Ethical hacking courses can help you learn how to identify and fix security vulnerabilities by testing systems and networks in a lawful and responsible way.
The language used throughout the course, in both instruction and assessments.

Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Beginner · Guided Project · Less Than 2 Hours

Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines
Beginner · Course · 1 - 3 Months

Johns Hopkins University
Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Test Tools, Human Factors (Security)
Intermediate · Course · 1 - 3 Months

University of Colorado Boulder
Skills you'll gain: Penetration Testing, Exploitation techniques, Unix, Computer Security, Vulnerability Assessments, Unix Commands, System Programming, Shell Script, Linux, Debugging, Computer Architecture
Build toward a degree
Intermediate · Course · 1 - 3 Months

LearnKartS
Skills you'll gain: Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cybersecurity, Cryptography, Penetration Testing, Encryption, Cloud Computing, Application Security, Virtualization, Virtual Machines, SQL
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Agentic systems, Data Ethics, Discussion Facilitation, Business Ethics, Ethical Standards And Conduct, Healthcare Ethics, Regulation and Legal Compliance, Artificial Intelligence, Compliance Management, Case Studies, Governance, Accountability, Human Centered Design, Predictive Modeling
Beginner · Course · 1 - 3 Months

Skills you'll gain: Penetration Testing, Metasploit, Open Web Application Security Project (OWASP), Network Protocols, Vulnerability Assessments, Exploitation techniques, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Exploitation techniques, Unix, Network Security, Cybersecurity, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
Beginner · Course · 1 - 4 Weeks

LearnKartS
Skills you'll gain: Security Testing, Threat Detection, Application Security, Git (Version Control System), GitLab, GitHub, Problem Solving
Intermediate · Course · 1 - 4 Weeks

EC-Council
Skills you'll gain: Penetration Testing, Threat Modeling, Cybersecurity, Cloud Security, Mobile Security, Vulnerability Assessments, Network Security, Application Security, Threat Detection, Security Testing, Cyber Attacks, MITRE ATT&CK Framework, Exploit development, Encryption, Vulnerability Scanning, Web Applications, Infrastructure Security, Wireless Networks, Internet Of Things
Beginner · Course · 1 - 3 Months

Skills you'll gain: Crisis Management, Data Ethics, Governance, Business Ethics, Strategic Leadership, Responsible AI, Law, Regulation, and Compliance, Media Relations, Strategic Thinking, Communication Strategies, Business Leadership, Accountability, Ethical Standards And Conduct, Emerging Technologies, Organizational Leadership, Risk Management, Communication, Leadership, Learning Strategies, Test Planning
Beginner · Professional Certificate · 3 - 6 Months

University of Colorado Boulder
Skills you'll gain: Open Web Application Security Project (OWASP), Cyber Security Assessment, Exploitation techniques, Server Side, Application Security, Artificial Intelligence and Machine Learning (AI/ML), Vulnerability Scanning, Responsible AI, Data Security, Cyber Attacks, Security Awareness, Generative AI, Large Language Modeling, Personally Identifiable Information, Business Logic
Build toward a degree
Advanced · Course · 1 - 4 Weeks