• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Ethical Hackers

Results for "ethical+hackers"


  • I

    IBM

    IBM Ethical Hacking with Open Source Tools

    Skills you'll gain: Threat Detection, Penetration Testing, Exploit development, Cyber Threat Intelligence, Threat Management, Incident Response, Vulnerability Scanning, Cyber Security Assessment, Vulnerability Assessments, Vulnerability Management, Cybersecurity, Network Security, Network Monitoring, Bash (Scripting Language), Intrusion Detection and Prevention, Network Troubleshooting, Anomaly Detection, Information Systems Security, Cyber Security Policies, Network Analysis

    4.6
    Rating, 4.6 out of 5 stars
    ·
    178 reviews

    Intermediate · Professional Certificate · 3 - 6 Months

  • E

    EDUCBA

    Kali Linux: Ethical Hacking & Pentesting

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Metasploit, Penetration Testing, Malware Protection, Exploitation techniques, Database Management, Cyber Threat Intelligence, Vulnerability Assessments, Cyber Security Assessment, Brute-force attacks, Cryptography, Cybersecurity, Vulnerability Scanning, Intrusion Detection and Prevention, Data Import/Export, MySQL, Encryption, Mobile Security, Linux, Linux Administration

    4.8
    Rating, 4.8 out of 5 stars
    ·
    76 reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Packt

    Bug Bounty from Scratch

    Skills you'll gain: Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Penetration Testing, Threat Modeling, Exploit development, Open Web Application Security Project (OWASP), Application Security, Cyber Security Assessment, Patch Management, Cybersecurity, Data Ethics, Cyber Engineering, Technical Communication, Technical Writing

    Beginner · Course · 3 - 6 Months

  • L

    LearnKartS

    Ethical Hacking

    Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Penetration Testing, Security Testing, Cyber Security Assessment, Cyber Threat Hunting, Threat Detection, Cryptographic Protocols, Cybersecurity, Cyber Threat Intelligence, Cryptography, Exploit development, Open Web Application Security Project (OWASP), Cyber Security Strategy, Cyber Attacks, Application Security, Security Awareness, Security Controls, Data Security, Cyber Risk, Security Strategy

    4.6
    Rating, 4.6 out of 5 stars
    ·
    291 reviews

    Beginner · Specialization · 1 - 3 Months

  • P

    Packt

    Certified Ethical Hacker (CEH) v.12

    Skills you'll gain: MITRE ATT&CK Framework, Vulnerability Assessments, Open Web Application Security Project (OWASP), Distributed Denial-Of-Service (DDoS) Attacks, Vulnerability Scanning, Vulnerability Management, Threat Modeling, Cybersecurity, Malware Protection, Mobile Security, Cyber Threat Intelligence, Penetration Testing, Exploitation techniques, Brute-force attacks, Microsoft Intune (Mobile Device Management Software), Network Security, Cryptography, Threat Management, Threat Detection, Cloud Security

    4.8
    Rating, 4.8 out of 5 stars
    ·
    30 reviews

    Beginner · Specialization · 3 - 6 Months

  • P

    Packt

    The Complete Ethical Hacking Bootcamp: Beginner To Advanced

    Skills you'll gain: Linux Commands, Metasploit, Open Web Application Security Project (OWASP), Linux, Penetration Testing, Vulnerability Scanning, Command-Line Interface, Exploitation techniques, Scripting, Vulnerability Assessments, Brute-force attacks, General Networking, Python Programming, Web Applications, Cybersecurity, Data Ethics, Firewall, Network Security, Wireless Networks, System Configuration

    4.3
    Rating, 4.3 out of 5 stars
    ·
    47 reviews

    Beginner · Specialization · 3 - 6 Months

What brings you to Coursera today?

