Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Hacking Course Catalog
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Cyber Security Assessment, Exploitation techniques, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Network Security, Open Web Application Security Project (OWASP), SQL
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Metasploit, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cyber Security Assessment, Cyber Threat Intelligence, Generative AI, Cyber Operations, Data Ethics, Prompt Engineering, Automation
Status: Free TrialSkills you'll gain: Debugging, Python Programming, Cybersecurity, Scripting, Programming Principles, Data Import/Export, Algorithms, Automation, Computer Programming, File Management
Status: Free TrialUniversity of California, Davis
Skills you'll gain: Threat Modeling, Secure Coding, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Encryption, Application Security, Vulnerability Assessments, Data Security, Security Controls, Authentications, Security Testing, Vulnerability Management, Personally Identifiable Information
Status: Free TrialUniversity at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Cloud Security, Authentications
Status: Free TrialUniversity of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Computer Networking, Cybersecurity, Cyber Security Strategy, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks
Status: Free TrialSkills you'll gain: Ansible, Puppet (Configuration Management Tool), Software-Defined Networking, Network Administration, Security Awareness, Threat Modeling, Chef (Configuration Management Tool), Information Systems Security, Virtual Private Networks (VPN), JSON, Authentications, Computer Networking, Network Architecture, Authorization (Computing), Automation, Configuration Management, Application Programming Interface (API)
Status: NewStatus: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Network Protocols
Status: PreviewUniversity of London
Skills you'll gain: Key Management, Security Management, Cryptography, Information Systems Security, Cyber Security Policies, Cybersecurity, Cyber Risk, Encryption, Threat Management, Computer Security, Information Assurance, Data Integrity, Incident Response
Status: Free TrialSkills you'll gain: Network Security, Intrusion Detection and Prevention, Command-Line Interface, Cybersecurity, Information Systems Security, Local Area Networks, Firewall, Windows PowerShell, Hardening, Threat Detection, Linux, Penetration Testing, Network Architecture, Wireless Networks, Vulnerability Assessments, System Configuration, IT Automation, Encryption, Network Analysis, Public Key Infrastructure
Status: NewStatus: Free TrialMacquarie University
Skills you'll gain: Cryptography, Encryption, Data Security, Cybersecurity, Application Security, Key Management, Network Security, Public Key Infrastructure, Data Encryption Standard, Security Engineering, Blockchain, Wireless Networks, Security Management, Virtual Private Networks (VPN), Intellectual Property, Data Integrity, Authentications, Hardware Architecture, Emerging Technologies
Status: Free TrialSkills you'll gain: Network Analysis, Network Security, Cyber Operations, Intrusion Detection and Prevention, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, Vulnerability Assessments, Python Programming, Data Access, System Monitoring, Automation
In summary, here are 10 of our most popular hacking courses
- Practical Cybersecurity Fundamentals: Unit 3:Â Pearson
- Generative AI for Penetration Testing: Red Team:Â LearnQuest
- Automate Cybersecurity Tasks with Python:Â Google
- Identifying Security Vulnerabilities:Â University of California, Davis
- Cyber Security in Manufacturing :Â University at Buffalo
- Cyber Security – Technology and Governance: University of London
- Security Fundamentals & Network Automation:Â Packt
- Secure Against Network Intrusions:Â Google
- Cyber Security Fundamentals:Â University of London
- Securing Systems and Networks:Â Packt










