LPI® Security Essentials

LPI® Security Essentials

In this course, you will get access to all of our lessons, lectures, and video demonstrations to teach you everything you need to know to pass the LPI Security Essentials exam.

Course Details

Reviews

5 out of 5 stars
5 Total Reviews

5 out of 5 stars

$69USD

Course Highlights

  • Course Price$69
  • InstructorsJason Dion
  • Total Duration17 hours
  • Total Lessons157
  • Total Quizzes12
  • Enrolled5 Students
  • Access to material12 Months
  • Full Practice ExamsIncluded
  • 100% Pass GuaranteeIncluded

Meet Your Instructor

Disclaimer

Prices may vary depending on local currency and exchange rates.

License

Description

Welcome to our comprehensive course on cybersecurity fundamentals, where I, along with my co-instructor, Kip Boyle, will guide you through the essential aspects of staying safe online. In an era dominated by digital interactions, IT security is pivotal for individuals and organizations alike, necessitating responsible technology use to protect data, devices, and networks.

This course is tailored to prepare you for the Linux Professional Institute Security Essentials (020-100) exam, offering lessons, lectures, and video demonstrations covering a spectrum of IT security fields. Whether you are an individual looking to enhance your online security or aspiring to gain foundational cybersecurity knowledge, this course serves as a gateway to understanding common security threats, preventive measures, encryption, and secure IT services usage, both on-premises and in the cloud.

Learning Objectives:

  • Grasp essential security concepts
  • Learn encryption techniques for data protection during transit and storage
  • Understand device, storage, network, and service security
  • Explore identity and privacy protection measures
  • Acquire proficiency in Linux command line, open-source applications, and operating system components

Who this course is for:

  • Individuals aiming to pass the LPI Security Essentials certification exam
  • Anyone seeking to enhance online security and maximize web browsing privacy
  • Beginning IT professionals exploring Linux and cybersecurity analysts looking to better understand Linux

Course Overview:

This course offers a wealth of lessons, lectures, and video demonstrations, meticulously designed to impart the knowledge required to pass the LPI Security Essentials exam and understand the fundamentals of cybersecurity and Linux.

Prerequisites:

  • Basic familiarity with computer networks, administration, and security is advantageous, although all necessary information will be covered during the course.
  • A laptop or desktop for Linux installation during the course.

Course Outline:

Frequently Asked Questions

No.

Title

Type

Status

1.

Introduction

VIDEO

2.

Download your free study guide

PDF

3.

Exam Tips

VIDEO

4.

100% Pass Guarantee

VIDEO

5.

Checkpoint: Introduction

QUIZ

No.

Title

Type

Status

1.

Overview of Security

VIDEO

2.

CIA Triad

VIDEO

3.

AAA of Security

VIDEO

4.

Security Threats

VIDEO

5.

Mitigating Threats

VIDEO

6.

Threat Actors

VIDEO

7.

Common Security Roles

VIDEO

8.

MITRE ATT&CK Framework

VIDEO

9.

Checkpoint: Overview of Security

QUIZ

No.

Title

Type

Status

1.

Risk Management

VIDEO

2.

Risk Assessment

VIDEO

3.

Methodologies

VIDEO

4.

Security Controls

VIDEO

5.

Vulnerability Assessments

VIDEO

6.

Penetration Testing

VIDEO

7.

Common Vulnerability Identifiers

VIDEO

8.

Vulnerability Reports

VIDEO

9.

Zero-day Vulnerabilities

VIDEO

10.

Execution and Escalation Attacks

VIDEO

11.

Incident Response Process

VIDEO

12.

Checkpoint: Risk Management

QUIZ

No.

Title

Type

Status

1.

Ethical Behavior

VIDEO

2.

Computer Security Laws

VIDEO

3.

Legal Requirements

VIDEO

4.

Bug Bounties

VIDEO

5.

Copyright Laws

VIDEO

6.

Confidential Information

VIDEO

7.

Errors and Outages

VIDEO

8.

AWS Outage Case Study

VIDEO

9.

Checkpoint: Ethical Behavior

QUIZ

No.

Title

Type

Status

1.

Malware

VIDEO

2.

