Description
Linux Professional Institute Security Essentials (020-100) Online Training
This entry-level Linux Professional Institute Security Essentials (020-100) training prepares cybersecurity professionals to implement best practices in security maintenance, identify vulnerabilities, and respond effectively to incidents in Linux-based IT infrastructures.
If you want a career in cybersecurity, you should plan on eventually mastering Linux security. The Linux operating system or permutations of it exist on networks all over the world — sometimes powering entire networks and other times running individual devices. It’s a fundamental skill of a security professional to know the ins and outs of Linux security, and that’s exactly what this course gives you.
You’ll learn the basics of cybersecurity that apply in any environment, as well as the techniques and tools that are particular to Linux environments. The LPI Security Essentials is an excellent start for a career in cybersecurity, and this course will prepare you for it in the fastest way possible.
After completing this Linux training you’ll know how to implement best practices in security maintenance, identify vulnerabilities, and respond effectively to incidents in Linux-based IT infrastructures.
For anyone who manages their Linux training, this Linux training can be used to onboard new cybersecurity professionals, curated into individual or team training plans, or as a Linux reference resource.
Linux Professional Institute Security Essentials (020-100): What You Need to Know
This Linux Professional Institute Security Essentials (020-100) training has videos that cover topics such as:
Understanding the theoretical fundamentals of network security
Securing and configuring Linux systems and devices running Linux
Monitoring systems and networks for unusual or malicious activity
Responding to and reporting incidents
Managing secure network communications
Who Should Take Linux Professional Institute Security Essentials (020-100) Training?
This Linux Professional Institute Security Essentials (020-100) training is considered entry-level Linux training, which means it was designed for cybersecurity professionals. This basic security essentials skills course is valuable for new IT professionals with at least a year of experience with cybersecurity and experienced cybersecurity professionals looking to validate their Linux skills.
New or aspiring cybersecurity professionals. At the start of your cybersecurity career, you have to make some hard choices about where to invest your time and money while learning systems and technologies. This course is an obvious choice because it covers general and foundational knowledge without getting too in the weeds, and Linux is used on networks of all sizes all over the world.
Experienced cybersecurity professionals. If you plan on continuing your cybersecurity career, earning the LPI Security Essentials certification is an excellent way to demonstrate commitment to global standards and professionalism. Your previous experience will prepare you for most of what you’ll find on the 020-100, but this course will quickly round out any rough patches and prepare you for the cert.
1. Course Introduction
2. IT Goal: Making Resources Available
3. IT Goal: Making Resources Secure
4. Four Pillars of Security
5. Common Hacker Goals
6. Types of Hackers
Risk Assessment and Management
1. Privilege Escalation
2. Privilege Escalation Demo
3. Penetration Testing
4. Penetration Testing
5. ISMS, IRPs, and CERT
6. Penetration Testing
7. Bonus: Drive-By Malware in Action
Ethical Behavior
1. Intro: IT Access and Responsibility
2. Case Study: Edward Snowden
3. Personal and Private Data
4. Regulatory Compliance
5. Example of Data Breach Disclosure
6. Handling Potentially Illegal Information
Implement Encryption
1. Describe Encryption and its Use
2. Encrypt Data at Rest
3. Encrypt Data in Transit
4. Data in Use
Encryption Types and Protocols
1. The Symmetric Encryption Concept
2. The Case for Symmetric Encryption
3. Symmetric Encryption Details
4. Symmetric Encryption Algorithms
5. Asymmetric Encryption
6. Perfect Forward Secrecy
7. RSA and ECC Encryption Algorithms
Public Key Infrastructure (PKI)
