Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Linux Security Course Catalog
Skills you'll gain: Computer Systems, Business Software, Operating Systems, Generative AI, Business Systems, Cybersecurity, Enterprise Security, Servers, Computer Hardware, Information Systems Security, Data Storage, Patch Management, Artificial Intelligence
LearnKartS
Skills you'll gain: Penetration Testing, Network Security, Malware Protection, Cybersecurity, Threat Detection, Information Systems Security, Cyber Threat Intelligence, Intrusion Detection and Prevention, Firewall, Cyber Attacks, Vulnerability Assessments, Internet Of Things, Encryption, Network Analysis
Skills you'll gain: Linux, Linux Administration, Linux Servers, Apache, Linux Commands, Unix Commands, Bash (Scripting Language), Command-Line Interface, File Management, Operating Systems, System Monitoring, Firewall, System Configuration, Virtual Environment, Virtual Machines
New York University
Skills you'll gain: Security Engineering, Authentications, Threat Modeling, Network Security, Public Key Infrastructure, Distributed Denial-Of-Service (DDoS) Attacks, Firewall, Cyber Attacks, Cryptography, Infrastructure Security, Cyber Security Strategy, Cybersecurity, Data Encryption Standard, Threat Management, Cyber Risk, IT Security Architecture, Mobile Security, Enterprise Security, Computer Security, Network Architecture
Illinois Tech
Skills you'll gain: Linux, System Monitoring, Linux Administration, Linux Commands, Linux Servers, Command-Line Interface, User Accounts, Operating Systems, Package and Software Management, Service Management, System Configuration, Graphical Tools, File Management
Skills you'll gain: Dashboard, Data Storytelling, Data Warehousing, SQL, Data Presentation, Data Governance, Data Security, Data Migration, Database Design, Data Visualization, Interactive Data Visualization, Descriptive Statistics, Data Mining, Cloud Storage, Data Visualization Software, Extract, Transform, Load, IBM DB2, Data Management, MySQL, Excel Formulas
Skills you'll gain: Network Troubleshooting, Linux Administration, Network Administration, Linux Commands, Linux, TCP/IP, Network Infrastructure, Network Protocols, Remote Access Systems, Virtualization, Computer Networking, General Networking, System Configuration, Virtual Environment, Software Installation, File Management
- Status: [object Object]
Google
Skills you'll gain: Threat Modeling, Open Web Application Security Project (OWASP), Intrusion Detection and Prevention, Security Controls, Vulnerability Management, Incident Response, Computer Security Incident Management, Cyber Threat Intelligence, Vulnerability Assessments, Event Monitoring, Network Security, Security Awareness, Threat Detection, Risk Management, Cybersecurity, Hardening, Bash (Scripting Language), Data Ethics, Linux Commands, Debugging
Skills you'll gain: Cloud Infrastructure, Application Performance Management, Distributed Denial-Of-Service (DDoS) Attacks, Google Cloud Platform, Kubernetes, Identity and Access Management, Data Loss Prevention, Load Balancing, System Monitoring, Infrastructure As A Service (IaaS), Network Monitoring, Cloud Applications, Cloud Computing Architecture, Network Architecture, Role-Based Access Control (RBAC), Network Security, Cloud Computing, Network Routing, Cloud Security, Virtual Private Networks (VPN)
Dartmouth College
Skills you'll gain: Command-Line Interface, Linux Commands, Linux, Embedded Systems, Computer Engineering, File Systems, Unix, Operating Systems, C (Programming Language), Performance Tuning, Open Source Technology, OS Process Management
University of Colorado System
Skills you'll gain: Firewall, Network Security, Intrusion Detection and Prevention, Information Systems Security, Security Controls, Threat Detection, Linux Administration, Linux
University of Maryland, College Park
Skills you'll gain: Security Engineering, Computer Hardware, Hardware Architecture, Threat Modeling, Threat Detection, Cybersecurity, Intrusion Detection and Prevention, Application Specific Integrated Circuits, Cryptography, Encryption, Technical Design, Emerging Technologies, System Design and Implementation
Linux Security learners also search
In summary, here are 10 of our most popular linux security courses
- Introduction to Computers and Operating Systems and Security:Â Microsoft
- System and Network Security:Â LearnKartS
- Linux Operating System: A Complete Linux Guide for Beginners:Â Packt
- Introduction to Cyber Security:Â New York University
- Linux OS - Master's:Â Illinois Tech
- IBM Data Management:Â IBM
- Linux Network Administration:Â Packt
- Google Cybersecurity:Â Google
- Preparing for Google Cloud Certification: Cloud Security Engineer:Â Google Cloud
- Linux Basics: The Command Line Interface - 6:Â Dartmouth College