• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Coursera
  • Online Degrees
  • Careers
  • Log In
  • Join for Free
    Coursera
    • Browse
    • Hacking

    Hacking Courses Online

    Study ethical hacking for cybersecurity. Learn to identify vulnerabilities, perform penetration tests, and implement security measures.

    Skip to search results

    Filter by

    Subject
    Required
     *

    Language
    Required
     *

    The language used throughout the course, in both instruction and assessments.

    Learning Product
    Required
     *

    Build job-relevant skills in under 2 hours with hands-on tutorials.
    Learn from top instructors with graded assignments, videos, and discussion forums.
    Get in-depth knowledge of a subject by completing a series of courses and projects.
    Earn career credentials from industry leaders that demonstrate your expertise.
    Earn your Bachelor’s or Master’s degree online for a fraction of the cost of in-person learning.

    Level
    Required
     *

    Duration
    Required
     *

    Skills
    Required
     *

    Subtitles
    Required
     *

    Educator
    Required
     *

    Explore the Hacking Course Catalog

    • G

      Google

      Automate Cybersecurity Tasks with Python

      Skills you'll gain: Debugging, Python Programming, Cybersecurity, Cyber Security Assessment, Scripting, Programming Principles, Algorithms, Automation, Integrated Development Environments, File Management, Data Structures

      4.8
      Rating, 4.8 out of 5 stars
      ·
      3K reviews

      Beginner · Course · 1 - 4 Weeks

    • I

      Infosec

      Cyber Incident Response

      Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Threat Management, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Security Management, Intrusion Detection and Prevention, Threat Detection, Cyber Attacks, Cyber Security Assessment, Event Monitoring, Network Security, Network Monitoring, Data Security, Business Continuity, Network Analysis, Disaster Recovery, Malware Protection

      4.7
      Rating, 4.7 out of 5 stars
      ·
      248 reviews

      Beginner · Specialization · 3 - 6 Months

    • I

      Infosec

      Python for Cybersecurity

      Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Threat Modeling, Cybersecurity, Network Security, System Monitoring, Cyber Operations, Continuous Monitoring, Cyber Threat Intelligence, Endpoint Security, Incident Response, Scripting, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Authorization (Computing), IT Automation, Intrusion Detection and Prevention

      4.5
      Rating, 4.5 out of 5 stars
      ·
      500 reviews

      Intermediate · Specialization · 3 - 6 Months

    • C

      Coursera Project Network

      Metasploit for Beginners: Ethical Penetration Testing

      Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Cybersecurity, Command-Line Interface, Virtual Machines, Technical Communication

      4.8
      Rating, 4.8 out of 5 stars
      ·
      54 reviews

      Beginner · Guided Project · Less Than 2 Hours

    • Status: New
      New
      P

      Packt

      CompTIA PenTest+ (PT0-002)

      Skills you'll gain: Penetration Testing, Vulnerability Scanning, Cyber Security Assessment, MITRE ATT&CK Framework, Vulnerability Assessments, Infrastructure Security, Distributed Denial-Of-Service (DDoS) Attacks, Threat Detection, Application Security, Cybersecurity, Payment Card Industry (PCI) Data Security Standards, Cloud Security, Network Security, NIST 800-53, Security Testing, Technical Communication, Virtual Local Area Network (VLAN), Technical Writing, Scripting, General Data Protection Regulation (GDPR)

      5
      Rating, 5 out of 5 stars
      ·
      7 reviews

      Intermediate · Specialization · 1 - 3 Months

    • I

      Infosec

      Advanced Python Scripting for Cybersecurity

      Skills you'll gain: Network Analysis, Network Security, Cyber Operations, MITRE ATT&CK Framework, Cybersecurity, Threat Detection, Network Monitoring, Penetration Testing, Anomaly Detection, Scripting, Network Protocols, Authentications, TCP/IP, Python Programming, Data Access, User Accounts, System Programming, Automation

      4.5
      Rating, 4.5 out of 5 stars
      ·
      71 reviews

      Beginner · Specialization · 1 - 3 Months

    • Status: New
      New
      P

      Packt

      Certified Ethical Hacker (CEH) v.12

      Skills you'll gain: Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Management, Mobile Security, Cybersecurity, Threat Modeling, Penetration Testing, Cyber Threat Intelligence, Open Web Application Security Project (OWASP), Malware Protection, Threat Detection, Network Security, Cyber Attacks, MITRE ATT&CK Framework, Cyber Threat Hunting, Intrusion Detection and Prevention, Information Systems Security, Wireless Networks, Cryptography, Encryption

