Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Linux Security Course Catalog
Skills you'll gain: IT Service Management, Cloud Computing, Governance Risk Management and Compliance, Information Technology Infrastructure Library, Malware Protection, Identity and Access Management, Linux, Incident Response, Networking Hardware, TCP/IP, Cybersecurity, Network Security, Network Protocols, Threat Modeling, Linux Servers, Cloud Security, Operating Systems, Endpoint Detection and Response, NIST 800-53, Regulatory Compliance
University of Colorado Boulder
Skills you'll gain: Agile Methodology, Embedded Software, Embedded Systems, System Programming, Software Testing, Linux, Software Development Methodologies, Docker (Software), Git (Version Control System), Containerization, Linux Commands, Linux Administration, File Systems, C++ (Programming Language), Shell Script, Electrical and Computer Engineering, Debugging, OS Process Management, Internet Of Things, Operating Systems
Skills you'll gain: Security Controls, Cybersecurity, Cyber Attacks, Security Awareness, Cyber Security Policies, Network Analysis, Security Information and Event Management (SIEM), Ethical Standards And Conduct, SQL
Skills you'll gain: Red Hat Enterprise Linux, Linux, Private Cloud, Linux Administration, Bash (Scripting Language), Command-Line Interface, Package and Software Management, Linux Servers, Unix Commands, IBM Cloud, File Systems, Unix Shell, File Management, OS Process Management, Cloud Management, Virtual Machines, Infrastructure As A Service (IaaS), Shell Script, Systems Administration, Linux Commands
Skills you'll gain: Package and Software Management, Desktop Support, Linux, Microsoft Windows, File Systems, Remote Access Systems, Operating Systems, Linux Administration, OS Process Management, System Support, Systems Administration, Software Installation, User Accounts, System Configuration, Linux Commands, Command-Line Interface, System Monitoring, User Provisioning, Authorization (Computing), Identity and Access Management
The Linux Foundation
Skills you'll gain: Package and Software Management, Linux, Command-Line Interface, File Systems, Unix Commands, Linux Administration, Linux Commands, User Accounts, Unix, System Configuration, Unix Shell, System Monitoring, Operating Systems, Network Performance Management, Graphical Tools
- Status: Free
University of Maryland, College Park
Skills you'll gain: Cyber Risk, Cyber Security Policies, Security Management, Cybersecurity, Risk Management, Cyber Security Strategy, Cyber Attacks, Cyber Governance, Computer Security Awareness Training, Threat Detection, General Networking, Vulnerability
Skills you'll gain: Open Web Application Security Project (OWASP), Security Controls, Risk Management, Cybersecurity, Security Information and Event Management (SIEM), Incident Response, NIST 800-53, Cyber Security Policies, Cyber Risk, Safety Audits, Threat Detection, Compliance Auditing
Skills you'll gain: Malware Protection, Computer Security Awareness Training, Security Awareness, Mobile Security, Network Security, Data Security, Cyber Attacks, Cybersecurity, Human Factors (Security), Email Security, Identity and Access Management, Multi-Factor Authentication, Authentications
Skills you'll gain: Linux Commands, Bash (Scripting Language), Shell Script, File Management, Unix Shell, Linux, Unix Commands, Linux Servers, Command-Line Interface, Linux Administration, Scripting Languages, Unix, Operating Systems, Network Protocols, OS Process Management, Automation
Coursera Project Network
Skills you'll gain: Linux Commands, Linux, Linux Servers, Command-Line Interface, Linux Administration, File Management, Unix Commands, File Systems, Server Administration
Skills you'll gain: Open Web Application Security Project (OWASP), Secure Coding, Application Security, Security Testing, DevSecOps, Threat Modeling, Vulnerability Scanning, Continuous Monitoring, Vulnerability Assessments, Application Performance Management, System Monitoring, Development Environment, DevOps, Data Security, Software Development Life Cycle, Encryption
Linux Security learners also search
In summary, here are 10 of our most popular linux security courses
- IT Fundamentals for Cybersecurity:Â IBM
- Advanced Embedded Linux Development:Â University of Colorado Boulder
- Foundations of Cybersecurity:Â Google
- Linux and Private Cloud Administration on IBM Power Systems:Â IBM
- Operating Systems and You: Becoming a Power User:Â Google
- Linux for Developers:Â The Linux Foundation
- Cybersecurity for Everyone:Â University of Maryland, College Park
- Play It Safe: Manage Security Risks:Â Google
- Security Awareness Training:Â ISC2
- Hands-on Introduction to Linux Commands and Shell Scripting:Â IBM