  • P

    Packt

    The Complete Ethical Hacking Course

    Skills you'll gain: Exploit development, OSI Models, Network Security, Exploitation techniques, TCP/IP, Cybersecurity, Vulnerability Scanning, Metasploit, Malware Protection, Network Protocols, Distributed Denial-Of-Service (DDoS) Attacks, Cyber Attacks, Wireless Networks, Application Security, Cyber Security Assessment, Network Monitoring, Linux, Object Oriented Programming (OOP), General Networking, Security Awareness

    4.7
    Rating, 4.7 out of 5 stars
    ·
    22 reviews

    Intermediate · Specialization · 3 - 6 Months

  • P

    Pearson

    Certified Ethical Hacker (CEH)

    Skills you'll gain: Open Web Application Security Project (OWASP), AI Security, Vulnerability Assessments, Distributed Denial-Of-Service (DDoS) Attacks, Network Security, Cryptography, Penetration Testing, Intrusion Detection and Prevention, Cybersecurity, Cyber Security Assessment, Malware Protection, Mobile Security, Threat Detection, Encryption, Cloud Security, Threat Management, Web Applications, Internet Of Things, Cloud Computing, Network Architecture

    4.6
    Rating, 4.6 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 1 - 3 Months

  • J

    Johns Hopkins University

    Introduction to Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Open Web Application Security Project (OWASP), Cyber Security Assessment, Metasploit, Public Key Infrastructure, Exploit development, Exploitation techniques, Threat Modeling, Cybersecurity, Distributed Denial-Of-Service (DDoS) Attacks, Cryptography, Cyber Threat Intelligence, Mobile Security, Security Testing, Brute-force attacks, Vulnerability Scanning, Network Security, Operating Systems, Encryption

    4
    Rating, 4 out of 5 stars
    ·
    20 reviews

    Intermediate · Specialization · 3 - 6 Months

  • U

    University of Colorado Boulder

    Security and Ethical Hacking

    Skills you'll gain: AI Security, Penetration Testing, Network Security, Exploitation techniques, Open Web Application Security Project (OWASP), Cyber Security Assessment, Unix, Computer Security, Network Monitoring, Application Security, Cybersecurity, Artificial Intelligence and Machine Learning (AI/ML), Cryptographic Protocols, Network Protocols, Cryptography, Security Awareness, Generative AI Agents, Server Side, Web Applications, Machine Learning Algorithms

    4.6
    Rating, 4.6 out of 5 stars
    ·
    16 reviews

    Intermediate · Specialization · 3 - 6 Months

  • E

    EC-Council

    Ethical Hacking Essentials (EHE)

    Skills you'll gain: Penetration Testing, Threat Management, Distributed Denial-Of-Service (DDoS) Attacks, Cloud Security, Vulnerability Assessments, Network Security, Threat Detection, Vulnerability Scanning, Cybersecurity, Cyber Attacks, Brute-force attacks, Exploitation techniques, Application Security, Human Factors (Security), Web Applications, Mobile Security, Internet Of Things, Authentications, Encryption, Wireless Networks

    4.6
    Rating, 4.6 out of 5 stars
    ·
    610 reviews

    Beginner · Course · 1 - 3 Months

  • U

    University of Colorado Boulder

    Computing, Ethics, and Society

    Skills you'll gain: Data Ethics, Security Awareness, Healthcare Ethics, Responsible AI, Ethical Standards And Conduct, Computer Security Awareness Training, Cybersecurity, Diversity Awareness, Generative AI, Artificial Intelligence, Information Technology, Information Privacy, Diversity Equity and Inclusion Initiatives, Social Impact, Media and Communications, Automation, Robotics, Cultural Diversity, Personally Identifiable Information, Emerging Technologies

    Build toward a degree

    4.5
    Rating, 4.5 out of 5 stars
    ·
    52 reviews

    Beginner · Specialization · 3 - 6 Months

1234…9

In summary, here are 10 of our most popular ethical+hackers courses

  • IBM Ethical Hacking with Open Source Tools: IBM
  • Kali Linux: Ethical Hacking & Pentesting: EDUCBA
  • Bug Bounty from Scratch: Packt
  • Ethical Hacking: LearnKartS
  • Certified Ethical Hacker (CEH) v.12: Packt
  • The Complete Ethical Hacking Bootcamp: Beginner To Advanced: Packt
  • The Complete Ethical Hacking Course: Packt
  • Certified Ethical Hacker (CEH): Pearson
  • Introduction to Ethical Hacking: Johns Hopkins University
  • Security and Ethical Hacking: University of Colorado Boulder

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok