+353-1-416-8900REST OF WORLD
+44-20-3973-8888REST OF WORLD
1-917-300-0470EAST COAST U.S
1-800-526-8630U.S. (TOLL FREE)

LPI Security Essentials Study Guide. Exam 020-100. Edition No. 1. Sybex Study Guide

  • Book

  • 208 Pages
  • June 2023
  • John Wiley and Sons Ltd
  • ID: 5840523

Prepare smarter and faster for the LPI Security Essentials exam

In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-premise and in the cloud. You’ll discover common and effective ways to prevent, mitigate, and respond to security attacks, and validate your ability to use encryption to secure data transferred through a network.

This book is designed to prepare you for the LPI Security Essentials certification offered by the global standard and career support organization for open-source professionals. Whether you’re preparing for this foundational exam as a steppingstone to the more advanced Security+ certification or as an end in itself, you’ll advance your knowledge of security concepts, encryption, node, device, and storage security, network and service security, and identity and privacy concepts. You’ll get:

  • Techniques and tools you can use immediately in a new role as an IT security professional
  • Key strategies for digital self-defense, including securing your own devices and making use of IT services
  • Complimentary access to Sybex’s superior online interactive learning environment and test bank, complete with chapter tests, a practice exam, electronic flashcards, and a glossary of key terms

Perfect for anyone seeking to take the LPI Security Essentials certification exam, LPI Security Essentials Study Guide, Exam 020-100 is a must-have resource for people looking to hit the ground running in a new career focused on information security.

Table of Contents

Introduction xiii

Assessment Test xvii

Chapter 1 Using Digital Resources Responsibly 1

Chapter 2 What Are Vulnerabilities and Threats? 17

Chapter 3 Controlling Access to Your Assets 37

Chapter 4 Controlling Network Connections 63

Chapter 5 Encrypting Your Data at Rest 85

Chapter 6 Encrypting Your Moving Data 97

Chapter 7 Risk Assessment 113

Chapter 8 Configuring System Backups and Monitoring 127

Chapter 9 Resource Isolation Design Patterns 143

Appendix Answers to Review Questions 155

Index 167

Authors

David Clinton