LPI Security Essentials Study Guide

Book description

Prepare smarter and faster for the LPI Security Essentials exam

In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud. You’ll discover common and effective ways to prevent, mitigate, and respond to security attacks, and validate your ability to use encryption to secure data transferred through a network.

This book is designed to prepare you for the LPI Security Essentials certification offered by the global standard and career support organization for open-source professionals. Whether you’re preparing for this foundational exam as a steppingstone to the more advanced Security+ certification or as an end in itself, you’ll advance your knowledge of security concepts, encryption, node, device, and storage security, network and service security, and identity and privacy concepts. You’ll get:

  • Techniques and tools you can use immediately in a new role as an IT security professional
  • Key strategies for digital self-defense, including securing your own devices and making use of IT services
  • Complimentary access to Sybex’s superior online interactive learning environment and test bank, complete with chapter tests, a practice exam, electronic flashcards, and a glossary of key terms

Perfect for anyone seeking to take the LPI Security Essentials certification exam, LPI Security Essentials Study Guide, Exam 020-100 is a must-have resource for people looking to hit the ground running in a new career focused on information security.

Table of contents

  1. Cover
  2. Title Page
  3. Copyright
  4. Acknowledgments
  5. About the Author
  6. Introduction
    1. What Does This Book Cover?
    2. About the Exam
    3. Exam Objectives
    4. Objective Map
    5. Assessment Test
    6. Answers to Assessment Test
  7. Chapter 1: Using Digital Resources Responsibly
    1. Protecting Personal Rights
    2. Protecting Digital Privacy
    3. Establishing Authenticity
    4. Summary
    5. Exam Essentials
    6. Review Questions
  8. Chapter 2: What Are Vulnerabilities and Threats?
    1. The Basics: What Are We Trying to Accomplish Here?
    2. Common Vulnerabilities
    3. Digital Espionage
    4. Stolen Credentials
    5. Malware
    6. Network-Based Attacks
    7. Cloud Computing and Digital Security
    8. Summary
    9. Exam Essentials
    10. Review Questions
  9. Chapter 3: Controlling Access to Your Assets
    1. Controlling Physical Access
    2. Controlling Network Access
    3. Controlling Software Sources
    4. Summary
    5. Exam Essentials
    6. Review Questions
  10. Chapter 4: Controlling Network Connections
    1. Understanding Network Architecture
    2. Auditing Networks
    3. Securing Networks
    4. Summary
    5. Exam Essentials
    6. Review Questions
  11. Chapter 5: Encrypting Your Data at Rest
    1. What Is Encryption?
    2. Encryption Usage Patterns
    3. Encryption Technologies
    4. Summary
    5. Exam Essentials
    6. Review Questions
  12. Chapter 6: Encrypting Your Moving Data
    1. Website Encryption
    2. Email Encryption
    3. Working with VPN Connections and Software Repositories
    4. Summary
    5. Exam Essentials
    6. Review Questions
  13. Chapter 7: Risk Assessment
    1. Conducting Open-Source Intelligence Gathering
    2. Accessing Public Vulnerability Databases
    3. Conducting Vulnerability Scans
    4. Conducting Penetration Tests
    5. Summary
    6. Exam Essentials
    7. Review Questions
  14. Chapter 8: Configuring System Backups and Monitoring
    1. Why You Need to Get Backups Right the First Time
    2. Backup Types
    3. Multitier Backups
    4. Configuring Monitoring and Alerts
    5. Summary
    6. Exam Essentials
    7. Review Questions
  15. Chapter 9: Resource Isolation Design Patterns
    1. Configuring Network Firewalling
    2. Working with Sandbox Environments
    3. Controlling Local System Access
    4. Summary
    5. Exam Essentials
    6. Review Questions
  16. Appendix: Answers to Review Questions
    1. Chapter 1: Using Digital Resources Responsibly
    2. Chapter 2: What Are Vulnerabilities and Threats?
    3. Chapter 3: Controlling Access to Your Assets
    4. Chapter 4: Controlling Network Connections
    5. Chapter 5: Encrypting Your Data at Rest
    6. Chapter 6: Encrypting Your Moving Data
    7. Chapter 7: Risk Assessment
    8. Chapter 8: Configuring System Backups and Monitoring
    9. Chapter 9: Resource Isolation Design Patterns
  17. Index
  18. End User License Agreement

Product information

  • Title: LPI Security Essentials Study Guide
  • Author(s): David Clinton
  • Release date: June 2023
  • Publisher(s): Sybex
  • ISBN: 9781394196531