Linux security courses can help you learn system hardening, user access controls, network security protocols, and incident response strategies. You can build skills in configuring firewalls, implementing encryption techniques, and conducting security audits. Many courses introduce tools like iptables for firewall management, OpenSSL for encryption, and Wireshark for network analysis, showing how these skills are applied in practical work to protect systems from vulnerabilities and threats.

Johns Hopkins University
Skills you'll gain: Code Review, Version Control, GitHub, Package and Software Management, CI/CD, Continuous Integration, Open Source Technology, Development Environment, Continuous Deployment, Secure Coding, Software Development Tools, Docker (Software), Containerization, Scientific Methods, Bioinformatics, Data Sharing, Git (Version Control System), Automation, Software Documentation, Technical Documentation
Beginner · Specialization · 3 - 6 Months


Skills you'll gain: Cucumber (Software), API Testing, Gherkin (Scripting Language), Behavior-Driven Development, JSON, Restful API, Apache Maven, Test Tools, Test Case, JUnit, Test Script Development, Security Testing, Test Automation, Authentications, Application Programming Interface (API), Test Data, Scalability, Java Programming, Software Testing, Java
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Salesforce, Application Deployment, Salesforce Development, Dashboard, Cloud Deployment, Customer Relationship Management, Change Control, Analytics, Continuous Deployment, Data Import/Export, Authentications, Data Migration, Configuration Management, Data Presentation, Data Access, Responsive Web Design, System Configuration, Workflow Management, Data Management, Business Logic
Beginner · Specialization · 1 - 3 Months

SkillUp
Skills you'll gain: Computer Security Awareness Training, Security Awareness, Cybersecurity, Cyber Attacks, Cyber Threat Intelligence, Incident Response, Cyber Risk, Responsible AI, Data Ethics, Threat Detection, Malware Protection, Information Systems Security, Network Security, Security Controls, Data Security, Multi-Factor Authentication, Personally Identifiable Information, Email Security, Authentications
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Jenkins, CI/CD, Continuous Integration, Continuous Delivery, Continuous Deployment, DevOps, Distributed Computing, Software Configuration Management, Containerization, Application Programming Interface (API), Security Requirements Analysis, Version Control, User Interface (UI)
Beginner · Course · 1 - 4 Weeks

Skills you'll gain: Routing Protocols, Virtual Private Networks (VPN), Network Troubleshooting, Open Shortest Path First (OSPF), Network Engineering, Network Routing, Border Gateway Protocol, TCP/IP, Multiprotocol Label Switching, Network Administration, Network Security, Network Monitoring, Network Performance Management, Dynamic Host Configuration Protocol (DHCP), Authentications, Authorization (Computing)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Responsible AI, Generative AI, Information Systems Security Assessment Framework (ISSAF), Data Ethics, Information Privacy, Regulatory Compliance, Compliance Management, Risk Analysis, Data Governance, Risk Mitigation, Prompt Engineering
Intermediate · Course · 1 - 4 Weeks

Google Cloud
Skills you'll gain: Kubernetes, Docker (Software), Microservices, Containerization, Application Deployment, Cloud Deployment, Google Cloud Platform, Cloud Management, Service Management
Beginner · Project · Less Than 2 Hours

Skills you'll gain: Wireless Networks, Mobile Security, Networking Hardware, Hardware Troubleshooting, USB, Computer Hardware, System Configuration, Peripheral Devices, Computer Displays, Data Storage
Intermediate · Course · 1 - 4 Weeks

Pearson
Skills you'll gain: Cloud Security, Cloud Computing Architecture, Cloud Deployment, Cloud Management, Cloud Computing, Identity and Access Management, Cloud Infrastructure, Security Controls, CI/CD, Computer Security Incident Management, Scalability, Data Security, Network Troubleshooting, Disaster Recovery, Infrastructure as Code (IaC), Vulnerability Assessments, Key Management, Network Security, Incident Response, Solution Design
Beginner · Specialization · 1 - 3 Months

Skills you'll gain: Intrusion Detection and Prevention, Continuous Monitoring
Beginner · Course · 1 - 4 Weeks