Cargando…

LPI Security Essentials Study Guide Exam 020-100 /

Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-pre...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Clinton, David (IT specialist) (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Incorporated, 2023.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • Title Page
  • Copyright
  • Acknowledgments
  • About the Author
  • Introduction
  • What Does This Book Cover?
  • About the Exam
  • Exam Objectives
  • Objective Map
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1: Using Digital Resources Responsibly
  • Protecting Personal Rights
  • Protecting Digital Privacy
  • Establishing Authenticity
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 2: What Are Vulnerabilities and Threats?
  • The Basics: What Are We Trying to Accomplish Here?
  • Common Vulnerabilities
  • Digital Espionage
  • Stolen Credentials
  • Malware
  • Network-Based Attacks
  • Cloud Computing and Digital Security
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 3: Controlling Access to Your Assets
  • Controlling Physical Access
  • Controlling Network Access
  • Controlling Software Sources
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 4: Controlling Network Connections
  • Understanding Network Architecture
  • Auditing Networks
  • Securing Networks
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 5: Encrypting Your Data at Rest
  • What Is Encryption?
  • Encryption Usage Patterns
  • Encryption Technologies
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 6: Encrypting Your Moving Data
  • Website Encryption
  • Email Encryption
  • Working with VPN Connections and Software Repositories
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 7: Risk Assessment
  • Conducting Open-Source Intelligence Gathering
  • Accessing Public Vulnerability Databases
  • Conducting Vulnerability Scans
  • Conducting Penetration Tests
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 8: Configuring System Backups and Monitoring
  • Why You Need to Get Backups Right the First Time
  • Backup Types
  • Multitier Backups
  • Configuring Monitoring and Alerts
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 9: Resource Isolation Design Patterns
  • Configuring Network Firewalling
  • Working with Sandbox Environments
  • Controlling Local System Access
  • Summary
  • Exam Essentials
  • Review Questions
  • Appendix: Answers to Review Questions
  • Chapter 1: Using Digital Resources Responsibly
  • Chapter 2: What Are Vulnerabilities and Threats?
  • Chapter 3: Controlling Access to Your Assets
  • Chapter 4: Controlling Network Connections
  • Chapter 5: Encrypting Your Data at Rest
  • Chapter 6: Encrypting Your Moving Data
  • Chapter 7: Risk Assessment
  • Chapter 8: Configuring System Backups and Monitoring
  • Chapter 9: Resource Isolation Design Patterns
  • Index
  • End User License Agreement