing, Statistical Programming

      4.6

      (1.8k reviews)

      Beginner · Course · 1-4 Weeks

    • Placeholder
      Placeholder
      University of Colorado System

      Hacking and Patching

      Skills you'll gain: Cyberattacks, Information Technology, Security Engineering, Computer Architecture, Computer Networking, Data Management, Databases, Microarchitecture, Network Security, Operating Systems, SQL, Software Engineering, Software Security, Software Testing, Statistical Programming, System Security, Theoretical Computer Science

      3.9

      (244 reviews)

      Intermediate · Course · 1-4 Weeks

    • Placeholder

      Free

      Placeholder
      Erasmus University Rotterdam

      Cybersecurity in Healthcare (Hospitals & Care Centres)

      Skills you'll gain: Security Engineering, Cyberattacks, System Security, Human Computer Interaction, Human Factors (Security), Leadership and Management, Security Strategy, Software Security, Business Psychology, Communication, Culture, Finance, Marketing, Regulations and Compliance, Social Media

      4.6

      (190 reviews)

      Beginner · Course · 1-3 Months

    • Placeholder
      Placeholder
      IBM

      Network Security & Database Vulnerabilities

      Skills you'll gain: Security Engineering, Computer Networking, Network Model, Network Security, Cyberattacks, Databases, System Security, Computer Architecture, Data Management, Data Structures, Database Administration, Database Application, Network Architecture, SQL, Software Security, Statistical Programming, Theoretical Computer Science

      4.7

      (2.7k reviews)

      Beginner · Course · 1-4 Weeks

    • Placeholder

      Free

      Placeholder
      University of Michigan

      Data Science Ethics

      Skills you'll gain: Operating Systems, Software Security, System Security, Algorithms, General Statistics, Probability & Statistics

      4.8

      (759 reviews)

      Beginner · Course · 1-3 Months

    • Placeholder
      Placeholder
      New York University

      Introduction to Cyber Attacks

      Skills you'll gain: Cyberattacks, Information Technology, Security Engineering, Cryptography, Finance, Leadership and Management, Risk Management

      4.7

      (2.5k reviews)

      Beginner · Course · 1-4 Weeks

    • Placeholder
      Placeholder
      Infosec

      Cyber Incident Response

      Skills you'll gain: Computer Security Incident Management, Leadership and Management, Security Engineering, Computer Networking, Cyberattacks, Network Security, Operating Systems, System Security, Probability & Statistics

      4.7

      (123 reviews)

      Beginner · Specialization · 3-6 Months

    Searches related to ethical hacking

    ethical hacking essentials (ehe)
    12

    In summary, here are 10 of our most popular ethical hacking courses

    • IBM Cybersecurity Analyst: IBM
    • Ethical Hacking Essentials (EHE): EC-Council
    • Introduction to Cybersecurity Tools & Cyber Attacks: IBM
    • Cybersecurity Attack and Defense Fundamentals: EC-Council
    • Cybersecurity: University of Maryland, College Park
    • Penetration Testing, Incident Response and Forensics: IBM
    • Hacking and Patching: University of Colorado System
    • Cybersecurity in Healthcare (Hospitals & Care Centres): Erasmus University Rotterdam
    • Network Security & Database Vulnerabilities: IBM
    • Data Science Ethics: University of Michigan

    Skills you can learn in Computer Security And Networks

    Cybersecurity (33)
    Google (25)
    Google Cloud Platform (17)
    Internet (17)
    Cryptography (16)
    Network Security (16)
    Linux (12)
    Software Testing (12)
    Information Security (10)
    Application Programming Interfaces (8)
    Kubernetes (8)
    Web (8)

    Frequently Asked Questions about Ethical Hacking

    • The goal of ethical hacking is to test and protect the security and information systems of the organization an ethical hacker is working for. This type of hacking is also known as “penetration testing” because the white hat hacker, or ethical hacker, tests the system to see if there are any areas to breach or exploit. This allows the organization to ensure its systems are up to date and secure so that its weaknesses aren’t taken advantage of by illegal hackers.‎

    • Ethical hacking jobs cover a broad range of roles including those in cybersecurity and information analysis. When you study as an ethical hacker, you could get hired as a security consultant at a networking, technology, or computing firm, work as a penetration tester, become an information security analyst or manager, or work as an independent certified ethical hacker contractor. Job duties may include tasks such as locating and anticipating various attacks to a network, guessing and cracking passwords, and exploiting vulnerabilities. Ethical hackers in the US make an average total salary of $105,298, according to October 2022 data from Glassdoor.‎

