Filter by
The language used throughout the course, in both instruction and assessments.
Explore the Hacking Course Catalog
École Polytechnique
Skills you'll gain: Growth Strategies, Key Performance Indicators (KPIs), Digital Transformation, Performance Analysis, Business Metrics, Business Analysis, Competitive Analysis, Action Oriented, Analysis, Business Transformation, Digital Assets, Business Development, Business Valuation, Entrepreneurship, Technology Strategies, Business Technologies, E-Commerce, Emerging Technologies, Law, Regulation, and Compliance, Business Management
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Linux, Network Security, Cyber Governance, OSI Models, Incident Management, Incident Response, Security Management, Linux Commands, TCP/IP, Computer Systems, Threat Modeling, Command-Line Interface, Network Protocols, Cybersecurity, Computer Networking, Human Factors (Security), Cyber Threat Intelligence, Cyber Attacks, Cyber Risk
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Emerging Technologies, Cyber Security Assessment, Enterprise Security, Embedded Software, Risk Management Framework
University of Leeds
Skills you'll gain: Cryptographic Protocols, Cryptography, Encryption, Public Key Cryptography Standards (PKCS), Cybersecurity, Data Security, Authentications, Data Integrity
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Disaster Recovery, Business Continuity, Application Security, IT Security Architecture, Infrastructure Security, Cryptography, Regulation and Legal Compliance, Bash (Scripting Language), Encryption, Authorization (Computing), Risk Management, Virtualization
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Skills you'll gain: Ansible, Vulnerability Scanning, Network Security, Cybersecurity, Network Monitoring, Firewall, Linux Commands, System Configuration, Command-Line Interface, TCP/IP, Network Analysis, Configuration Management, Software Versioning
Multiple educators
Skills you'll gain: Incident Response, Network Security, Computer Security Incident Management, Cloud Computing Architecture, Peripheral Devices, Cloud Services, Security Controls, Business Continuity, Disaster Recovery, Information Assurance, System Configuration, Cybersecurity, Configuration Management, Computing Platforms, Cloud Security, Cloud Infrastructure, Network Troubleshooting, Security Awareness, Cloud Platforms, Encryption
University of California San Diego
Skills you'll gain: Bioinformatics, Computational Thinking, Life Sciences, Medical Science and Research, Scientific Methods, Science and Research
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Cyber Security Policies, Internet Of Things, Emerging Technologies, Business Technologies, Identity and Access Management, Business
University of California, Davis
Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Cybersecurity, Dependency Analysis, Docker (Software), Git (Version Control System)
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
In summary, here are 10 of our most popular hacking courses
- Digital Business: École Polytechnique
- Cyber Security – Technology and Governance: Royal Holloway, University of London
- Cybersecurity and the Internet of Things: Kennesaw State University
- An Introduction to Cryptography: University of Leeds
- Cyber Security Technologies: Illinois Tech
- Security Management and Governance: Royal Holloway, University of London
- Getting Started in Port Scanning Using Nmap and Kali Linux: Packt
- IBM and ISC2 Cybersecurity Specialist: IBM
- Hacking COVID-19 — Course 3: Unraveling COVID-19's Origins: University of California San Diego
- Cybersecurity and Mobility: Kennesaw State University