Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Linux Security Course Catalog
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Cloud Computing, Linux, Linux Servers, Cloud Security, Operating Systems, Windows Servers, Microsoft Windows, File Systems, Systems Administration, Mac OS, Command-Line Interface, Security Controls, Virtual Machines, Firewall, Virtualization, User Accounts
Skills you'll gain: Cyber Threat Hunting, Incident Response, IT Service Management, Identity and Access Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Endpoint Security, Malware Protection, Penetration Testing, Linux, Computer Security Incident Management, Database Management, Network Security, Networking Hardware, TCP/IP, Cybersecurity, Cyber Threat Intelligence, Interviewing Skills, Cyber Security Assessment
Illinois Tech
Skills you'll gain: Linux, System Monitoring, Linux Administration, Linux Commands, Linux Servers, Command-Line Interface, User Accounts, Operating Systems, Package and Software Management, Service Management, System Configuration, Graphical Tools, File Management
University of Maryland, College Park
Skills you'll gain: Usability, Human Computer Interaction, Authentications, Usability Testing, Interaction Design, Human Factors, Information Privacy, Personally Identifiable Information, User Interface (UI) Design, Multi-Factor Authentication, Human Centered Design, Data Sharing, Design
The Linux Foundation
Skills you'll gain: Package and Software Management, Open Source Technology, Git (Version Control System), Linux, Command-Line Interface, Bash (Scripting Language), File Systems, Unix Commands, GitHub, Linux Administration, Version Control, Linux Commands, User Accounts, CI/CD, Shell Script, Unix, System Configuration, Unix Shell, Software Installation, Software Development Tools
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
Skills you'll gain: Cyber Threat Hunting, Incident Response, Cyber Threat Intelligence, Penetration Testing, Computer Security Incident Management, Intrusion Detection and Prevention, Threat Detection, Cryptography, Security Testing, Incident Management, Application Security, Encryption, Cybersecurity, Code Review, Security Management, Vulnerability Scanning, Vulnerability Assessments, Security Information and Event Management (SIEM), Threat Modeling, Security Awareness
Skills you'll gain: Red Hat Enterprise Linux, Linux, Package and Software Management, Linux Administration, Linux Commands, Command-Line Interface, User Accounts, Linux Servers, Open Source Technology, File Management, System Monitoring, System Support, Operating Systems, Network Administration, System Configuration, Remote Access Systems, Network Troubleshooting, OS Process Management, Web Servers
Linux Security learners also search
In summary, here are 10 of our most popular linux security courses
- Application Security for Developers and DevOps Professionals:Â IBM
- Google Cybersecurity:Â Google
- Operating Systems: Overview, Administration, and Security:Â IBM
- IBM Cybersecurity Analyst:Â IBM
- Linux OS - Master's:Â Illinois Tech
- Usable Security:Â University of Maryland, College Park
- Open Source Software Development, Linux and Git:Â The Linux Foundation
- IT Fundamentals for Cybersecurity:Â IBM
- Hardware Security:Â University of Maryland, College Park
- Advanced System Security Design:Â University of Colorado System