      4.9
      Rating, 4.9 out of 5 stars
      ·
      9 reviews

      Beginner · Specialization · 3 - 6 Months

    • U

      University of Colorado System

      Fundamentals of Computer Network Security

      Skills you'll gain: Cryptography, Public Key Infrastructure, Cybersecurity, Application Security, Data Security, Firewall, Cyber Attacks, Data Encryption Standard, Penetration Testing, Network Security, Information Assurance, Encryption, Risk Management Framework, Advanced Encryption Standard (AES), Intrusion Detection and Prevention, Vulnerability Scanning, Information Systems Security, Secure Coding, Security Controls, Software Design Patterns

      4
      Rating, 4 out of 5 stars
      ·
      579 reviews

      Intermediate · Specialization · 3 - 6 Months

    • N

      New York University

      Introduction to Cyber Security

      Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Mobile Security, Enterprise Security, Computer Security, Cyber Risk, Cyber Security Policies, Network Architecture, Security Controls

      4.7
      Rating, 4.7 out of 5 stars
      ·
      3.6K reviews

      Beginner · Specialization · 3 - 6 Months

    • Status: Free
      Free
      C

      Coursera Instructor Network

      Introduction to Cybersecurity Fundamentals

      Skills you'll gain: Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Data Security, Personally Identifiable Information, Malware Protection, Threat Management, Email Security

      4.6
      Rating, 4.6 out of 5 stars
      ·
      795 reviews

      Beginner · Course · 1 - 4 Weeks

    • K

      Kennesaw State University

      Cybersecurity: Protecting your Information at Home

      Skills you'll gain: Email Security, Personally Identifiable Information, Firewall, Threat Detection, Network Security, Cybersecurity, Security Awareness, Cloud Storage, Information Privacy, Cloud Computing, General Networking, Encryption

      4.8
      Rating, 4.8 out of 5 stars
      ·
      31 reviews

      Beginner · Course · 1 - 3 Months

    • I

      Infosec

      Cyber Incident Response

      Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery

      4.7
      Rating, 4.7 out of 5 stars
      ·
      164 reviews

      Beginner · Course · 1 - 4 Weeks

    Hacking learners also search

    Information Security
    Information Science
    Privacy
    Information Engineering
    Data Security
    Software Security
    Network Security
    Web Security
    1234…11

    In summary, here are 10 of our most popular hacking courses

    • Automate Cybersecurity Tasks with Python: Google
    • Cyber Incident Response: Infosec
    • Python for Cybersecurity: Infosec
    • Metasploit for Beginners: Ethical Penetration Testing: Coursera Project Network
    • CompTIA PenTest+ (PT0-002): Packt
    • Advanced Python Scripting for Cybersecurity: Infosec
    • Certified Ethical Hacker (CEH) v.12: Packt
    • Fundamentals of Computer Network Security: University of Colorado System
    • Introduction to Cyber Security: New York University
    • Introduction to Cybersecurity Fundamentals: Coursera Instructor Network

    Frequently Asked Questions about Hacking

    Whether you’re interested in cybersecurity or ethical hacking, having a clear goal can keep you motivated. Regular practice in coding, cryptography, and network security is essential. Engage in communities like Reddit’s r/hacking to learn and share knowledge. Work on real projects by participating in Capture The Flag (CTF) challenges. A great start is Introduction to Cyber Security Specialization by NYU.‎

    Hacking refers to the unauthorized access, manipulation, or exploitation of computer systems, networks, or software. It involves activities such as identifying vulnerabilities, bypassing security measures, and gaining unauthorized access to steal, modify, or destroy data. Hacking can be done for various purposes such as personal gain, activism, or cybersecurity testing. It is important to note that hacking activities are illegal unless carried out with explicit permission and in an ethical manner.‎

    If you are interested in learning hacking, there are several skills that are crucial to develop. These skills include:

    1. Basic computer knowledge: Understanding how computers and networks function is essential before diving into hacking. Familiarize yourself with operating systems (such as Windows, Linux, or macOS), network protocols, and computer hardware.

    2. Networking and protocols: Learn about different networking concepts, TCP/IP, routing, and switching. Understanding how data is transmitted and network protocols work is fundamental for being able to exploit vulnerabilities.