Viruses, Worms, and Trojans

VIDEO

3.

Ransomware

VIDEO

4.

Spyware

VIDEO

5.

Rootkits

VIDEO

6.

Botnets and Zombies

VIDEO

7.

Backdoors and Logic Bombs

VIDEO

8.

Symptoms of Infections

VIDEO

9.

Removing Malware

VIDEO

10.

Preventing Malware

VIDEO

11.

Viruses and Trojans in Action

VIDEO

12.

Checkpoint: Malware

QUIZ

No.

Title

Type

Status

1.

Social Engineering

VIDEO

2.

Phishing

VIDEO

3.

Spam

VIDEO

4.

Filtering Spam

VIDEO

5.

Impersonation

VIDEO

6.

Pretexting

VIDEO

7.

Social Engineering Attacks

VIDEO

8.

Frauds, Scams, and Hoaxes

VIDEO

9.

Evil Twin

VIDEO

10.

User Education

VIDEO

11.

Anti-phishing Training

VIDEO

12.

Checkpoint: Social Engineering

QUIZ

No.

Title

Type

Status

1.

Hardware Security

VIDEO

2.

Hardware Components

VIDEO

3.

Smart Devices and IoT

VIDEO

4.

Trusted Computing

VIDEO

5.

USB Devices

VIDEO

6.

Bluetooth Devices

VIDEO

7.

RFID Devices

VIDEO

8.

Checkpoint: Hardware Security

QUIZ

No.

Title

Type

Status

1.

Application Security

VIDEO

2.

Types of Software

VIDEO

3.

Installing Applications

VIDEO

4.

Mobile Application Risks

VIDEO

5.

Updating Applications

VIDEO

6.

Security Applications

VIDEO

7.

Buffer Overflows

VIDEO

8.

Buffer Overflow Attack

VIDEO

9.

SQL Injections

VIDEO

10.

Checkpoint: Application Security

QUIZ

No.

Title

Type

Status

1.

Networks

VIDEO

2.

Networking Hardware

VIDEO

3.

The OSI Model

VIDEO

4.

The TCP/IP Model

VIDEO

5.

TCP and UDP

VIDEO

6.

Switches and Routers

VIDEO

7.

IPv4

VIDEO

8.

Assigning IPv4 Addresses

VIDEO

9.

Data Transfer Over Networks

VIDEO

10.

Network Routing

VIDEO

11.

DNS

VIDEO

12.

IPv6

VIDEO

13.

Internet Service Providers

VIDEO

14.

Checkpoint: Networks

QUIZ

No.

Title

Type

Status

1.

Network Security

VIDEO

2.

Wired Network Security

VIDEO

3.

Network Access Control (NAC)

VIDEO

4.

Wireless Networks

VIDEO

5.

Wireless Encryption

VIDEO

6.

Wireless Security

VIDEO

7.

Traffic Interception

VIDEO

8.

DoS and DDoS

VIDEO

9.

Configuring SOHO Networks

VIDEO

10.

Configuring Wireless Networks

VIDEO

11.

Checkpoint: Network Security

QUIZ

No.

Title

Type

Status

1.

Cloud Computing

VIDEO

2.

Cloud Characteristics

VIDEO

3.

SaaS

VIDEO

4.

IaaS

VIDEO

5.

PaaS

VIDEO

6.

Deployment Models

VIDEO

7.

Shared Responsibility Model

VIDEO

8.

Cloud Threats and Vulnerabilities

VIDEO

9.

Security in the Cloud

VIDEO

10.

Checkpoint: Cloud Computing

QUIZ

No.

Title

Type

Status

1.

Cryptography

VIDEO

2.

Symmetric vs Asymmetric

VIDEO

3.

Symmetric Algorithms

VIDEO

4.

Asymmetric Algorithms

VIDEO

5.

Public Key Infrastructure

VIDEO

6.

Digital Certificates

VIDEO

7.

Examining Digital Certificates

VIDEO

8.

Certificate Revocation

VIDEO

9.

Perfect Forward Secrecy

VIDEO

10.

Hashing

VIDEO

11.

Using Hashing

VIDEO

12.

