Companies Home Search Profile

LPI Security Essentials (020-100) Complete Course & Exam

Focused View

Jason Dion • 1 Million+ Enrollments Worldwide,Dion Training Solutions • ATO for ITIL & PRINCE2,Dion Training Solutions • ATO for ITIL & PRINCE2,Kip Boyle

17:29:31

203 View
  • 001 Introduction.mp4
    11:43
  • 002 Download the Study Guide.html
  • 002 LPI-Security-Essentials-Study-Guide.pdf
  • 003 Exam Tips.mp4
    03:26
  • 004 100% Pass Guarantee.mp4
    03:44
  • 001 Overview of Security (OBJ 1.1).mp4
    10:39
  • 002 CIA Triad (OBJ 1.1).mp4
    09:39
  • 003 AAA of Security (OBJ 1.1).mp4
    04:09
  • 004 Security Threats (OBJ 1.1).mp4
    07:29
  • 005 Mitigating Threats (OBJ 1.1).mp4
    07:16
  • 006 Threat Actors (OBJ 1.1).mp4
    15:00
  • 007 Common Security Roles (OBJ 1.1).mp4
    12:30
  • 008 MITRE ATT&CK Framework (OBJ 1.1).mp4
    06:05
  • 001 Risk Management (OBJ 1.2).mp4
    03:30
  • 002 Risk Assessment (OBJ 1.2).mp4
    08:28
  • 003 Methodologies (OBJ 1.2).mp4
    02:52
  • 004 Security Controls (OBJ 1.2).mp4
    06:50
  • 005 Vulnerability Assessments (OBJ 1.2).mp4
    03:35
  • 006 Penetration Testing (OBJ 1.2).mp4
    04:14
  • 007 Common Vulnerability Identifiers (OBJ 1.2).mp4
    06:14
  • 008 Vulnerability Reports (OBJ 1.2).mp4
    10:37
  • 009 Zero-day Vulnerabilities (OBJ 1.2).mp4
    05:06
  • 010 Execution and Escalation Attacks (OBJ 1.2).mp4
    04:02
  • 011 Incident Response Process (OBJ 1.2).mp4
    09:52
  • 001 Ethical Behavior (OBJ 1.3 & 5.2).mp4
    03:45
  • 002 Computer Security Laws (OBJ 1.3).mp4
    14:31
  • 003 Legal Requirements (OBJ 1.3).mp4
    11:26
  • 004 Bug Bounties (OBJ 1.3 & 5.2).mp4
    10:08
  • 005 Copyright Laws (OBJ 1.3).mp4
    06:51
  • 006 Confidential Information (OBJ 1.3 & 5.2).mp4
    06:37
  • 007 Errors and Outages (OBJ 1.3).mp4
    07:55
  • 008 AWS Outage Case Study (OBJ 1.3).mp4
    04:03
  • 001 Malware (OBJ 3.3 & 4.2).mp4
    03:15
  • 002 Viruses, Worms, and Trojans (OBJ 3.3).mp4
    11:23
  • 003 Ransomware (OBJ 3.3).mp4
    02:33
  • 004 Spyware (OBJ 3.3).mp4
    02:41
  • 005 Rootkits (OBJ 3.3).mp4
    03:29
  • 006 Botnets and Zombies (OBJ 3.3 & 4.2).mp4
    03:33
  • 007 Backdoors and Logic Bombs (OBJ 3.3).mp4
    03:51
  • 008 Symptoms of Infections (OBJ 3.3).mp4
    04:13
  • 009 Removing Malware (OBJ 3.3).mp4
    05:04
  • 010 Preventing Malware (OBJ 3.3).mp4
    04:42
  • 011 Viruses and Trojans in Action (OBJ 3.3).mp4
    06:18
  • 001 Social Engineering (OBJ 5.2).mp4
    03:18
  • 002 Phishing (OBJ 5.2).mp4
    12:13
  • 003 Spam (OBJ 5.2).mp4
    02:59
  • 004 Filtering Spam (OBJ 5.2).mp4
    06:23
  • 005 Impersonation (OBJ 5.2).mp4
    04:06
  • 006 Pretexting (OBJ 5.2).mp4
    04:17
  • 007 Social Engineering Attacks (OBJ 5.2).mp4
    04:25
  • 008 Frauds, Scams, and Hoaxes (OBJ 5.2).mp4
    07:01
