Tags
Language
Tags
April 2025
Su Mo Tu We Th Fr Sa
30 31 1 2 3 4 5
6 7 8 9 10 11 12
13 14 15 16 17 18 19
20 21 22 23 24 25 26
27 28 29 30 1 2 3
Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
SpicyMags.xyz

Lpi Security Essentials (020-100) Complete Course & Exam

Posted By: ELK1nG
Lpi Security Essentials (020-100) Complete Course & Exam

Lpi Security Essentials (020-100) Complete Course & Exam
Published 4/2023
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 9.07 GB | Duration: 17h 14m

Pass the LPI Security Essentials (020-100) exam on your 1st attempt, includes a full-length practice exam!

What you'll learn

Passing the LPI Security Essentials certification exam with confidence

Avoid common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud

Implement common ways to prevent and mitigate attacks against their personal devices and data

Utilize encryption to secure data transferred through a network and stored on storage devices and in the cloud

Apply common security best practices, protect private information, and secure their identity

Securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles

Requirements

Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)

Description

** Taught by a Best Selling IT Certification Instructor **Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of cloud computing.My name is Jason Dion, and I have personally helped over 1,000,000 students earn their IT certifications, and now I can help you, too!Along with my co-instructor, Kip Boyle, we are going to teach you the fundamentals of cybersecurity and how to stay safe while online!In today's digital age, IT security is vital for both individuals and organizations. Protecting data, devices, and networks is crucial in responsible information technology use. The Linux Professional Institute Security Essentials certificate provides an opportunity to learn and demonstrate expertise in the field. The exam covers essential IT security fields, making it suitable for students, staff, and organizations seeking to improve their security. It's also ideal for individuals looking to gain basic competence in secure information technology use.In this course, you will get access to all of our lessons, lectures, and video demonstrations to teach you everything you need to know to pass the LPI Security Essentials exam.LPI Security Essentials (020-100) is the best way to gain a fundamental understanding of cybersecurity and is designed for both IT and non-technical professionals who need to make informed security choices while using the Internet so they don't fall victim to cyber attacks and data breaches. This course is designed to help prepare you for the LPI Security Essentials (020-100) certification exam and covers all five domains of the LPI Security Essentials (020-100)certification exam:Security Concepts (12.5%)Encryption (22.5%)Device and Storage Security (22.5%)Network and Service Security (25%)Identity and Privacy (17.5%)What You Will Receive In The Course:Video lectures with the essential information needed to pass the LPI Security Essentials (020-100) examA complete downloadable study guide in PDF format based on the lessonsPractice quizzes to ensure mastery of each section of the courseA full-length practice exam with multiple choice and mock simulationsThis course stays current and up-to-date with the latest release of the LPI Security Essentials exam (020-100), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!What Other Students Are Saying About Our Other Certification Courses:I passed the Security+ exam. This course was absolutely essential to passing that exam. Only the Dion Security+ covered the topics comprehensively and thoroughly enough. No other resource I used came close. (Kolya, 5 stars)I have just completed watching two different instructor courses on the same subject. I must say, Dion's has more information in a better constructed manner. This course is not easy, it is heavy with information and having you sit through shorter videos was the best part. Having watched more than just Dion's, I can say he goes over the content much better. Very glad I chose to watch a second course! (Rutger, 5 stars)I love taking this wonderful course. It's full of important tips and amazing steps in order to pass CompTIA Security+. Thank you, Jason Dion, for making this incredible course! (Paul, 5 stars)Upon completion of this course, you will earn 12 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

Overview

Section 1: Introduction

Lecture 1 Introduction

Lecture 2 Download the Study Guide

Lecture 3 Exam Tips

Lecture 4 100% Pass Guarantee

Section 2: Overview of Security

Lecture 5 Overview of Security (OBJ 1.1)

Lecture 6 CIA Triad (OBJ 1.1)

Lecture 7 AAA of Security (OBJ 1.1)

Lecture 8 Security Threats (OBJ 1.1)

Lecture 9 Mitigating Threats (OBJ 1.1)

Lecture 10 Threat Actors (OBJ 1.1)

Lecture 11 Common Security Roles (OBJ 1.1)

Lecture 12 MITRE ATT&CK Framework (OBJ 1.1)

Section 3: Risk Management

Lecture 13 Risk Management (OBJ 1.2)

Lecture 14 Risk Assessment (OBJ 1.2)

Lecture 15 Methodologies (OBJ 1.2)

Lecture 16 Security Controls (OBJ 1.2)

Lecture 17 Vulnerability Assessments (OBJ 1.2)

Lecture 18 Penetration Testing (OBJ 1.2)

Lecture 19 Common Vulnerability Identifiers (OBJ 1.2)

Lecture 20 Vulnerability Reports (OBJ 1.2)

Lecture 21 Zero-day Vulnerabilities (OBJ 1.2)

Lecture 22 Execution and Escalation Attacks (OBJ 1.2)

