Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Hacking Course Catalog
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Cyber Security Assessment, Security Testing, Threat Modeling, Vulnerability Scanning, Vulnerability Assessments, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Application Security, Network Security, Vulnerability Management, Virtual Local Area Network (VLAN), Malware Protection, Cloud Security, Wireless Networks, Network Protocols, Application Programming Interface (API)
Skills you'll gain: Penetration Testing, Open Web Application Security Project (OWASP), TCP/IP, Network Protocols, Vulnerability Assessments, Cyber Security Assessment, Windows PowerShell, Active Directory, Network Security, Network Analysis, Microsoft Windows, Wireless Networks, Scripting, Virtual Environment
- Status: Free Trial
New York University
Skills you'll gain: Security Engineering, Threat Modeling, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Cybersecurity, Cyber Risk, Information Systems Security, Network Security, Computer Security, Malware Protection, Encryption, Data Integrity
Skills you'll gain: Vulnerability Assessments, Vulnerability Scanning, Open Web Application Security Project (OWASP), Unix, Network Security, Cybersecurity, Application Security, Information Systems Security, Network Analysis, Web Applications, Command-Line Interface, Virtual Machines, Web Servers
- Status: Free Trial
Infosec
Skills you'll gain: Incident Response, Computer Security Incident Management, Endpoint Detection and Response, Cyber Operations, Cybersecurity, Cyber Threat Hunting, Intrusion Detection and Prevention, Security Management, Disaster Recovery
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Management, Threat Detection, Data Security, User Accounts, Entrepreneurship
- Status: Free Trial
Skills you'll gain: Open Web Application Security Project (OWASP), Penetration Testing, Vulnerability Scanning, Vulnerability Assessments, Intrusion Detection and Prevention, Application Security, Web Applications, Cybersecurity, Firewall, Network Security, Wireless Networks, Command-Line Interface, Microsoft Windows, Virtual Machines, SQL
- Status: Free Trial
Kennesaw State University
Skills you'll gain: Incident Response, Contingency Planning, Disaster Recovery, Computer Security Incident Management, Security Management, Crisis Management, Cybersecurity, Business Continuity, Cyber Attacks, Risk Analysis, Business Risk Management, Data Management
- Status: NewStatus: Free Trial
Skills you'll gain: Penetration Testing, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Security Engineering, Cyber Threat Intelligence, Information Systems Security, Software Installation
Ball State University
Skills you'll gain: Cryptography, Application Security, Encryption, Authentications, Cybersecurity, Data Encryption Standard, Advanced Encryption Standard (AES), Email Security, Network Security, Information Systems Security, Key Management, Application Development, Public Key Infrastructure, Data Integrity
University of Cape Town
Skills you'll gain: Design Thinking, Risk Management, Business Modeling, Innovation, Performance Measurement, Socioeconomics, Resource Management, Strategic Partnership, Financial Analysis, Entrepreneurial Finance, Finance, Stakeholder Management, Due Diligence, Contract Management
- Status: Free Trial
Akamai Technologies, Inc.
Skills you'll gain: Endpoint Security, Incident Response, Network Security, Vulnerability Scanning, Computer Security Incident Management, Security Management, Penetration Testing, Cybersecurity, Authentications, Vulnerability Assessments, Encryption, Firewall, Identity and Access Management, Hardening, Threat Detection, Disaster Recovery, Public Key Infrastructure, Mobile Security, Risk Management Framework, Risk Management
In summary, here are 10 of our most popular hacking courses
- Advanced Penetration Techniques:Â Packt
- Intermediate Ethical Hacking Hands-on Training:Â Packt
- Introduction to Cyber Attacks:Â New York University
- An Introduction to Ethical Hacking with Kali Linux:Â Packt
- Cyber Incident Response:Â Infosec
- Cybersecurity Awareness and Innovation:Â EIT Digital
- Intermediate Ethical Hacking Techniques:Â Packt
- Managing Cybersecurity Incidents and Disasters:Â Kennesaw State University
- Exploitation and Penetration Testing with Metasploit:Â IBM
- Cybersecurity and Secure Software Design:Â Ball State University