    3. Programming: Proficiency in programming languages like Python, JavaScript, C++, or Ruby is essential. Scripting languages will assist you in automating tasks and developing exploits.

    4. Linux: Familiarize yourself with the Linux operating system, as many hacking tools and techniques are more readily available on this platform. Learn basic Linux commands, file systems, and navigation.

    5. Web application security: Understand web technologies like HTML, CSS, JavaScript, and web application frameworks. Being able to identify common web vulnerabilities, such as cross-site scripting (XSS) and SQL injection, is crucial.

    6. Cryptography: Gain knowledge of encryption algorithms, cryptographic protocols, and their vulnerabilities. Understanding cryptography will help you identify weaknesses in cryptographic systems and exploit them.

    7. Ethical hacking: Familiarize yourself with the legal and ethical implications of hacking. Learn about different hacking techniques, tools, and methodologies used by ethical hackers to identify and fix vulnerabilities.

    8. Social engineering: Developing skills in social engineering helps you manipulate or deceive individuals to gain unauthorized access to systems. Understand the psychology behind human behavior and how to exploit it effectively.

    9. Vulnerability assessment and penetration testing: Learn tools and methodologies used for vulnerability assessment and penetration testing, such as Kali Linux, Metasploit, and Burp Suite. These skills enable you to identify and exploit vulnerabilities in systems.

    It is important to note that hacking should be used ethically and responsibly. Always obtain proper authorization and never engage in any illegal activities.‎

    With hacking skills, you can pursue various job opportunities related to cybersecurity and ethical hacking. Some of the potential jobs include:

    1. Ethical Hacker: As an ethical hacker, you would be responsible for identifying vulnerabilities, testing security systems, and implementing measures to safeguard against cyber threats.

    2. Penetration Tester: Penetration testers simulate cyberattacks to evaluate the security of computer systems and networks. They provide recommendations for enhancing security and fixing vulnerabilities.

    3. Security Analyst: Security analysts monitor systems for potential security breaches, investigate incidents, and develop strategies to protect sensitive information from unauthorized access.

    4. Security Consultant: Security consultants offer expert advice and assistance on cybersecurity practices, risk assessments, and developing security policies for organizations.

    5. Information Security Manager: Information security managers develop and execute strategies to protect an organization's data and information systems. They oversee security operations and ensure compliance with industry regulations.

    6. Incident Response Analyst: Incident response analysts investigate and respond to security incidents, including identifying the cause, containing the breach, and conducting forensic analysis to prevent future incidents.

    7. Cybersecurity Engineer: Cybersecurity engineers design and implement security measures for computer systems, networks, and software applications to defend against cyber threats.

    8. Security Auditor: Security auditors assess an organization's security infrastructure, policies, and procedures. They identify vulnerabilities and provide recommendations for improving security.

    9. Cybersecurity Researcher: Cybersecurity researchers explore emerging threats, vulnerabilities, and develop innovative approaches to enhance security systems and protocols.

    10. Bug Bounty Hunter: Some hackers use their skills to find and report security vulnerabilities in applications or websites through bug bounty programs and earn rewards.

    Remember, ethical hacking and cybersecurity careers require continual learning and staying updated with the latest techniques, tools, and regulations to combat ever-evolving cyber threats.‎

    People who are curious, analytical, and have a strong problem-solving mindset are best suited for studying hacking. They should have a keen interest in technology, computer systems, and cybersecurity. Additionally, individuals who possess good programming skills, attention to detail, and the ability to think outside the box are likely to excel in this field. It is important for them to have a strong ethical foundation and a commitment to using their skills responsibly and legally.‎

    Here are some topics related to Hacking that you can study:

    1. Ethical Hacking: Learn about legal and ethical hacking techniques used to identify vulnerabilities in computer systems and networks.

    2. Cybersecurity: Dive into the world of cybersecurity to understand how to secure computer systems, networks, and data from unauthorized access or attacks.

    3. Penetration Testing: Gain knowledge of conducting security assessments on computer systems and networks to identify potential vulnerabilities that could be exploited by hackers.

    4. Network Security: Explore the field of network security to understand how to protect the integrity and privacy of data transmitted across computer networks.

    5. Cryptography: Study the science of encryption and decryption to learn how cryptographic techniques can be used to secure data and communication channels.

