Introduction To Ethical Hacking
In this course, you will learn what it means to be an Ethical Hacker, and practice tools and techniques used to hack ethically.
Skill level
BeginnerTime to complete
Average based on combined completion rates — individual pacing in lessons, projects, and quizzes may vary1 hourCertificate of completion
Included with paid plansPrerequisites
None
About this course
Hacking is a neat skill to have. However, such a skill requires great responsibility. Learn about the responsibility an ethical hacker have in this introductory course to Ethical Hacking. In this course, you will get a peek into what it means to be an Ethical Hacker, practice hacking ethically, and learn the tools and techniques to be an efficient hacker.
Syllabus
5 lessons • 1 projects • 4 quizzes Introduction To Ethical Hacking course ratings and reviews
- 5 stars
- 4 stars
- 3 stars
- 2 stars
- 1 star
- The progress I have made since starting to use codecademy is immense! I can study for short periods or long periods at my own convenience - mostly late in the evenings.ChrisCodecademy Learner @ USA
- I felt like I learned months in a week. I love how Codecademy uses learning by practice and gives great challenges to help the learner to understand a new concept and subject.RodrigoCodecademy Learner @ UK
- Brilliant learning experience. Very interactive. Literally a game changer if you're learning on your own.John-AndrewCodecademy Learner @ USA
Our learners work at
Frequently asked questions about Ethical Hacking
Ethical hacking (AKA penetration testing) involves trying to break into an organization’s networks and systems to evaluate its cyber defenses. Unlike the malicious hacking you hear about in the news, ethical hacking is entirely legal and plays a big role in cybersecurity.
Join over 50 million learners and start Introduction To Ethical Hacking today!
Looking for something else?
Related resources
- Article
Red Team Tools
Let's explore offensive tools used by red teams. - Article
Data and Personal Privacy & the Ethical and Social Implications of Computing Systems
Learn about how programs have both a positive and negative impact on personal privacy as well as social and ethical implications. - Article
The Evolution of Cybersecurity
In this article, you'll explore the evolution of hacking and cybersecurity.
Related courses and paths
- Free course
Introduction to Cybersecurity
Learn about the fast-growing field of cybersecurity and how to protect your data and information from digital attacks.Beginner Friendly3 hours - Skill path
Fundamentals of Cybersecurity
Learn the Cybersecurity fundamentals that will lay a foundation for securing your technology and personal life from dangerous cyber threats.Includes 5 CoursesWith CertificateBeginner Friendly3 hours - Free course
Intro to Java
Get started with Java by learning about the basics of a Java program and variables!Beginner Friendly6 hours
Browse more topics
- Cybersecurity164,887 learners enrolled
- Code Foundations13,348,259 learners enrolled
- For Business9,835,892 learners enrolled
- Computer Science7,576,742 learners enrolled
- Web Development6,971,190 learners enrolled
- Data Science5,886,759 learners enrolled
- Python4,614,864 learners enrolled
- Cloud Computing4,179,709 learners enrolled
- Data Analytics3,988,812 learners enrolled
Unlock additional features with a paid plan
Practice Projects
Guided projects that help you solidify the skills and concepts you're learning.Assessments
Auto-graded quizzes and immediate feedback help you reinforce your skills as you learn.Certificate of Completion
Earn a document to prove you've completed a course or path that you can share with your network.