LPI Security Essentials Study Guide Exam 020-100 /
Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-pre...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Hoboken, New Jersey :
John Wiley & Sons, Incorporated,
2023.
|
Temas: | |
Acceso en línea: | Texto completo (Requiere registro previo con correo institucional) |
Tabla de Contenidos:
- Intro
- Table of Contents
- Title Page
- Copyright
- Acknowledgments
- About the Author
- Introduction
- What Does This Book Cover?
- About the Exam
- Exam Objectives
- Objective Map
- Assessment Test
- Answers to Assessment Test
- Chapter 1: Using Digital Resources Responsibly
- Protecting Personal Rights
- Protecting Digital Privacy
- Establishing Authenticity
- Summary
- Exam Essentials
- Review Questions
- Chapter 2: What Are Vulnerabilities and Threats?
- The Basics: What Are We Trying to Accomplish Here?
- Common Vulnerabilities
- Digital Espionage
- Stolen Credentials
- Malware
- Network-Based Attacks
- Cloud Computing and Digital Security
- Summary
- Exam Essentials
- Review Questions
- Chapter 3: Controlling Access to Your Assets
- Controlling Physical Access
- Controlling Network Access
- Controlling Software Sources
- Summary
- Exam Essentials
- Review Questions
- Chapter 4: Controlling Network Connections
- Understanding Network Architecture
- Auditing Networks
- Securing Networks
- Summary
- Exam Essentials
- Review Questions
- Chapter 5: Encrypting Your Data at Rest
- What Is Encryption?
- Encryption Usage Patterns
- Encryption Technologies
- Summary
- Exam Essentials
- Review Questions
- Chapter 6: Encrypting Your Moving Data
- Website Encryption
- Email Encryption
- Working with VPN Connections and Software Repositories
- Summary
- Exam Essentials
- Review Questions
- Chapter 7: Risk Assessment
- Conducting Open-Source Intelligence Gathering
- Accessing Public Vulnerability Databases
- Conducting Vulnerability Scans
- Conducting Penetration Tests
- Summary
- Exam Essentials
- Review Questions
- Chapter 8: Configuring System Backups and Monitoring
- Why You Need to Get Backups Right the First Time
- Backup Types
- Multitier Backups
- Configuring Monitoring and Alerts
- Summary
- Exam Essentials
- Review Questions
- Chapter 9: Resource Isolation Design Patterns
- Configuring Network Firewalling
- Working with Sandbox Environments
- Controlling Local System Access
- Summary
- Exam Essentials
- Review Questions
- Appendix: Answers to Review Questions
- Chapter 1: Using Digital Resources Responsibly
- Chapter 2: What Are Vulnerabilities and Threats?
- Chapter 3: Controlling Access to Your Assets
- Chapter 4: Controlling Network Connections
- Chapter 5: Encrypting Your Data at Rest
- Chapter 6: Encrypting Your Moving Data
- Chapter 7: Risk Assessment
- Chapter 8: Configuring System Backups and Monitoring
- Chapter 9: Resource Isolation Design Patterns
- Index
- End User License Agreement