Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Linux Security Course Catalog
Universitat Autònoma de Barcelona
Skills you'll gain: General Data Protection Regulation (GDPR), Personally Identifiable Information, Information Privacy, Law, Regulation, and Compliance, Data Security, Data Governance, Data Ethics, Data Sharing
University of Cape Town
Skills you'll gain: Water Resources, Strategic Planning, Environmental Policy, Land Management, Mitigation, Community Development, Environmental Science, Environmental Issue, Civil Engineering, Environment, Finance, Natural Resource Management, Risk Management, Public Works, Socioeconomics, Economic Development, Stakeholder Engagement, Vulnerability, Governance
Skills you'll gain: Penetration Testing, Network Security, Wireless Networks, Local Area Networks, General Networking, Network Administration, Cybersecurity, Vulnerability Assessments, System Configuration, Linux Administration, Encryption, Network Analysis, Software Installation, Command-Line Interface, Virtual Machines
Illinois Tech
Skills you'll gain: Cybersecurity, Cyber Attacks, Network Security, Information Systems Security, Computer Security, Cryptography, Disaster Recovery, Application Security, Cyber Operations, Cyber Security Policies, Cryptographic Protocols, IT Security Architecture, Telecommunications, Network Administration, NIST 800-53, Infrastructure Security, Security Controls, Encryption, Bash (Scripting Language), Security Strategy
Skills you'll gain: Incident Response, Disaster Recovery, Computer Security Incident Management, Business Continuity, Cybersecurity, Investigation, Event Monitoring, Threat Detection, Risk Management, Communication Strategies
- Status: Free Trial
Skills you'll gain: Cybersecurity, Cloud Computing, Network Monitoring, Command-Line Interface, General Networking, Linux, Windows PowerShell, Virtual Machines
Alfaisal University | KLD
Skills you'll gain: Event Management, Event Planning, Event Marketing, Advertising, Safety and Security, Marketing Communications, Advertising Campaigns, Budget Management, Expense Management, Program Evaluation, Human Resources Management and Planning, Return On Investment, Communication Strategies, Goal Setting
- Status: Free Trial
University of Colorado System
Skills you'll gain: TCP/IP, Network Protocols, Dynamic Host Configuration Protocol (DHCP), Network Security, OSI Models, Network Routing, Network Infrastructure, Software-Defined Networking, Local Area Networks, Virtualization
- Status: Free Trial
University of Colorado System
Skills you'll gain: Distributed Denial-Of-Service (DDoS) Attacks, Authentications, Cloud Security, Cybersecurity, Threat Detection, Security Awareness, Cyber Attacks, Network Security, Vulnerability Assessments, Cloud Services, Data Security, Human Factors (Security)
- Status: Free Trial
University of Colorado Boulder
Skills you'll gain: OSI Models, Network Security, TCP/IP, Network Architecture, Network Protocols, General Networking, Network Routers, Routing Protocols, Public Key Infrastructure, Cryptography, Web Applications, System Programming
- Status: Free Trial
University at Buffalo
Skills you'll gain: Intrusion Detection and Prevention, Security Controls, Continuous Monitoring, Incident Response, Vulnerability Assessments, Software Development Life Cycle, Cybersecurity, Cyber Security Strategy, Information Systems Security Assessment Framework (ISSAF), Cyber Security Assessment, Network Security, Risk Management Framework, Cloud Security, Authentications
EIT Digital
Skills you'll gain: Email Security, Computer Security Awareness Training, Cybersecurity, Security Awareness, Cyber Attacks, Identity and Access Management, Threat Management, Threat Detection, Data Security, User Accounts, Entrepreneurship
Linux Security learners also search
In summary, here are 10 of our most popular linux security courses
- Ley de protección de datos. Conoce tus derechos: Universitat Autònoma de Barcelona
- Climate Adaptation in Africa: University of Cape Town
- Hacking WEP/WPA/WPA2 Wi-Fi Networks Using Kali Linux: Packt
- Cyber Security Technologies: Illinois Tech
- Incident Response and Recovery: ISC2
- Introduction to Cybersecurity Foundations: Infosec
- إدارة الفعاليات | Events Management: Alfaisal University | KLD
- TCP/IP and Advanced Topics: University of Colorado System
- Cyber Threats and Attack Vectors: University of Colorado System
- Network Systems Foundations: University of Colorado Boulder