LPI Security Essentials (020-100) Complete Course & Exam

LPI Security Essentials (020-100) Complete Course & Exam

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 158 lectures (17h 29m) | 6.30 GB

Pass the LPI Security Essentials (020-100) exam on your 1st attempt, includes a full-length practice exam!

In today’s digital age, IT security is vital for both individuals and organizations. Protecting data, devices, and networks is crucial in responsible information technology use. The Linux Professional Institute Security Essentials certificate provides an opportunity to learn and demonstrate expertise in the field. The exam covers essential IT security fields, making it suitable for students, staff, and organizations seeking to improve their security. It’s also ideal for individuals looking to gain basic competence in secure information technology use.

In this course, you will get access to all of our lessons, lectures, and video demonstrations to teach you everything you need to know to pass the LPI Security Essentials exam.

LPI Security Essentials (020-100) is the best way to gain a fundamental understanding of cybersecurity and is designed for both IT and non-technical professionals who need to make informed security choices while using the Internet so they don’t fall victim to cyber attacks and data breaches.

This course is designed to help prepare you for the LPI Security Essentials (020-100) certification exam and covers all five domains of the LPI Security Essentials (020-100)certification exam:

  • Security Concepts (12.5%)
  • Encryption (22.5%)
  • Device and Storage Security (22.5%)
  • Network and Service Security (25%)
  • Identity and Privacy (17.5%)

What you’ll learn

  • Passing the LPI Security Essentials certification exam with confidence
  • Avoid common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud
  • Implement common ways to prevent and mitigate attacks against their personal devices and data
  • Utilize encryption to secure data transferred through a network and stored on storage devices and in the cloud
  • Apply common security best practices, protect private information, and secure their identity
  • Securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles
Table of Contents

Introduction
1 Introduction
2 Download the Study Guide
3 Exam Tips
4 % Pass Guarantee

Overview of Security
5 Overview of Security (OBJ 1.1)
6 CIA Triad (OBJ 1.1)
7 AAA of Security (OBJ 1.1)
8 Security Threats (OBJ 1.1)
9 Mitigating Threats (OBJ 1.1)
10 Threat Actors (OBJ 1.1)
11 Common Security Roles (OBJ 1.1)
12 MITRE ATT&CK Framework (OBJ 1.1)

Risk Management
13 Risk Management (OBJ 1.2)
14 Risk Assessment (OBJ 1.2)
15 Methodologies (OBJ 1.2)
16 Security Controls (OBJ 1.2)
17 Vulnerability Assessments (OBJ 1.2)
18 Penetration Testing (OBJ 1.2)
19 Common Vulnerability Identifiers (OBJ 1.2)
20 Vulnerability Reports (OBJ 1.2)
21 Zero-day Vulnerabilities (OBJ 1.2)
22 Execution and Escalation Attacks (OBJ 1.2)
23 Incident Response Process (OBJ 1.2)

Ethical Behavior
24 Ethical Behavior (OBJ 1.3 & 5.2)
25 Computer Security Laws (OBJ 1.3)
26 Legal Requirements (OBJ 1.3)
27 Bug Bounties (OBJ 1.3 & 5.2)
28 Copyright Laws (OBJ 1.3)
29 Confidential Information (OBJ 1.3 & 5.2)
30 Errors and Outages (OBJ 1.3)
31 AWS Outage Case Study (OBJ 1.3)

Malware
32 Malware (OBJ 3.3 & 4.2)
33 Viruses, Worms, and Trojans (OBJ 3.3)
34 Ransomware (OBJ 3.3)
35 Spyware (OBJ 3.3)
36 Rootkits (OBJ 3.3)
37 Botnets and Zombies (OBJ 3.3 & 4.2)
38 Backdoors and Logic Bombs (OBJ 3.3)
39 Symptoms of Infections (OBJ 3.3)
40 Removing Malware (OBJ 3.3)
41 Preventing Malware (OBJ 3.3)
42 Viruses and Trojans in Action (OBJ 3.3)

Social Engineering
43 Social Engineering (OBJ 5.2)
44 Phishing (OBJ 5.2)
45 Spam (OBJ 5.2)
46 Filtering Spam (OBJ 5.2)
47 Impersonation (OBJ 5.2)
48 Pretexting (OBJ 5.2)
49 Social Engineering Attacks (OBJ 5.2)
50 Frauds, Scams, and Hoaxes (OBJ 5.2)
51 Evil Twin (OBJ 5.2)
52 User Education (OBJ 5.2)
53 Anti-phishing Training (OBJ 5.2)

Hardware Security
54 Hardware Security (OBJ 3.1)
55 Hardware Components (OBJ 3.1)
56 Smart Devices and IoT (OBJ 3.1)
57 Trusted Computing (OBJ 3.1)
58 USB Devices (OBJ 3.1)
59 Bluetooth Devices (OBJ 3.1)
60 RFID Devices (OBJ 3.1)

Application Security
61 Application Security (OBJ 3.2)
62 Types of Software (OBJ 3.2)
63 Installing Applications (OBJ 3.2)
64 Mobile Application Risks (OBJ 3.2)
65 Updating Applications (OBJ 3.2)
66 Buffer Overflows (OBJ 3.2)
67 Security Applications (OBJ 3.2)
68 Buffer Overflow Attack (OBJ 3.2)
69 SQL Injections (OBJ 3.2)