Lecture 23 Incident Response Process (OBJ 1.2)

Section 4: Ethical Behavior

Lecture 24 Ethical Behavior (OBJ 1.3 & 5.2)

Lecture 25 Computer Security Laws (OBJ 1.3)

Lecture 26 Legal Requirements (OBJ 1.3)

Lecture 27 Bug Bounties (OBJ 1.3 & 5.2)

Lecture 28 Copyright Laws (OBJ 1.3)

Lecture 29 Confidential Information (OBJ 1.3 & 5.2)

Lecture 30 Errors and Outages (OBJ 1.3)

Lecture 31 AWS Outage Case Study (OBJ 1.3)

Section 5: Malware

Lecture 32 Malware (OBJ 3.3 & 4.2)

Lecture 33 Viruses, Worms, and Trojans (OBJ 3.3)

Lecture 34 Ransomware (OBJ 3.3)

Lecture 35 Spyware (OBJ 3.3)

Lecture 36 Rootkits (OBJ 3.3)

Lecture 37 Botnets and Zombies (OBJ 3.3 & 4.2)

Lecture 38 Backdoors and Logic Bombs (OBJ 3.3)

Lecture 39 Symptoms of Infections (OBJ 3.3)

Lecture 40 Removing Malware (OBJ 3.3)

Lecture 41 Preventing Malware (OBJ 3.3)

Lecture 42 Viruses and Trojans in Action (OBJ 3.3)

Section 6: Social Engineering

Lecture 43 Social Engineering (OBJ 5.2)

Lecture 44 Phishing (OBJ 5.2)

Lecture 45 Spam (OBJ 5.2)

Lecture 46 Filtering Spam (OBJ 5.2)

Lecture 47 Impersonation (OBJ 5.2)

Lecture 48 Pretexting (OBJ 5.2)

Lecture 49 Social Engineering Attacks (OBJ 5.2)

Lecture 50 Frauds, Scams, and Hoaxes (OBJ 5.2)

Lecture 51 Evil Twin (OBJ 5.2)

Lecture 52 User Education (OBJ 5.2)

Lecture 53 Anti-phishing Training (OBJ 5.2)

Section 7: Hardware Security

Lecture 54 Hardware Security (OBJ 3.1)

Lecture 55 Hardware Components (OBJ 3.1)

Lecture 56 Smart Devices and IoT (OBJ 3.1)

Lecture 57 Trusted Computing (OBJ 3.1)

Lecture 58 USB Devices (OBJ 3.1)

Lecture 59 Bluetooth Devices (OBJ 3.1)

Lecture 60 RFID Devices (OBJ 3.1)

Section 8: Application Security

Lecture 61 Application Security (OBJ 3.2)

Lecture 62 Types of Software (OBJ 3.2)

Lecture 63 Installing Applications (OBJ 3.2)

Lecture 64 Mobile Application Risks (OBJ 3.2)

Lecture 65 Updating Applications (OBJ 3.2)

Lecture 66 Buffer Overflows (OBJ 3.2)

Lecture 67 Security Applications (OBJ 3.2)

Lecture 68 Buffer Overflow Attack (OBJ 3.2)

Lecture 69 SQL Injections (OBJ 3.2)

Section 9: Networks

Lecture 70 Networks (OBJ 4.1)

Lecture 71 Networking Hardware (OBJ 4.1)

Lecture 72 The OSI Model (OBJ 4.1)

Lecture 73 The TCP/IP Model (OBJ 4.1)

Lecture 74 TCP and UDP (OBJ 4.1)

Lecture 75 Switches and Routers (OBJ 4.1)

Lecture 76 IPv4 (OBJ 4.1)

Lecture 77 Assigning IPv4 Addresses (OBJ 4.1)

Lecture 78 Data Transfer Over Networks (OBJ 4.1)

Lecture 79 Network Routing (OBJ 4.1)

Lecture 80 DNS (OBJ 4.1)

Lecture 81 IPv6 (OBJ 4.1)

Lecture 82 Internet Service Providers (OBJ 4.1)

Section 10: Network Security

Lecture 83 Network Security (OBJ 4.2)

Lecture 84 Wired Network Security (OBJ 4.2)

Lecture 85 Network Access Control (NAC) (OBJ 4.2)

Lecture 86 Wireless Networks (OBJ 4.2)

Lecture 87 Wireless Encryption (OBJ 4.2)

Lecture 88 Wireless Security (OBJ 4.2)

Lecture 89 Traffic Interception (OBJ 4.2)

Lecture 90 DoS and DDoS (OBJ 4.2)

Lecture 91 Configuring SOHO Networks (OBJ 4.2)

Lecture 92 Configuring Wireless Networks (OBJ 4.2)

Section 11: Cloud Computing

Lecture 93 Cloud Computing (OBJ 4.1 & 5.2)

Lecture 94 Cloud Characteristics (OBJ 4.1)