    6. Web Application Security: Focus on securing web applications from common vulnerabilities such as cross-site scripting (XSS), SQL injection, and session hijacking.

    7. Wireless Security: Learn about securing wireless networks and understanding the vulnerabilities associated with wireless communication.

    8. Incident Response: Understand how to respond to and manage security incidents effectively, including incident detection, containment, eradication, and recovery.

    9. Social Engineering: Explore the psychological manipulation techniques used by hackers to exploit human vulnerabilities and learn how to mitigate such attacks.

    10. Malware Analysis: Study the analysis of malicious software to understand their behavior, potential impact, and methods of detection and removal.

    Remember, while it is important to study these topics for educational purposes or career development, it is crucial to always follow legal and ethical guidelines when applying this knowledge.‎

    Online Hacking courses offer a convenient and flexible way to enhance your knowledge or learn new Hacking refers to the unauthorized access, manipulation, or exploitation of computer systems, networks, or software. It involves activities such as identifying vulnerabilities, bypassing security measures, and gaining unauthorized access to steal, modify, or destroy data. Hacking can be done for various purposes such as personal gain, activism, or cybersecurity testing. It is important to note that hacking activities are illegal unless carried out with explicit permission and in an ethical manner. skills. Choose from a wide range of Hacking courses offered by top universities and industry leaders tailored to various skill levels.‎

    When looking to enhance your workforce's skills in Hacking, it's crucial to select a course that aligns with their current abilities and learning objectives. Our Skills Dashboard is an invaluable tool for identifying skill gaps and choosing the most appropriate course for effective upskilling. For a comprehensive understanding of how our courses can benefit your employees, explore the enterprise solutions we offer. Discover more about our tailored programs at Coursera for Business here.‎

    This FAQ content has been made available for informational purposes only. Learners are advised to conduct additional research to ensure that courses and other credentials pursued meet their personal, professional, and financial goals.

    Other topics to explore

    Arts and Humanities
    338 courses
    Business
    1095 courses
    Computer Science
    668 courses
    Data Science
    425 courses
    Information Technology
    145 courses
    Health
    471 courses
    Math and Logic
    70 courses
    Personal Development
    137 courses
    Physical Science and Engineering
    413 courses
    Social Sciences
    401 courses
    Language Learning
    150 courses

    Coursera Footer

    Technical Skills

    • ChatGPT
    • Coding
    • Computer Science
    • Cybersecurity
    • DevOps
    • Ethical Hacking
    • Generative AI
    • Java Programming
    • Python
    • Web Development

    Analytical Skills

    • Artificial Intelligence
    • Big Data
    • Business Analysis
    • Data Analytics
    • Data Science
    • Financial Modeling
    • Machine Learning
    • Microsoft Excel
    • Microsoft Power BI
    • SQL

    Business Skills

    • Accounting
    • Digital Marketing
    • E-commerce
    • Finance
    • Google
    • Graphic Design
    • IBM
    • Marketing
    • Project Management
    • Social Media Marketing

    Career Resources

    • Essential IT Certifications
    • High-Income Skills to Learn
    • How to Get a PMP Certification
    • How to Learn Artificial Intelligence
    • Popular Cybersecurity Certifications
    • Popular Data Analytics Certifications
    • What Does a Data Analyst Do?
    • Career Development Resources
    • Career Aptitude Test
    • Share your Coursera Learning Story

    Coursera

    • About
    • What We Offer
    • Leadership
    • Careers
    • Catalog
    • Coursera Plus
    • Professional Certificates
    • MasterTrack® Certificates
    • Degrees
    • For Enterprise
    • For Government
    • For Campus
    • Become a Partner
    • Social Impact
    • Free Courses
    • ECTS Credit Recommendations

    Community

    • Learners
    • Partners
    • Beta Testers
    • Blog
    • The Coursera Podcast
    • Tech Blog
    • Teaching Center

    More

    • Press
    • Investors
    • Terms
    • Privacy
    • Help
    • Accessibility
    • Contact
    • Articles
    • Directory
    • Affiliates
    • Modern Slavery Statement
    • Manage Cookie Preferences
    Learn Anywhere
    Download on the App Store
    Get it on Google Play
    Logo of Certified B Corporation
    © 2025 Coursera Inc. All rights reserved.
    • Coursera Facebook
    • Coursera Linkedin
    • Coursera Twitter
    • Coursera YouTube
    • Coursera Instagram
    • Coursera TikTok