• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
Log In
Join for Free
Coursera
  • Browse
  • Hacking

Hacking Courses Online

Study ethical hacking for cybersecurity. Learn to identify vulnerabilities, perform penetration tests, and implement security measures.

Skip to search results

Filter by

Subject
Required
 *

Language
Required
 *

The language used throughout the course, in both instruction and assessments.

Learning Product
Required
 *

Build job-relevant skills in under 2 hours with hands-on tutorials.
Learn from top instructors with graded assignments, videos, and discussion forums.
Get in-depth knowledge of a subject by completing a series of courses and projects.
Earn career credentials from industry leaders that demonstrate your expertise.
Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

Level
Required
 *

Duration
Required
 *

Skills
Required
 *

Subtitles
Required
 *

Educator
Required
 *

Explore the Hacking Course Catalog

  • Status: Free Trial
    Free Trial
    E

    EC-Council

    Cybersecurity Attack and Defense Fundamentals

    Skills you'll gain: Penetration Testing, Network Security, Threat Modeling, Mobile Security, Cloud Security, Public Key Infrastructure, Vulnerability Assessments, Cryptography, Security Controls, Threat Detection, Cybersecurity, Authorization (Computing), Security Awareness, Cloud Computing, Encryption, Malware Protection, Intrusion Detection and Prevention, Identity and Access Management, Cyber Attacks, Data Integrity

    4.6
    Rating, 4.6 out of 5 stars
    ·
    752 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Cyber Attacks, Wireless Networks, Application Security, Network Monitoring, Linux, Object Oriented Programming (OOP), Vulnerability Assessments, Cyber Security Assessment, Intrusion Detection and Prevention

    4.4
    Rating, 4.4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: Preview
    Preview
    S

    SAE Institute México

    Ethical Hacking

    Skills you'll gain: Exploitation techniques, Vulnerability Scanning, Penetration Testing, Vulnerability Assessments, Cyber Operations, Cybersecurity, Information Systems Security, Network Security, Computer Networking, Network Protocols

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    7 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Packt

    Certified Ethical Hacker (CEH) v.12

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Network Security, Cryptography, Exploit development, Information Systems Security, Threat Detection, Intrusion Detection and Prevention, Cloud Security

    4.7
    Rating, 4.7 out of 5 stars
    ·
    23 reviews

    Beginner · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    Status: AI skills
    AI skills
    I

    IBM

    IBM Digital Marketing and Growth Hacking with GenAI

    Skills you'll gain: Responsible AI, Social Media Management, Social Media, Social Media Marketing, Google Ads, Digital Marketing, Email Marketing, Social Media Strategy, Digital Advertising, Web Analytics and SEO, Online Advertising, Social Media Campaigns, Digital Media Strategy, Paid media, Content Creation, Customer Retention, Search Engine Optimization, Presentations, Content Performance Analysis, Generative AI

    4.8
    Rating, 4.8 out of 5 stars
    ·
    87 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security and Ethical Hacking

    Skills you'll gain: Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Vulnerability Assessments, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

    4.4
    Rating, 4.4 out of 5 stars
    ·
    10 reviews

    Intermediate · Specialization · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Modeling, Threat Detection, Encryption, Cloud Security, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    Intermediate · Specialization · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I
    I

    Multiple educators

    IBM and ISC2 Cybersecurity Specialist

    Skills you'll gain: Incident Response, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Penetration Testing, Cloud Services, Business Continuity, Disaster Recovery, Security Controls, Generative AI, Configuration Management, Governance, Cloud Security, Cloud Infrastructure, Cybersecurity, Data Storage, Peripheral Devices, Application Security, Information Technology, Cryptography

    4.7
    Rating, 4.7 out of 5 stars
    ·
    14K reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    EC-Council

    Information Security Analyst

    Skills you'll gain: Network Security, Incident Response, Computer Security Incident Management, Cryptography, Penetration Testing, Vulnerability Management, Cybersecurity, Application Security, Cyber Security Policies, Security Information and Event Management (SIEM), Threat Detection, Network Monitoring, Cloud Security, Vulnerability Assessments, Malware Protection, Mobile Security, Identity and Access Management, Internet Of Things, Risk Analysis, Web Applications

    4.9
    Rating, 4.9 out of 5 stars
    ·
    34 reviews

    Beginner · Professional Certificate · 3 - 6 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Hacking and Patching

    Skills you'll gain: Penetration Testing, Application Security, Vulnerability Scanning, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, C (Programming Language)

    4
    Rating, 4 out of 5 stars
    ·
    277 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Fundamentals of Computer Network Security

    Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Exploitation techniques

    4
    Rating, 4 out of 5 stars
    ·
    589 reviews

    Intermediate · Specialization · 3 - 6 Months

Hacking learners also search

Information Security
Information Science
Privacy
Information Engineering
Data Security
Software Security
Network Security
Web Security
1234…13

In summary, here are 10 of our most popular hacking courses

  • Cybersecurity Attack and Defense Fundamentals: EC-Council
  • The Complete Ethical Hacking Course: Packt
  • Ethical Hacking: SAE Institute México
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Certified Ethical Hacker (CEH) v.12: Packt
  • IBM Digital Marketing and Growth Hacking with GenAI: IBM
  • Security and Ethical Hacking: University of Colorado Boulder
  • Certified Ethical Hacker (CEH): Pearson
  • IBM and ISC2 Cybersecurity Specialist: ISC2
  • Information Security Analyst: EC-Council

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Manage Cookie Preferences
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2025 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok