Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Linux Security Course Catalog
Skills you'll gain: Bash (Scripting Language), Shell Script, Linux Commands, Linux, Linux Administration, Linux Servers, Scripting, Systems Administration, Scripting Languages, Command-Line Interface, Development Environment, Network Troubleshooting, System Configuration, Virtualization, Virtual Machines, File Management, User Accounts
University of Colorado System
Skills you'll gain: Public Key Infrastructure, Cybersecurity, Data Security, Cyber Attacks, Information Assurance, Network Security, Risk Management Framework, Cryptography, Security Engineering, Threat Modeling, Authorization (Computing), Encryption, Email Security, Data Integrity, Authentications, Verification And Validation
Skills you'll gain: Vulnerability Scanning, Vulnerability Assessments, Penetration Testing, Network Security, Unix, Cybersecurity, Application Security, Linux, Web Applications, Infrastructure Security, Virtual Machines, Web Servers, Software Installation
Skills you'll gain: Application Security, Open Web Application Security Project (OWASP), OAuth, Data Validation, Authentications, Security Testing, Secure Coding, Web Applications, Authorization (Computing), Cyber Attacks, Distributed Denial-Of-Service (DDoS) Attacks, Cybersecurity, Server Side, Vulnerability Assessments
Skills you'll gain: Linux Commands, Linux, Penetration Testing, Open Web Application Security Project (OWASP), Vulnerability Scanning, Security Testing, Scripting, Vulnerability Assessments, Scripting Languages, Intrusion Detection and Prevention, General Networking, Python Programming, Network Security, Cybersecurity, Firewall, Application Security, Web Applications, Cyber Operations, Data Ethics, Computer Programming
Packt
Skills you'll gain: Linux, Linux Administration, Linux Commands, OS Process Management, Command-Line Interface, User Accounts, Bash (Scripting Language), File Systems, Scripting, Unix Shell, Docker (Software), TCP/IP, Remote Access Systems, System Monitoring
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Intrusion Detection and Prevention, Role-Based Access Control (RBAC), AWS Identity and Access Management (IAM), Amazon Web Services, Amazon Elastic Compute Cloud, Cloud Computing, Malware Protection, Cloud Infrastructure, Cloud Security, Load Balancing, User Accounts, Authorization (Computing), Network Security, Identity and Access Management, Threat Detection, Information Systems Security, Cybersecurity, Encryption, Geospatial Information and Technology
LearnQuest
Skills you'll gain: Git (Version Control System), Linux, Cloud Computing Architecture, DevOps, Virtualization, Cloud Computing, Containerization, Docker (Software), Infrastructure As A Service (IaaS), Software As A Service, Kubernetes, Virtual Machines, Platform As A Service (PaaS)
Skills you'll gain: Kubernetes, Role-Based Access Control (RBAC), Identity and Access Management, Private Cloud, Authorization (Computing), Google Cloud Platform, Cloud-Native Computing, Cloud Security, Network Troubleshooting, Network Security, Network Model, User Accounts, Virtual Private Networks (VPN)
Skills you'll gain: Ansible, Vulnerability Scanning, Network Security, Cybersecurity, Network Monitoring, Firewall, Linux Commands, System Configuration, Command-Line Interface, TCP/IP, Network Analysis, Configuration Management, Software Versioning
University of Colorado System
Skills you'll gain: Role-Based Access Control (RBAC), Authorization (Computing), Identity and Access Management, AWS Identity and Access Management (IAM), Geospatial Information and Technology, Encryption, Data Security, Network Security, Information Systems Security, Cryptography, Wireless Networks
Infosec
Skills you'll gain: MITRE ATT&CK Framework, Cyber Threat Hunting, Threat Detection, Cybersecurity, Network Security, Cyber Security Strategy, System Monitoring, Cyber Operations, Threat Management, Continuous Monitoring, Cyber Threat Intelligence, Incident Response, Cyber Attacks, Scripting, IT Automation, Network Monitoring, Command-Line Interface, Python Programming, Data Access, Intrusion Detection and Prevention
Linux Security learners also search
In summary, here are 10 of our most popular linux security courses
- Linux Bash Shell Scripting with Real-Life Examples:Â Packt
- Design and Analyze Secure Networked Systems:Â University of Colorado System
- An Introduction to Ethical Hacking with Kali Linux:Â Packt
- Software Security for Web Applications:Â Codio
- The Complete Ethical Hacking Bootcamp: Beginner To Advanced:Â Packt
- Linux Fundamentals:Â Packt
- Advanced System Security Design:Â University of Colorado System
- Linux Cloud and DevOps:Â LearnQuest
- Hands-On Labs in Google Cloud for Security Engineers:Â Google Cloud
- Getting Started in Port Scanning Using Nmap and Kali Linux:Â Packt