Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Hacking Course Catalog
Skills you'll gain: Penetration Testing, Threat Modeling, Secure Coding, Web Development, Web Applications, Full-Stack Web Development, Security Testing, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript
Skills you'll gain: Penetration Testing, Network Security, Wireless Networks, Local Area Networks, General Networking, Network Administration, Cybersecurity, Vulnerability Assessments, System Configuration, Linux Administration, Encryption, Network Analysis, Software Installation, Command-Line Interface, Virtual Machines
University of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Cyber Security Assessment, Cryptographic Protocols, Remote Access Systems, Network Protocols, Vulnerability Assessments, TCP/IP, Encryption, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
- Status: Free Trial
Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, Cyber Security Assessment, General Networking, Network Security, Cybersecurity, Vulnerability Assessments, Data Ethics, Computer Security Awareness Training, System Configuration, Software Installation, Virtual Machines, File Management
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Encryption, Data Integrity
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Penetration Testing, Distributed Denial-Of-Service (DDoS) Attacks, Mobile Security, Cybersecurity, Cyber Threat Intelligence, Application Security, Threat Modeling, Network Security, Vulnerability Assessments, Web Applications, Wireless Networks, Intrusion Detection and Prevention, Encryption, Network Protocols, Authentications
- Status: Free Trial
Johns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Penetration Testing, Threat Modeling, Cyber Threat Intelligence, Cybersecurity, Operating Systems, Malware Protection, Application Security, Vulnerability Assessments, Computer Architecture
- Status: Free Trial
Skills you'll gain: Threat Management, Incident Management, Remote Access Systems, Incident Response, Security Management, Data Security, Vulnerability Assessments, Threat Detection, Computer Security Incident Management, Cybersecurity, Security Controls, Continuous Monitoring, Cyber Security Assessment, Security Software, Vulnerability Management, Computer Security Awareness Training, Security Strategy, Telecommuting, Infrastructure Security, Cyber Security Policies
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Penetration Testing, Unix, Network Security, Cybersecurity, Application Security, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
Erasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Safety and Security, Telehealth, Information Privacy, General Data Protection Regulation (GDPR)
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Cybersecurity, Vulnerability Assessments, Security Testing, Security Engineering, Cyber Threat Intelligence, Web Applications, USB, Software Installation, Command-Line Interface, System Configuration
In summary, here are 10 of our most popular hacking courses
- Web Hacking Expert - Full-Stack Exploitation Mastery:Â Packt
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux:Â Packt
- Security & Ethical Hacking: Attacking the Network:Â University of Colorado Boulder
- Ethical Hacking Foundations:Â Packt
- Introduction to Cyber Attacks:Â New York University
- Intermediate Ethical Hacking Hands-on Training:Â Packt
- Advanced Cybersecurity Techniques:Â Johns Hopkins University
- Advanced Cybersecurity Topics:Â Johns Hopkins University
- Identifying and Managing Security Gaps for Remote Teams:Â LearnQuest
- An Introduction to Ethical Hacking with Kali Linux:Â Packt