  • 009 Evil Twin (OBJ 5.2).mp4
    04:46
  • 010 User Education (OBJ 5.2).mp4
    04:34
  • 011 Anti-phishing Training (OBJ 5.2).mp4
    05:22
  • 001 Hardware Security (OBJ 3.1).mp4
    03:25
  • 002 Hardware Components (OBJ 3.1).mp4
    12:34
  • 003 Smart Devices and IoT (OBJ 3.1).mp4
    08:17
  • 004 Trusted Computing (OBJ 3.1).mp4
    05:39
  • 005 USB Devices (OBJ 3.1).mp4
    08:00
  • 006 Bluetooth Devices (OBJ 3.1).mp4
    07:57
  • 007 RFID Devices (OBJ 3.1).mp4
    08:40
  • 001 Application Security (OBJ 3.2).mp4
    03:49
  • 002 Types of Software (OBJ 3.2).mp4
    08:53
  • 003 Installing Applications (OBJ 3.2).mp4
    11:05
  • 004 Mobile Application Risks (OBJ 3.2).mp4
    05:57
  • 005 Updating Applications (OBJ 3.2).mp4
    03:54
  • 006 Buffer Overflows (OBJ 3.2).mp4
    07:56
  • 007 Security Applications (OBJ 3.2).mp4
    08:45
  • 008 Buffer Overflow Attack (OBJ 3.2).mp4
    06:27
  • 009 SQL Injections (OBJ 3.2).mp4
    09:40
  • 001 Networks (OBJ 4.1).mp4
    05:58
  • 002 Networking Hardware (OBJ 4.1).mp4
    15:23
  • 003 The OSI Model (OBJ 4.1).mp4
    05:17
  • 004 The TCPIP Model (OBJ 4.1).mp4
    05:03
  • 005 TCP and UDP (OBJ 4.1).mp4
    06:51
  • 006 Switches and Routers (OBJ 4.1).mp4
    05:46
  • 007 IPv4 (OBJ 4.1).mp4
    24:28
  • 008 Assigning IPv4 Addresses (OBJ 4.1).mp4
    12:23
  • 009 Data Transfer Over Networks (OBJ 4.1).mp4
    06:05
  • 010 Network Routing (OBJ 4.1).mp4
    07:59
  • 011 DNS (OBJ 4.1).mp4
    12:23
  • 012 IPv6 (OBJ 4.1).mp4
    10:41
  • 013 Internet Service Providers (OBJ 4.1).mp4
    03:07
  • 001 Network Security (OBJ 4.2).mp4
    03:07
  • 002 Wired Network Security (OBJ 4.2).mp4
    07:24
  • 003 Network Access Control (NAC) (OBJ 4.2).mp4
    02:56
  • 004 Wireless Networks (OBJ 4.2).mp4
    10:44
  • 005 Wireless Encryption (OBJ 4.2).mp4
    08:55
  • 006 Wireless Security (OBJ 4.2).mp4
    09:46
  • 007 Traffic Interception (OBJ 4.2).mp4
    04:01
  • 008 DoS and DDoS (OBJ 4.2).mp4
    08:05
  • 009 Configuring SOHO Networks (OBJ 4.2).mp4
    25:57
  • 010 Configuring Wireless Networks (OBJ 4.2).mp4
    13:39
  • 001 Cloud Computing (OBJ 4.1 & 5.2).mp4
    05:24
  • 002 Cloud Characteristics (OBJ 4.1).mp4
    14:53
  • 003 SaaS (OBJ 4.1).mp4
    07:43
  • 004 IaaS (OBJ 4.1).mp4
    08:16
  • 005 PaaS (OBJ 4.1).mp4
    07:34
  • 006 Deployment Models (OBJ 4.1).mp4
    09:19
  • 007 Shared Responsibility Model (OBJ 4.1).mp4
    05:18
  • 008 Cloud Threats and Vulnerabilities (OBJ 4.1).mp4
    08:11
  • 009 Security in the Cloud (OBJ 4.1).mp4
    02:27
  • 001 Cryptography (OBJ 2.1).mp4
    05:54
  • 002 Symmetric vs Asymmetric (OBJ 2.1).mp4
    06:04
  • 003 Symmetric Algorithms (OBJ 2.1).mp4
    04:37
  • 004 Asymmetric Algorithms (OBJ 2.1).mp4
    06:51
  • 005 Public Key Infrastructure (OBJ 2.1).mp4
    10:18
  • 006 Digital Certificates (OBJ 2.1).mp4