Networks
70 Networks (OBJ 4.1)
71 Networking Hardware (OBJ 4.1)
72 The OSI Model (OBJ 4.1)
73 The TCPIP Model (OBJ 4.1)
74 TCP and UDP (OBJ 4.1)
75 Switches and Routers (OBJ 4.1)
76 IPv4 (OBJ 4.1)
77 Assigning IPv4 Addresses (OBJ 4.1)
78 Data Transfer Over Networks (OBJ 4.1)
79 Network Routing (OBJ 4.1)
80 DNS (OBJ 4.1)
81 IPv6 (OBJ 4.1)
82 Internet Service Providers (OBJ 4.1)

Network Security
83 Network Security (OBJ 4.2)
84 Wired Network Security (OBJ 4.2)
85 Network Access Control (NAC) (OBJ 4.2)
86 Wireless Networks (OBJ 4.2)
87 Wireless Encryption (OBJ 4.2)
88 Wireless Security (OBJ 4.2)
89 Traffic Interception (OBJ 4.2)
90 DoS and DDoS (OBJ 4.2)
91 Configuring SOHO Networks (OBJ 4.2)
92 Configuring Wireless Networks (OBJ 4.2)

Cloud Computing
93 Cloud Computing (OBJ 4.1 & 5.2)
94 Cloud Characteristics (OBJ 4.1)
95 SaaS (OBJ 4.1)
96 IaaS (OBJ 4.1)
97 PaaS (OBJ 4.1)
98 Deployment Models (OBJ 4.1)
99 Shared Responsibility Model (OBJ 4.1)
100 Cloud Threats and Vulnerabilities (OBJ 4.1)
101 Security in the Cloud (OBJ 4.1)

Cryptography
102 Cryptography (OBJ 2.1)
103 Symmetric vs Asymmetric (OBJ 2.1)
104 Symmetric Algorithms (OBJ 2.1)
105 Asymmetric Algorithms (OBJ 2.1)
106 Public Key Infrastructure (OBJ 2.1)
107 Digital Certificates (OBJ 2.1)
108 Examining Digital Certificates (OBJ 2.1)
109 Certificate Revocation (OBJ 2.1)
110 Perfect Forward Secrecy (OBJ 2.1)
111 Hashing (OBJ 2.1)
112 Using Hashing (OBJ 2.1)
113 Hashing Security and Attacks (OBJ 2.1)

Applied Cryptography
114 Applied Cryptography (OBJ 2.2, 2.3, & 2.4)
115 Web Encryption (OBJ 2.2, 2.3, & 2.4)
116 X.509 Certificates (OBJ 2.2, 2.3, & 2.4)
117 Email Encryption and Signatures (OBJ 2.2, 2.3, & 2.4)
118 OpenPGP (OBJ 2.2, 2.3, & 2.4)
119 SMIME (OBJ 2.2, 2.3, & 2.4)
120 Send and Receive Encrypted Emails (OBJ 2.2, 2.3, & 2.4)
121 Storage Encryption (OBJ 2.2, 2.3, & 2.4)
122 BitLocker (OBJ 2.2, 2.3, & 2.4)
123 VeraCrypt (OBJ 2.2, 2.3, & 2.4)

Data Availability
124 Data Availability (OBJ 3.4)
125 Cryptomator (OBJ 2.2, 2.3, & 2.4)
126 Backup and Recovery (OBJ 3.4)
127 Backup and Recovery Methods (OBJ 3.4)
128 Backup Schemes (OBJ 3.4)
129 Security for Backups (OBJ 3.4)
130 Retention Requirements (OBJ 3.4)
131 Cloud-based File Storage (OBJ 3.4)

Authentication and Authorization
132 Authentication and Authorization (OBJ 5.1)
133 Password Best Practices (OBJ 5.1)
134 Password Cracking (OBJ 5.1)
135 Password Managers (OBJ 5.1)
136 Single Sign-On (SSO) (OBJ 5.1)
137 Multifactor Authentication (MFA) (OBJ 5.1)
138 Passwordless Authentication (OBJ 5.1)
139 Online Password Storage (OBJ 5.1)
140 Password Leaks (OBJ 5.1)

Anonymity
141 Anonymity (OBJ 4.3)
142 Virtual Private Networks (VPNs) (OBJ 4.3)
143 End-to-End Encryption (OBJ 4.3)
144 Transfer Encryption (OBJ 4.3)
145 Anonymity and Recognition (OBJ 4.3)
146 Proxy Servers (OBJ 4.3)
147 TOR (OBJ 4.3)
148 The Darknet (OBJ 4.3)
149 Cryptocurrencies (OBJ 4.3)

Protecting Your Privacy
150 Protecting Your Privacy (OBJ 5.3)
151 Personally Identifiable Information (PII) (OBJ 5.3)
152 Threats to Personal Information (OBJ 5.3)
153 User Tracking (OBJ 5.3)
154 Script Blockers and Ad Blockers (OBJ 5.3)
155 Profile Privacy Settings (OBJ 5.3)
156 Stalking and Cybermobbing (OBJ 5.3)

Conclusion
157 Conclusion
158 BONUS Where do I go from here

Homepage