Filter by
SubjectRequired
LanguageRequired
The language used throughout the course, in both instruction and assessments.
Learning ProductRequired
LevelRequired
DurationRequired
SkillsRequired
SubtitlesRequired
EducatorRequired
Explore the Linux Security Course Catalog
Kennesaw State University
Skills you'll gain: Cybersecurity, IT Security Architecture, Network Security, Disaster Recovery, Application Security, Cyber Operations, Cryptography, Cyber Risk, Encryption, Authorization (Computing), Secure Coding, Systems Development Life Cycle, Security Controls, Cyber Governance, Cyber Security Policies, Infrastructure Security, Security Awareness, Safety and Security, Identity and Access Management, Incident Management
Skills you'll gain: Cyber Security Assessment, Cybersecurity, Security Testing, Cyber Attacks, Vulnerability Management, Incident Response, Network Architecture
Skills you'll gain: Linux Commands, Linux, Command-Line Interface, Penetration Testing, Cyber Security Assessment, General Networking, Network Security, Cybersecurity, Vulnerability Assessments, Data Ethics, Computer Security Awareness Training, System Configuration, Software Installation, Virtual Machines, File Management
University of Alberta
Skills you'll gain: Requirements Analysis, Requirements Elicitation, Requirements Management, Functional Requirement, Business Requirements, Product Requirements, Backlogs, User Requirements Documents, Scope Management, Change Control, User Story, System Requirements, Client Services, Acceptance Testing, Prioritization
Duke University
Skills you'll gain: MLOps (Machine Learning Operations), Pandas (Python Package), AWS SageMaker, NumPy, Microsoft Azure, Data Ethics, Application Deployment, Data Manipulation, Exploratory Data Analysis, Containerization, Data Pipelines, CI/CD, Software Testing, Data Import/Export, Amazon Web Services, Feature Engineering, Cloud Solutions, Artificial Intelligence and Machine Learning (AI/ML), Docker (Software), Rust (Programming Language)
University of Pennsylvania
Skills you'll gain: General Data Protection Regulation (GDPR), Law, Regulation, and Compliance, Information Privacy, Personally Identifiable Information, Regulatory Compliance, Data Security, Health Care Procedure and Regulation, Incident Response, Governance
Kennesaw State University
Skills you'll gain: Cyber Threat Intelligence, Security Management, Internet Of Things, Incident Response, Risk Management, Cyber Security Policies, Cyber Security Strategy, Cyber Governance, Threat Detection, Human Factors (Security), Business Risk Management, Cybersecurity, Threat Management, Security Awareness, Enterprise Risk Management (ERM), Information Management, Computer Security Awareness Training, Mobile Security, Business Ethics, Network Security
University of Minnesota
Skills you'll gain: Software Development Methodologies, Agile Methodology, Software Engineering, Software Development Life Cycle, Requirements Analysis, Application Deployment, Agile Software Development, Systems Development, Software Architecture, Verification And Validation, Process Driven Development, Waterfall Methodology, System Requirements, Software Testing, Scrum (Software Development), Release Management, User Requirements Documents, Development Testing, Software Design, Maintainability
Infosec
Skills you'll gain: Penetration Testing, Cyber Security Policies, Linux Commands, Cyber Security Assessment, Command-Line Interface, Cybersecurity, Cloud Computing, Linux, Risk Management Framework, Network Monitoring, Security Management, Operating Systems, Cyber Risk, Threat Management, General Networking, Vulnerability Assessments, Windows PowerShell, Cyber Governance, Microsoft Windows, Virtual Machines
The Linux Foundation
Skills you'll gain: Git (Version Control System), Version Control, Open Source Technology, Software Development Tools, Software Versioning, Code Review, Linux
- Status: Free
University of London
Skills you'll gain: Education Software and Technology, Learning Management Systems, Collaborative Software, Test Tools, Content Management Systems, Security Software, Video Production
University of Colorado System
Skills you'll gain: Database Design, Software Design, Application Security, Vulnerability Assessments, Unified Modeling Language, Unit Testing, Threat Modeling, User Interface and User Experience (UI/UX) Design, Usability Testing, Vulnerability Management, Technical Design, Security Engineering, Software Architecture, Secure Coding, Software Design Patterns, Database Management, Software Engineering, Software Visualization, Software Development Life Cycle, Systems Design
Linux Security learners also search
In summary, here are 10 of our most popular linux security courses
- Cybersecurity and Its Ten Domains:Â Kennesaw State University
- Cybersecurity Assessment: CompTIA Security+ & CYSA+:Â IBM
- Ethical Hacking Foundations:Â Packt
- Client Needs and Software Requirements :Â University of Alberta
- MLOps | Machine Learning Operations:Â Duke University
- Privacy Law and Data Protection:Â University of Pennsylvania
- Cybersecurity: Developing a Program for Your Business:Â Kennesaw State University
- Software Development Processes and Methodologies:Â University of Minnesota
- Cybersecurity Foundations:Â Infosec
- Using Git for Distributed Development:Â The Linux Foundation