Filter by
The language used throughout the course, in both instruction and assessments.
Explore the Hacking Course Catalog
University of London
Skills you'll gain: Computer Science, Computer Systems, Web Applications, Computer Networking, Computational Thinking, Debugging, Usability, Cybersecurity, Software Architecture, Network Protocols, Databases
Royal Holloway, University of London
Skills you'll gain: Computer Security Incident Management, Cyber Governance, Incident Management, Incident Response, Security Management, Cyber Security Strategy, Cyber Security Policies, Human Factors (Security), Security Awareness, ISO/IEC 27001, Computer Security Awareness Training, Cyber Risk, Information Assurance
Universidad de los Andes
Skills you'll gain: IT Security Architecture, Computer Security Incident Management, Network Security, Incident Response, Cryptography, Security Requirements Analysis, Penetration Testing, Information Systems Security, Human Factors (Security), Cybersecurity, Threat Detection, Cloud Security, Vulnerability Assessments, Cyber Attacks, Encryption, Vulnerability Management, Risk Management Framework, Data Security, Security Management, Personally Identifiable Information
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Information Systems Security, Cyber Security Assessment, Threat Detection, Information Assurance, Network Security, Risk Management Framework, Personally Identifiable Information, Cloud Security
University of California, Davis
Skills you'll gain: Secure Coding, Application Security, Verification And Validation, Code Review, Linux, Vulnerability Assessments, Security Engineering, C++ (Programming Language), User Accounts, Data Validation, Debugging, Cryptography, File Systems, Authorization (Computing), C (Programming Language), Encryption, OS Process Management
Kennesaw State University
Skills you'll gain: Internet Of Things, Cybersecurity, Cyber Security Strategy, Cyber Security Policies, Mobile Security, Security Awareness, Wireless Networks, Information Privacy, Emerging Technologies, Cyber Security Assessment, Enterprise Security, Embedded Software, Risk Management Framework
Skills you'll gain: Cyber Operations, Threat Management, Threat Detection, Cybersecurity, Scripting, IT Automation, Command-Line Interface, Python Programming, Network Security, Encryption
Kennesaw State University
Skills you'll gain: Cyber Security Strategy, Cybersecurity, Mobile Security, Cyber Threat Intelligence, Network Security, Cyber Security Policies, Internet Of Things, Emerging Technologies, Business Technologies, Identity and Access Management, Business
Skills you'll gain: Threat Modeling, Cyber Governance, Cybersecurity, Security Engineering, Cyber Security Policies, Cryptography, Network Security, Cyber Risk, Cyber Attacks, Cyber Security Strategy, Risk Management Framework, Threat Detection, Vulnerability Assessments, Incident Response
Kennesaw State University
Skills you'll gain: Cyber Governance, Cyber Security Policies, Cyber Security Strategy, Security Management, Cyber Risk, Cybersecurity, Security Strategy, Risk Management Framework, Security Controls, Enterprise Security, Information Privacy
Royal Holloway, University of London
Skills you'll gain: Human Factors (Security), Cyber Threat Intelligence, Cybersecurity, Cyber Attacks, Cyber Risk, Threat Modeling, Security Awareness, Social Sciences, Culture, Psychology, Survey Creation
Kennesaw State University
Skills you'll gain: Network Security, Security Management, Firewall, Cyber Attacks, Network Monitoring, Cybersecurity, Cyber Security Assessment, Network Protocols, Computer Networking, Virtual Private Networks (VPN), Wireless Networks, Vulnerability Assessments, Cloud Security, Continuous Monitoring, TCP/IP, Intrusion Detection and Prevention, Threat Detection, Mobile Security, Cryptography, Encryption
In summary, here are 10 of our most popular hacking courses
- How Computers Work: University of London
- Security Management and Governance: Royal Holloway, University of London
- Ciberseguridad: Universidad de los Andes
- Cyber Security in Manufacturing : University at Buffalo
- Identifying Security Vulnerabilities in C/C++Programming: University of California, Davis
- Cybersecurity and the Internet of Things: Kennesaw State University
- Python for Command-and-control, Exfiltration and Impact: Infosec
- Cybersecurity and Mobility: Kennesaw State University
- Introduction to Automotive Cybersecurity & Vehicle Networks: Starweaver
- The GRC Approach to Managing Cybersecurity: Kennesaw State University