Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Hacking Course Catalog
Status: NewStatus: Free TrialSkills you'll gain: Exploit development, Penetration Testing, Malware Protection, Network Monitoring, Object Oriented Programming (OOP), Cyber Security Assessment, Intrusion Detection and Prevention, Network Security, Network Protocols, Network Analysis, Scripting, Remote Access Systems, Python Programming, Command-Line Interface
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Cybersecurity, Metasploit, Cyber Attacks, Application Security, Exploitation techniques, Security Awareness, Malware Protection, Vulnerability Assessments, Javascript, Web Servers

Skills you'll gain: Security Testing, Penetration Testing, Open Web Application Security Project (OWASP), Cyber Security Assessment, Vulnerability Scanning, Application Security, Exploitation techniques, Vulnerability Assessments, Data Security, Web Applications, SQL
Status: Free TrialSkills you'll gain: Penetration Testing, Exploitation techniques, Scripting, Scripting Languages, Python Programming, Cyber Operations, Object Oriented Programming (OOP), Network Security, Network Protocols, Debugging
Status: PreviewErasmus University Rotterdam
Skills you'll gain: Email Security, Human Factors (Security), Cyber Security Policies, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Risk, Computer Security Awareness Training, Patient Safety, Malware Protection, Encryption, Health Technology, Data Security, Information Privacy, Digital Communications
Status: Free TrialJohns Hopkins University
Skills you'll gain: MITRE ATT&CK Framework, Metasploit, Penetration Testing, Exploit development, Exploitation techniques, Threat Modeling, Cyber Threat Intelligence, Cyber Operations, Cyber Security Assessment, Cybersecurity, Operating Systems, Hardening, Malware Protection, Vulnerability Assessments, Security Controls, Authorization (Computing), Intrusion Detection and Prevention, System Programming, Authentications, Computer Architecture
Status: Free TrialInfosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery
Status: Free TrialAkamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
Status: Free TrialSkills you'll gain: Responsible AI, Machine Learning, Data Ethics, Predictive Analytics, Statistical Modeling, Supervised Learning, Artificial Intelligence and Machine Learning (AI/ML), Data Science, Machine Learning Algorithms, Decision Tree Learning, Data Analysis, Regression Analysis, Performance Analysis, Deep Learning, Artificial Neural Networks
Status: NewStatus: Free TrialSkills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Security Testing, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Cryptography, Cybersecurity, Vulnerability Scanning, Hardening, Threat Detection, Data Import/Export, Public Key Infrastructure, MySQL, Linux, Linux Administration
Status: PreviewEIT Digital
Skills you'll gain: Email Security, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Detection, Data Security, Secure Coding, Human Factors (Security), Fraud detection, Entrepreneurship
Status: NewStatus: Free TrialSkills you'll gain: Penetration Testing, Malware Protection, Cyber Threat Intelligence, Exploitation techniques, Cybersecurity, Threat Detection, Email Security, Vulnerability Assessments, Human Factors (Security), Network Analysis
In summary, here are 10 of our most popular hacking courses
- Exploit Development, Malware, & Defensive Strategies:Â Packt
- Web Security, Social Engineering & External Attacks:Â Packt
- Web Hacker's Toolbox - Tools Used by Successful Hackers:Â Packt
- Advanced Exploitation and Scripting Techniques:Â Packt
- Cybersecurity in Healthcare (Hospitals & Care Centres):Â Erasmus University Rotterdam
- Advanced Cybersecurity Topics:Â Johns Hopkins University
- Cyber Incident Response:Â Infosec
- Introduction to IT Security:Â Akamai Technologies, Inc.
- Machine Learning Under the Hood: The Technical Tips, Tricks, and Pitfalls:Â SAS
- Kali Linux: Ethical Hacking & Pentesting:Â EDUCBA










