Linux security courses can help you learn system hardening, user access controls, network security protocols, and incident response strategies. You can build skills in configuring firewalls, implementing encryption techniques, and conducting security audits. Many courses introduce tools like iptables for firewall management, OpenSSL for encryption, and Wireshark for network analysis, showing how these skills are applied in practical work to protect systems from vulnerabilities and threats.

Skills you'll gain: Computer Security Incident Management, Incident Response, Incident Management, Vulnerability Management, Risk Management Framework, Security Management, Threat Management, Risk Management, Disaster Recovery, Vulnerability Assessments, Information Systems Security, Information Assurance, Cyber Security Policies, Security Controls
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Security Controls
Advanced · Course · 1 - 4 Weeks

Skills you'll gain: Endpoint Detection and Response, Cloud Security, Cyber Attacks, Infrastructure Security, Encryption, Cloud Computing, Threat Modeling, Authorization (Computing), Network Architecture, Dynamic Host Configuration Protocol (DHCP), Identity and Access Management, Information Systems Security, Email Security, Human Factors (Security), Network Infrastructure, Network Protocols, Data Security, Security Awareness, Malware Protection, Mobile Security
Intermediate · Specialization · 1 - 3 Months

Skills you'll gain: Security Testing, Vulnerability Scanning, Secure Coding, Data Security, Application Security, Cyber Security Assessment, Vulnerability Assessments, Web Applications, Web Servers, Information Privacy, SQL
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Data Integrity, Data Management, Personally Identifiable Information, Cloud Storage, Data Encryption Standard, Security Controls, Authorization (Computing)
Advanced · Course · 1 - 4 Weeks

Macquarie University
Skills you'll gain: Identity and Access Management, AWS Identity and Access Management (IAM), Authentications, User Provisioning, Multi-Factor Authentication, Security Assertion Markup Language (SAML), Single Sign-On (SSO), Threat Modeling, User Accounts, Key Management, Cyber Security Assessment, Threat Management, Azure Active Directory, OAuth, Cybersecurity, Role-Based Access Control (RBAC), Threat Detection, Cryptography, Risk Management, Remote Access Systems
Beginner · Course · 1 - 3 Months

Skills you'll gain: Open Web Application Security Project (OWASP), Threat Modeling, Kubernetes, Threat Management, Cloud-Native Computing, Public Key Infrastructure, Infrastructure Security, Threat Detection, Application Security, Cloud Security, Vulnerability Assessments, Cloud Applications
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: MITRE ATT&CK Framework, Kubernetes, Incident Response, Threat Detection, Intrusion Detection and Prevention, DevSecOps, Continuous Monitoring, Security Engineering, Security Controls, Infrastructure Security, Event Monitoring, System Monitoring, Containerization, Anomaly Detection, Docker (Software)
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Role-Based Access Control (RBAC), Hardening, Identity and Access Management, Kubernetes, Infrastructure Security, Network Security, Firewall, Security Controls, Authorization (Computing), Linux Administration, System Configuration
Intermediate · Course · 1 - 4 Weeks

Skills you'll gain: Kubernetes, Google Cloud Platform, Cloud Infrastructure, YAML, Containerization, Application Deployment, Configuration Management, MongoDB, Infrastructure Security, Network Security, Data Storage, Scalability
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Firewall, Network Security, System Configuration, Network Administration, Amazon Web Services, Virtual Private Networks (VPN), Infrastructure Security, Network Monitoring, Network Troubleshooting, Security Information and Event Management (SIEM), Threat Management, Network Performance Management, Endpoint Security, Intrusion Detection and Prevention, System Monitoring, Cyber Security Policies, Configuration Management, Application Deployment
Intermediate · Course · 1 - 3 Months

Skills you'll gain: Remote Access Systems, User Accounts, Authorization (Computing), Network Security
Intermediate · Course · 1 - 4 Weeks