1. Identifying and Extracting a Web Cert
2. Handling Untrusted Certificates
3. Certificate Signing Requests
X.509, Web Certificates, and Hashing
1. Obtaining and Using Web Certificates
2. How SSL/TLS Operate
3. Hash Data
4. Compare Hashing and Encryption
Email Encryption and Signatures
1. PGP and GPG Overview
2. Configure Thunderbird for OpenPGP
3. Encrypt and Sign Email with PGP
4. Encrypt and Sign Email with S/MIME
5. Encryption and Gmail
Intro to PC Hardware
1. Motherboard Overview
2. Motherboard Diagram
3. Motherboard Form Factors and BIOS
4. Processors
5. Memory (RAM)
6. Hard Disk Drive Physical Characteristics
7. Solid State Drive Characteristics
8. Peripherals and Other Miscellaneous Devices
Application and OS Sources
1. Firmware and its Risks
2. Mobile Software
3. Jailbreaking, Rooting, and the Risks
4. Securing Applications and Operating Systems
5. Protection via Isolation
6. Protection via Isolation
Updates, Common Vulnerabilities, and Firewalls
1. Buffer Overflow
2. SQL Injection
3. Implement Local Packet Filters
4. Implement Firewall Protection
5. Implement Application Layer Firewalls
6. Implement Endpoint Firewalls
Malware
1. Common Types of Malware Part 1
2. Common Types of Malware Part 2
3. Camera, Microphone Hijacking
4. Symptoms of Malware
Data Availability
1. Recovery Point Objective and Recovery Time Objective
2. Backup Location Strategy
3. Backup Type: Full
4. Backup Type: Differential
5. Backup Type: Incremental
6. Backup Media and Drives
7. Backup Security
8. Backup Solutions
Networks and the Internet
1. Network Equipment
2. IP Basics
3. Binary Subnet Masks
4. Classful Subnet Masks and Private IP Addresses
5. Routing Network Traffic
6. Switch Traffic
Protocols and Vulnerabilities
1. TCP and UDP Vulnerabilities
2. TCP and UDP Ports
3. Other Common Protocol Vulnerabilities
DHCP, DNS, IPv6, and Cloud Computing
1. Introduction
2. Forward and Reverse DNS
3. IPv6 Addresses
4. A Quick Tour of Azure
5. The Cloud – It’s Not Just in the Sky!
6. IaaS, PaaS, and SaaS
Wireless Networking
1. Configure WiFi Security
Network Encryption and Anonymity
1. Common VPN Features
2. Proxy Servers
3. The Onion Router (TOR)
Principles of Digital Identity
1. Authentication
2. Security Questions and Account Recovery Tools
3. Authorization and Accounting
Passwords
1. Password Practices to Avoid
2. Password Best Practices
3. How Passwords are Stored
4. Common Attacks Against Passwords
5. Password Leaks
Confidentiality and Secure Communication
1. The Email & Marketing Landscape
2. Spam and its Impact
3. Spam Filters
4. Handling Attachments and Links
5. Advantages of Messaging Apps
6. Social Media Messaging
7. E2EE Messaging Apps
Social Engineering and Handling Information
1. Introduction to Social Engineering
2. Social Engineering Psychology
3. Social Engineering Attacks
4. Social Engineering Improvements, and Protection
5. Data Classification and NDAs
Privacy Protection
1. Cyberbullying
2. Cyberstalking
3. Cybermobbing, Doxxing, and Fraudulent Accounts
4. Cookie Handling
5. Browser Privacy Settings
6. Browser Security Settings
Linux Professional Institute Security Essentials (020-100) FAQs: Cost, Training, Value
Is Linux Professional Institute Security Essentials a certification?
Yes, the full title of the certification is “Linux Professional Institute Security Essentials”, but it’s also known as just Security Essentials. The Linux Professional Institute (LPI) is a professional organization that’s best known for their LPIC series of certifications. Those cover three distinct levels of skill in Linux administration. In addition to LPIC, they offer three certifications in their entry-level and generalist Essentials series: Linux, Security and Web Development.
Is the Linux Professional Institute Security Essentials worth it?
Yes, depending on your experience level and career goals, the LPI Security Essentials certification is worth it as an investment in your future. For entry-level IT professionals or non-technical professionals, if you need to prove broad and entry-level familiarity with IT concepts, LPI is a trusted and respected authority in the IT world and Security Essentials covers preliminary skills and knowledge in the field better than many other certifications.
How much does the Linux Professional Institute Security Essentials cost?
The LPI Security Essentials costs $120 in most North American countries and $100 in South America, central and east Asia, and in the Middle East. The LPI Security Essentials exam (020-100) is the only exam for the certification and it doesn’t have any prerequisites, which means you can take it any time you think you’re ready and you don’t have to pay for any other exams or classes.
How hard is the Linux Professional Institute Security Essentials exam (020-100)?
The LPI Security Essentials exam (020-100) has a reputation as being fair and straightforward. For people who are adequately prepared, it’s not an especially hard exam. The thing to keep in mind is that while it is entry-level, it’s also very broad. So when you prepare for the Security Essentials, make sure you have a strong foundation in IT as well as basic cybersecurity concepts.
Is the Linux Professional Institute Security Essentials meant for beginners?
Yes, the LPI Security Essentials certification is specifically designed for beginners and newcomers to the IT career field. It’s ideal for anyone who wants to get their foot in the cybersecurity world and get started with a career. But preparing for and earning the Security Essentials cert is also great for non-technical professionals who need a good understanding of IT principles and how cybersecurity functions at a basic level.
Discover more from Easy Learning (Since 2013)
Subscribe to get the latest posts sent to your email.
Reviews
There are no reviews yet.