    04:47
  • 007 Examining Digital Certificates (OBJ 2.1).mp4
    03:32
  • 008 Certificate Revocation (OBJ 2.1).mp4
    03:48
  • 009 Perfect Forward Secrecy (OBJ 2.1).mp4
    03:35
  • 010 Hashing (OBJ 2.1).mp4
    08:29
  • 011 Using Hashing (OBJ 2.1).mp4
    03:06
  • 012 Hashing Security and Attacks (OBJ 2.1).mp4
    04:46
  • 001 Applied Cryptography (OBJ 2.2, 2.3, & 2.4).mp4
    05:24
  • 002 Web Encryption (OBJ 2.2, 2.3, & 2.4).mp4
    07:00
  • 003 X.509 Certificates (OBJ 2.2, 2.3, & 2.4).mp4
    05:16
  • 004 Email Encryption and Signatures (OBJ 2.2, 2.3, & 2.4).mp4
    07:54
  • 005 OpenPGP (OBJ 2.2, 2.3, & 2.4).mp4
    03:15
  • 006 SMIME (OBJ 2.2, 2.3, & 2.4).mp4
    03:47
  • 007 Send and Receive Encrypted Emails (OBJ 2.2, 2.3, & 2.4).mp4
    08:43
  • 008 Storage Encryption (OBJ 2.2, 2.3, & 2.4).mp4
    04:15
  • 009 BitLocker (OBJ 2.2, 2.3, & 2.4).mp4
    02:58
  • 010 VeraCrypt (OBJ 2.2, 2.3, & 2.4).mp4
    03:11
  • 001 Data Availability (OBJ 3.4).mp4
    02:24
  • 002 Cryptomator (OBJ 2.2, 2.3, & 2.4).mp4
    02:49
  • 003 Backup and Recovery (OBJ 3.4).mp4
    04:40
  • 004 Backup and Recovery Methods (OBJ 3.4).mp4
    13:15
  • 005 Backup Schemes (OBJ 3.4).mp4
    15:32
  • 006 Security for Backups (OBJ 3.4).mp4
    05:31
  • 007 Retention Requirements (OBJ 3.4).mp4
    04:15
  • 008 Cloud-based File Storage (OBJ 3.4).mp4
    03:50
  • 001 Authentication and Authorization (OBJ 5.1).mp4
    04:44
  • 002 Password Best Practices (OBJ 5.1).mp4
    10:35
  • 003 Password Cracking (OBJ 5.1).mp4
    08:16
  • 004 Password Managers (OBJ 5.1).mp4
    10:31
  • 005 Single Sign-On (SSO) (OBJ 5.1).mp4
    02:56
  • 006 Multifactor Authentication (MFA) (OBJ 5.1).mp4
    07:35
  • 007 Passwordless Authentication (OBJ 5.1).mp4
    05:17
  • 008 Online Password Storage (OBJ 5.1).mp4
    05:57
  • 009 Password Leaks (OBJ 5.1).mp4
    03:30
  • 001 Anonymity (OBJ 4.3).mp4
    05:17
  • 002 Virtual Private Networks (VPNs) (OBJ 4.3).mp4
    04:30
  • 003 End-to-End Encryption (OBJ 4.3).mp4
    02:44
  • 004 Transfer Encryption (OBJ 4.3).mp4
    03:13
  • 005 Anonymity and Recognition (OBJ 4.3).mp4
    03:25
  • 006 Proxy Servers (OBJ 4.3).mp4
    03:42
  • 007 TOR (OBJ 4.3).mp4
    04:02
  • 008 The Darknet (OBJ 4.3).mp4
    04:16
  • 009 Cryptocurrencies (OBJ 4.3).mp4
    03:56
  • 001 Protecting Your Privacy (OBJ 5.3).mp4
    04:09
  • 002 Personally Identifiable Information (PII) (OBJ 5.3).mp4
    06:55
  • 003 Threats to Personal Information (OBJ 5.3).mp4
    03:39
  • 004 User Tracking (OBJ 5.3).mp4
    04:29
  • 005 Script Blockers and Ad Blockers (OBJ 5.3).mp4
    04:20
  • 006 Profile Privacy Settings (OBJ 5.3).mp4
    02:32
  • 007 Stalking and Cybermobbing (OBJ 5.3).mp4
    03:23
  • 001 Conclusion.mp4
    13:22
  • 002 BONUS Where do I go from here.mp4
    03:47
  • Description