Lecture 95 SaaS (OBJ 4.1)

Lecture 96 IaaS (OBJ 4.1)

Lecture 97 PaaS (OBJ 4.1)

Lecture 98 Deployment Models (OBJ 4.1)

Lecture 99 Shared Responsibility Model (OBJ 4.1)

Lecture 100 Cloud Threats and Vulnerabilities (OBJ 4.1)

Lecture 101 Security in the Cloud (OBJ 4.1)

Section 12: Cryptography

Lecture 102 Cryptography (OBJ 2.1)

Lecture 103 Symmetric vs Asymmetric (OBJ 2.1)

Lecture 104 Symmetric Algorithms (OBJ 2.1)

Lecture 105 Asymmetric Algorithms (OBJ 2.1)

Lecture 106 Public Key Infrastructure (OBJ 2.1)

Lecture 107 Digital Certificates (OBJ 2.1)

Lecture 108 Examining Digital Certificates (OBJ 2.1)

Lecture 109 Certificate Revocation (OBJ 2.1)

Lecture 110 Perfect Forward Secrecy (OBJ 2.1)

Lecture 111 Hashing (OBJ 2.1)

Lecture 112 Using Hashing (OBJ 2.1)

Lecture 113 Hashing Security and Attacks (OBJ 2.1)

Section 13: Applied Cryptography

Lecture 114 Applied Cryptography (OBJ 2.2, 2.3, & 2.4)

Lecture 115 Web Encryption (OBJ 2.2, 2.3, & 2.4)

Lecture 116 X.509 Certificates (OBJ 2.2, 2.3, & 2.4)

Lecture 117 Email Encryption and Signatures (OBJ 2.2, 2.3, & 2.4)

Lecture 118 OpenPGP (OBJ 2.2, 2.3, & 2.4)

Lecture 119 S/MIME (OBJ 2.2, 2.3, & 2.4)

Lecture 120 Send and Receive Encrypted Emails (OBJ 2.2, 2.3, & 2.4)

Lecture 121 Storage Encryption (OBJ 2.2, 2.3, & 2.4)

Lecture 122 BitLocker (OBJ 2.2, 2.3, & 2.4)

Lecture 123 VeraCrypt (OBJ 2.2, 2.3, & 2.4)

Section 14: Data Availability

Lecture 124 Data Availability (OBJ 3.4)

Lecture 125 Cryptomator (OBJ 2.2, 2.3, & 2.4)

Lecture 126 Backup and Recovery (OBJ 3.4)

Lecture 127 Backup and Recovery Methods (OBJ 3.4)

Lecture 128 Backup Schemes (OBJ 3.4)

Lecture 129 Security for Backups (OBJ 3.4)

Lecture 130 Retention Requirements (OBJ 3.4)

Lecture 131 Cloud-based File Storage (OBJ 3.4)

Section 15: Authentication and Authorization

Lecture 132 Authentication and Authorization (OBJ 5.1)

Lecture 133 Password Best Practices (OBJ 5.1)

Lecture 134 Password Cracking (OBJ 5.1)

Lecture 135 Password Managers (OBJ 5.1)

Lecture 136 Single Sign-On (SSO) (OBJ 5.1)

Lecture 137 Multifactor Authentication (MFA) (OBJ 5.1)

Lecture 138 Passwordless Authentication (OBJ 5.1)

Lecture 139 Online Password Storage (OBJ 5.1)

Lecture 140 Password Leaks (OBJ 5.1)

Section 16: Anonymity

Lecture 141 Anonymity (OBJ 4.3)

Lecture 142 Virtual Private Networks (VPNs) (OBJ 4.3)

Lecture 143 End-to-End Encryption (OBJ 4.3)

Lecture 144 Transfer Encryption (OBJ 4.3)

Lecture 145 Anonymity and Recognition (OBJ 4.3)

Lecture 146 Proxy Servers (OBJ 4.3)

Lecture 147 TOR (OBJ 4.3)

Lecture 148 The Darknet (OBJ 4.3)

Lecture 149 Cryptocurrencies (OBJ 4.3)

Section 17: Protecting Your Privacy

Lecture 150 Protecting Your Privacy (OBJ 5.3)

Lecture 151 Personally Identifiable Information (PII) (OBJ 5.3)

Lecture 152 Threats to Personal Information (OBJ 5.3)

Lecture 153 User Tracking (OBJ 5.3)

Lecture 154 Script Blockers and Ad Blockers (OBJ 5.3)

Lecture 155 Profile Privacy Settings (OBJ 5.3)

Lecture 156 Stalking and Cybermobbing (OBJ 5.3)

Section 18: Conclusion

Lecture 157 Conclusion

Lecture 158 BONUS: Where do I go from here?

Students wanting to pass the LPI Security Essentials certification exam,Students seeking a more secure online experience,Students seeking to maximize their privacy when browsing the web,Students wanting to get a basic understanding of cybersecurity