    • Before aiming to become an ethical hacker, work towards proficiency in database handling, networking, and operating systems. Communication and a creative mind are also required in ethical hacking roles. Not only will you need to solve problems quickly and with confidence, but you’ll also be required to predict an illegal hacker’s next move.‎

    • Online courses on Coursera can introduce you to the fundamentals of cybersecurity, including various types of cyber threats and security tools. Other lessons focus on specific tasks, such as exploiting vulnerabilities in certain applications. You can also choose to learn about forensics, incident response, and penetration testing as well as principles of secure coding.‎

    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.
    Other topics to explore
    Placeholder
    Arts and Humanities
    338 courses
    Placeholder
    Business
    1095 courses
    Placeholder
    Computer Science
    668 courses
    Placeholder
    Data Science
    425 courses
    Placeholder
    Information Technology
    145 courses
    Placeholder
    Health
    471 courses
    Placeholder
    Math and Logic
    70 courses
    Placeholder
    Personal Development
    137 courses
    Placeholder
    Physical Science and Engineering
    413 courses
    Placeholder
    Social Sciences
    401 courses
    Placeholder
    Language Learning
    150 courses

    Coursera Footer

    Start or advance your career

    • Google Data Analyst
    • Google Digital Marketing & E-commerce Professional Certificate
    • Google IT Automation with Python Professional Certificate
    • Google IT Support
    • Google Project Management
    • Google UX Design
    • Preparing for Google Cloud Certification: Cloud Architect
    • IBM Cybersecurity Analyst
    • IBM Data Analyst
    • IBM Data Engineering
    • IBM Data Science
    • IBM Full Stack Cloud Developer
    • IBM Machine Learning
    • Intuit Bookkeeping
    • Meta Front-End Developer
    • DeepLearning.AI TensorFlow Developer Professional Certificate
    • SAS Programmer Professional Certificate
    • Launch your career
    • Prepare for a certification
    • Advance your career
    • How to Identify Python Syntax Errors
    • How to Catch Python Exceptions
    • See all Programming Tutorials

    Popular Courses and Certifications

    • Free Courses
    • Artificial Intelligence Courses
    • Blockchain Courses
    • Computer Science Courses
    • Cursos Gratis
    • Cybersecurity Courses
    • Data Analysis Courses
    • Data Science Courses
    • English Speaking Courses
    • Full Stack Web Development Courses
    • Google Courses
    • Human Resources Courses
    • IT Courses
    • Learning English Courses
    • Microsoft Excel Courses
    • Product Management Courses
    • Project Management Courses
    • Python Courses
    • SQL Courses
    • Agile Certifications
    • CAPM Certification
    • CompTIA A+ Certification
    • Data Analytics Certifications
    • Scrum Master Certifications
    • See all courses

    Popular collections and articles

    • Free online courses you can finish in a day
    • Popular Free Courses
    • Business Jobs
    • Cybersecurity Jobs
    • Entry-Level IT Jobs
    • Data Analyst Interview Questions
    • Data Analytics Projects
    • How to Become a Data Analyst
    • How to Become a Project Manager
    • IT Skills
    • Project Manager Interview Questions
    • Python Programming Skills
    • Strength and Weakness in Interview
    • What Does a Data Analyst Do
    • What Does a Software Engineer Do
    • What Is a Data Engineer
    • What Is a Data Scientist
    • What Is a Product Designer
    • What Is a Scrum Master
    • What Is a UX Researcher
    • How to Get a PMP Certification
    • PMI Certifications
    • Popular Cybersecurity Certifications
    • Popular SQL Certifications
    • Read all Coursera Articles

    Earn a degree or certificate online

    • Google Professional Certificates
    • Professional Certificates
    • See all certificates
    • Bachelor's Degrees
    • Master's Degrees
    • Computer Science Degrees
    • Data Science Degrees
    • MBA & Business Degrees
    • Data Analytics Degrees
    • Public Health Degrees
    • Social Sciences Degrees
    • Management Degrees
    • BA vs BS Degree
    • What is a Bachelor's Degree?
    • 11 Good Study Habits to Develop
    • How to Write a Letter of Recommendation
    • 10 In-Demand Jobs You Can Get with a Business Degree
    • Is a Master's in Computer Science Worth it?
    • See all degree programs
    • Coursera India
    • Coursera UK
    • Coursera Mexico

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Coronavirus Response

    Community

    • Learners
    • Partners
    • Beta Testers
    • Translators
    • Blog
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    Learn Anywhere
    Placeholder
    Placeholder
    Placeholder
    © 2023 Coursera Inc. All rights reserved.
    • Placeholder
    • Placeholder
    • Placeholder
    • Placeholder
    • Placeholder