LPI security essentials study guide exam 020-100

Prepare smarter and faster for the LPI Security Essentials exam In LPI Security Essentials Study Guide: Exam 020-100, veteran Linux server administrator David Clinton delivers an expert tutorial on the major security threats facing computers, networks, connected devices, and IT services, both on-pre...

Descripción completa

Detalles Bibliográficos
Otros Autores: Clinton, David, author (author)
Formato: Libro electrónico
Idioma:Inglés
Publicado: Hoboken, New Jersey : John Wiley & Sons, Inc [2023]
Materias:
Ver en Biblioteca Universitat Ramon Llull:https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009755097006719
Tabla de Contenidos:
  • Intro
  • Table of Contents
  • Title Page
  • Copyright
  • Acknowledgments
  • About the Author
  • Introduction
  • What Does This Book Cover?
  • About the Exam
  • Exam Objectives
  • Objective Map
  • Assessment Test
  • Answers to Assessment Test
  • Chapter 1: Using Digital Resources Responsibly
  • Protecting Personal Rights
  • Protecting Digital Privacy
  • Establishing Authenticity
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 2: What Are Vulnerabilities and Threats?
  • The Basics: What Are We Trying to Accomplish Here?
  • Common Vulnerabilities
  • Digital Espionage
  • Stolen Credentials
  • Malware
  • Network-Based Attacks
  • Cloud Computing and Digital Security
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 3: Controlling Access to Your Assets
  • Controlling Physical Access
  • Controlling Network Access
  • Controlling Software Sources
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 4: Controlling Network Connections
  • Understanding Network Architecture
  • Auditing Networks
  • Securing Networks
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 5: Encrypting Your Data at Rest
  • What Is Encryption?
  • Encryption Usage Patterns
  • Encryption Technologies
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 6: Encrypting Your Moving Data
  • Website Encryption
  • Email Encryption
  • Working with VPN Connections and Software Repositories
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 7: Risk Assessment
  • Conducting Open-Source Intelligence Gathering
  • Accessing Public Vulnerability Databases
  • Conducting Vulnerability Scans
  • Conducting Penetration Tests
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 8: Configuring System Backups and Monitoring
  • Why You Need to Get Backups Right the First Time
  • Backup Types
  • Multitier Backups.
  • Configuring Monitoring and Alerts
  • Summary
  • Exam Essentials
  • Review Questions
  • Chapter 9: Resource Isolation Design Patterns
  • Configuring Network Firewalling
  • Working with Sandbox Environments
  • Controlling Local System Access
  • Summary
  • Exam Essentials
  • Review Questions
  • Appendix: Answers to Review Questions
  • Chapter 1: Using Digital Resources Responsibly
  • Chapter 2: What Are Vulnerabilities and Threats?
  • Chapter 3: Controlling Access to Your Assets
  • Chapter 4: Controlling Network Connections
  • Chapter 5: Encrypting Your Data at Rest
  • Chapter 6: Encrypting Your Moving Data
  • Chapter 7: Risk Assessment
  • Chapter 8: Configuring System Backups and Monitoring
  • Chapter 9: Resource Isolation Design Patterns
  • Index
  • End User License Agreement.