    Pass the LPI Security Essentials (020-100) exam on your 1st attempt, includes a full-length practice exam!

    What You'll Learn?


    • Passing the LPI Security Essentials certification exam with confidence
    • Avoid common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud
    • Implement common ways to prevent and mitigate attacks against their personal devices and data
    • Utilize encryption to secure data transferred through a network and stored on storage devices and in the cloud
    • Apply common security best practices, protect private information, and secure their identity
    • Securely use IT services and to take responsibility for securing their personal computing devices, applications, accounts, and online profiles

    Who is this for?


  • Students wanting to pass the LPI Security Essentials certification exam
  • Students seeking a more secure online experience
  • Students seeking to maximize their privacy when browsing the web
  • Students wanting to get a basic understanding of cybersecurity
  • What You Need to Know?


  • Basic familiarity with computer networks, administration, and security is helpful (But, all required information will be covered during the course)
  • More details


    Description

    ** Taught by a Best Selling IT Certification Instructor **


    Taught by an expert in information technology and cybersecurity with over 20 years of experience, this course is a fun way to master the fundamentals of cloud computing.

    My name is Jason Dion, and I have personally helped over 1,000,000 students earn their IT certifications, and now I can help you, too!


    Along with my co-instructor, Kip Boyle, we are going to teach you the fundamentals of cybersecurity and how to stay safe while online!


    In today's digital age, IT security is vital for both individuals and organizations. Protecting data, devices, and networks is crucial in responsible information technology use. The Linux Professional Institute Security Essentials certificate provides an opportunity to learn and demonstrate expertise in the field. The exam covers essential IT security fields, making it suitable for students, staff, and organizations seeking to improve their security. It's also ideal for individuals looking to gain basic competence in secure information technology use.


    In this course, you will get access to all of our lessons, lectures, and video demonstrations to teach you everything you need to know to pass the LPI Security Essentials exam.

    LPI Security Essentials (020-100) is the best way to gain a fundamental understanding of cybersecurity and is designed for both IT and non-technical professionals who need to make informed security choices while using the Internet so they don't fall victim to cyber attacks and data breaches.

