Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Find the best Ethical Hacking course for your goals
Status: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers
Status: Free TrialSkills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security
Status: PreviewBoard Infinity
Skills you'll gain: Vulnerability Assessments, Cyber Security Assessment, Network Monitoring, Penetration Testing, Virtual Private Networks (VPN), Command-Line Interface, Linux Commands, Network Troubleshooting, Cybersecurity, Linux, Software Installation, Intrusion Detection and Prevention, Network Security, Network Analysis
Status: NewStatus: Free TrialSkills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture
Status: Free TrialSkills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity
Status: NewStatus: Free TrialSkills you'll gain: Information Systems Security, Cyber Security Policies, Data Ethics, Cyber Governance, Application Security, Cyber Risk, Computer Security, Security Testing, General Data Protection Regulation (GDPR)
Status: NewStatus: Free TrialUniversity of Colorado Boulder
Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Network Security, Vulnerability Scanning, Wireless Networks, Cybersecurity, Exploitation techniques, Linux, Vulnerability Assessments, Information Systems Security, Command-Line Interface, Network Analysis, Encryption, Virtual Private Networks (VPN), System Configuration, Software Installation, File Management, Virtual Machines

Coursera Instructor Network
Skills you'll gain: Metasploit, Penetration Testing, Vulnerability Scanning, Exploitation techniques, Vulnerability Assessments, Cybersecurity, Data Ethics, Virtual Machines, Linux, Technical Documentation
Status: Free TrialSkills you'll gain: Security Testing, Threat Detection, Application Security, Git (Version Control System), GitLab, GitHub, Problem Solving
Status: Free TrialLearnKartS
Skills you'll gain: Mobile Security, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Cybersecurity, Cryptography, Penetration Testing, Encryption, Cloud Computing, Application Security, Virtualization, Virtual Machines, SQL
Status: NewStatus: PreviewUniversity of Cambridge
Skills you'll gain:
Ethical Hacking learners also search
In summary, here are 10 of our most popular ethical hacking courses
- Security & Ethical Hacking: Attacking the Network:Â University of Colorado Boulder
- Certified Ethical Hacker (CEH) v.12:Â Packt
- Kali Linux:Â Board Infinity
- Certified Ethical Hacker (CEH):Â Pearson
- Cybersecurity Attack and Defense Fundamentals:Â EC-Council
- Introduction to Ethical Hacking Principles:Â SkillUp
- Security and Ethical Hacking:Â University of Colorado Boulder
- Ethical Hacking Foundations & Network Security:Â Packt
- Metasploit for Beginners: Ethical Penetration Testing:Â Coursera Instructor Network
- Ethical Hacking Practice Project & Questions:Â LearnKartS