Hashing Security and Attacks

VIDEO

13.

Checkpoint: Cryptography

QUIZ

No.

Title

Type

Status

1.

Applied Cryptography

VIDEO

2.

Web Encryption

VIDEO

3.

X.509 Certificates

VIDEO

4.

Email Encryption and Signatures

VIDEO

5.

OpenPGP

VIDEO

6.

S/MIME

VIDEO

7.

Send and Receive Encrypted Emails

VIDEO

8.

Storage Encryption

VIDEO

9.

BitLocker

VIDEO

10.

VeraCrypt

VIDEO

11.

Cryptomator

VIDEO

12.

Checkpoint: Applied Cryptography

QUIZ

No.

Title

Type

Status

1.

Data Availability

VIDEO

2.

Backup and Recovery

VIDEO

3.

Backup and Recovery Methods

VIDEO

4.

Backup Schemes

VIDEO

5.

Security for Backups

VIDEO

6.

Retention Requirements

VIDEO

7.

Cloud-based File Storage

VIDEO

8.

Checkpoint: Data Availability

QUIZ

No.

Title

Type

Status

1.

Authentication and Authorization

VIDEO

2.

Password Best Practices

VIDEO

3.

Password Cracking

VIDEO

4.

Password Managers

VIDEO

5.

Single Sign-On (SSO)

VIDEO

6.

Multifactor Authentication (MFA)

VIDEO

7.

Passwordless Authentication

VIDEO

8.

Online Password Storage

VIDEO

9.

Password Leaks

VIDEO

10.

Checkpoint: Authentication and Authorization

QUIZ

No.

Title

Type

Status

1.

Anonymitiy

VIDEO

2.

Virtual Private Networks (VPNs)

VIDEO

3.

End-to-End Encryption

VIDEO

4.

Transfer Encryption

VIDEO

5.

Anonymity and Recognition

VIDEO

6.

Proxy Servers

VIDEO

7.

TOR

VIDEO

8.

The Darknet

VIDEO

9.

Cryptocurrencies

VIDEO

10.

Checkpoint: Anonymitiy

QUIZ

No.

Title

Type

Status

1.

Protecting Your Privacy

VIDEO

2.

Personally Identifiable Information (PII)

VIDEO

3.

Threats to Personal Information

VIDEO

4.

User Tracking

VIDEO

5.

Script Blockers and Ad Blockers

VIDEO

6.

Profile Privacy Settings

VIDEO

7.

Stalking and Cybermobbing

VIDEO

8.

Checkpoint: Protecting Your Privacy

QUIZ

No.

Title

Type

Status

1.

Conclusion

VIDEO

2.

BONUS: Where do I go from here?

VIDEO

3.

Practice Exam

EXAM

No.

Title

Type

Status

No.

Title

Type

Status

No.

Title

Type

Status

No.

Title

Type

Status

Customer Reviews

Review Avatar Image

Fiona Asple

confidential

5 out of 5 stars

This was the first class I took from Dion Training & it was great. Jason is a fantastic trainer - his presentation is engaging & his knowledge of the material is excellent. The study guide & practice tests were key to passing my exam the first time.
Review Avatar Image

Michael Getter

confidential

5 out of 5 stars

Jason Dion is an excellent instructor. His tutorials are never boring and filled with visual aids and examples that help with material comprehension and retention. This course definitely helped me pass the test on the first try. I am now trying to decide what should be my next course to take from Dion training.
ato Comptia Logo
Accredited Training Organization
Dion Training is a Platinum Partner for the Linux Professional Institutes certifications

All of our courses undergo a stringent review by the accreditation body prior to being published. When you take a course through us, you can be assured you are getting the highest quality training and an affordable price.

60 Day Money Back Guarantee

100% Pass Guarantee

All the risk is on us, as it should be. You literally have nothing to lose.

We are so confident that you are going to learn everything you need to know to pass your CompTIA®, ITIL®, PRINCE2®, PRINCE2 Agile®, or Linux certification if you complete our courses at diontraining.com. So, if you do not pass your certification within 60 days of registering for and completing your course, simply send us your test score and your course completion letter, and we will pay for your exam retake.