    This course is designed to help prepare you for the LPI Security Essentials (020-100) certification exam and covers all five domains of the LPI Security Essentials (020-100)certification exam:

    1. Security Concepts (12.5%)

    2. Encryption (22.5%)

    3. Device and Storage Security (22.5%)

    4. Network and Service Security (25%)

    5. Identity and Privacy (17.5%)

    What You Will Receive In The Course:

    • Video lectures with the essential information needed to pass the LPI Security Essentials (020-100) exam

    • A complete downloadable study guide in PDF format based on the lessons

    • Practice quizzes to ensure mastery of each section of the course

    • A full-length practice exam with multiple choice and mock simulations

    This course stays current and up-to-date with the latest release of the LPI Security Essentials exam (020-100), and also provides a 30-day money-back guarantee if you are not satisfied with the quality of this course for any reason!


    What Other Students Are Saying About Our Other Certification Courses:

    • I passed the Security+ exam. This course was absolutely essential to passing that exam. Only the Dion Security+ covered the topics comprehensively and thoroughly enough. No other resource I used came close. (Kolya, 5 stars)

    • I have just completed watching two different instructor courses on the same subject. I must say, Dion's has more information in a better constructed manner. This course is not easy, it is heavy with information and having you sit through shorter videos was the best part. Having watched more than just Dion's, I can say he goes over the content much better. Very glad I chose to watch a second course! (Rutger, 5 stars)

    • I love taking this wonderful course. It's full of important tips and amazing steps in order to pass CompTIA Security+. Thank you, Jason Dion, for making this incredible course! (Paul, 5 stars)

    Upon completion of this course, you will earn 12 CEUs towards the renewal of your CompTIA A+, Network+, Security+, Linux+, Cloud+, PenTest+, CySA+, or CASP+ certifications.

    Who this course is for:

    • Students wanting to pass the LPI Security Essentials certification exam
    • Students seeking a more secure online experience
    • Students seeking to maximize their privacy when browsing the web
    • Students wanting to get a basic understanding of cybersecurity

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Jason Dion • 1 Million+ Enrollments Worldwide
    Jason Dion • 1 Million+ Enrollments Worldwide
    Instructor's Courses
    Jason Dion, CISSP No. 349867, is a former college professor and the lead instructor at Dion Training Solutions. He has multiple information technology professional certifications, including Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Certified Network Defense Architect (CNDA), Digital Forensic Examiner (DFE), Digital Media Collector (DMC), CySA+, Security+, Network+, A+, PRINCE2 Practitioner, and ITIL. With networking experience dating back to 1992, Jason has been a network engineer, Director of a Network Operations and Security Center, and an Information Systems Officer for large organizations around the globe. He holds a Master’s of Science degree in Information Technology with a specialization in Information Assurance. He lives in Puerto Rico with his wife and two children.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Dion Training Solutions • ATO for ITIL & PRINCE2
    Instructor's Courses
    Learn Faster and Get CertifiedDue to the design of our materials, you will learn faster and focus your studies on passing your certifications. With our tools and techniques, you will be ready to take and pass your certification exam on your first attempt!Training the Cybersecurity WorkforceWe strive to train the cybersecurity workforce of today and tomorrow. Whether you need to earn your next certification to be competitive for that position, or you just need to do your continuing education to maintain your current certifications, Dion Training is here to support you.
    Kip Boyle is the virtual Chief Information Security Officer (CISO) for several companies. He helps senior decision-makers overcome cybersecurity sales objections and manage unlimited cyber risks with a limited budget through rigorous prioritization. He's served as a Captain with the F-22 program in the US Air Force. In the private sectors he was the CISO for an insurance company, credit card processor, bank, credit union, and IT Managed Service Provider. He has also succeeded in other IT risk management roles in the financial services, technology, telecom, and logistics industries. He lives in Seattle with his wife and six kids.
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 157
    • duration 17:29:31
    • English subtitles has
    • Release Date 2023/06/16

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security

    Courses related to Linux

    Courses related to Linux Administration