وب سایت تخصصی شرکت فرین
دسته بندی دوره ها

LPI Security Essentials (020-100) Complete Course & Exam

سرفصل های دوره

Pass the LPI Security Essentials (020-100) exam on your 1st attempt, includes a full-length practice exam!


01 - Introduction
  • 001 Introduction
  • 002 Download the Study Guide.html
  • 002 LPI-Security-Essentials-Study-Guide.pdf
  • 003 Exam Tips
  • 004 100% Pass Guarantee

  • 02 - Overview of Security
  • 001 Overview of Security (OBJ 1.1)
  • 002 CIA Triad (OBJ 1.1)
  • 003 AAA of Security (OBJ 1.1)
  • 004 Security Threats (OBJ 1.1)
  • 005 Mitigating Threats (OBJ 1.1)
  • 006 Threat Actors (OBJ 1.1)
  • 007 Common Security Roles (OBJ 1.1)
  • 008 MITRE ATT&CK Framework (OBJ 1.1)

  • 03 - Risk Management
  • 001 Risk Management (OBJ 1.2)
  • 002 Risk Assessment (OBJ 1.2)
  • 003 Methodologies (OBJ 1.2)
  • 004 Security Controls (OBJ 1.2)
  • 005 Vulnerability Assessments (OBJ 1.2)
  • 006 Penetration Testing (OBJ 1.2)
  • 007 Common Vulnerability Identifiers (OBJ 1.2)
  • 008 Vulnerability Reports (OBJ 1.2)
  • 009 Zero-day Vulnerabilities (OBJ 1.2)
  • 010 Execution and Escalation Attacks (OBJ 1.2)
  • 011 Incident Response Process (OBJ 1.2)

  • 04 - Ethical Behavior
  • 001 Ethical Behavior (OBJ 1.3 & 5.2)
  • 002 Computer Security Laws (OBJ 1.3)
  • 003 Legal Requirements (OBJ 1.3)
  • 004 Bug Bounties (OBJ 1.3 & 5.2)
  • 005 Copyright Laws (OBJ 1.3)
  • 006 Confidential Information (OBJ 1.3 & 5.2)
  • 007 Errors and Outages (OBJ 1.3)
  • 008 AWS Outage Case Study (OBJ 1.3)

  • 05 - Malware
  • 001 Malware (OBJ 3.3 & 4.2)
  • 002 Viruses, Worms, and Trojans (OBJ 3.3)
  • 003 Ransomware (OBJ 3.3)
  • 004 Spyware (OBJ 3.3)
  • 005 Rootkits (OBJ 3.3)
  • 006 Botnets and Zombies (OBJ 3.3 & 4.2)
  • 007 Backdoors and Logic Bombs (OBJ 3.3)
  • 008 Symptoms of Infections (OBJ 3.3)
  • 009 Removing Malware (OBJ 3.3)
  • 010 Preventing Malware (OBJ 3.3)
  • 011 Viruses and Trojans in Action (OBJ 3.3)

  • 06 - Social Engineering
  • 001 Social Engineering (OBJ 5.2)
  • 002 Phishing (OBJ 5.2)
  • 003 Spam (OBJ 5.2)
  • 004 Filtering Spam (OBJ 5.2)
  • 005 Impersonation (OBJ 5.2)
  • 006 Pretexting (OBJ 5.2)
  • 007 Social Engineering Attacks (OBJ 5.2)
  • 008 Frauds, Scams, and Hoaxes (OBJ 5.2)
  • 009 Evil Twin (OBJ 5.2)
  • 010 User Education (OBJ 5.2)
  • 011 Anti-phishing Training (OBJ 5.2)

  • 07 - Hardware Security
  • 001 Hardware Security (OBJ 3.1)
  • 002 Hardware Components (OBJ 3.1)
  • 003 Smart Devices and IoT (OBJ 3.1)
  • 004 Trusted Computing (OBJ 3.1)
  • 005 USB Devices (OBJ 3.1)
  • 006 Bluetooth Devices (OBJ 3.1)
  • 007 RFID Devices (OBJ 3.1)

  • 08 - Application Security
  • 001 Application Security (OBJ 3.2)
  • 002 Types of Software (OBJ 3.2)
  • 003 Installing Applications (OBJ 3.2)
  • 004 Mobile Application Risks (OBJ 3.2)
  • 005 Updating Applications (OBJ 3.2)
  • 006 Buffer Overflows (OBJ 3.2)
  • 007 Security Applications (OBJ 3.2)
  • 008 Buffer Overflow Attack (OBJ 3.2)
  • 009 SQL Injections (OBJ 3.2)

  • 09 - Networks
  • 001 Networks (OBJ 4.1)
  • 002 Networking Hardware (OBJ 4.1)
  • 003 The OSI Model (OBJ 4.1)
  • 004 The TCPIP Model (OBJ 4.1)
  • 005 TCP and UDP (OBJ 4.1)
  • 006 Switches and Routers (OBJ 4.1)
  • 007 IPv4 (OBJ 4.1)
  • 008 Assigning IPv4 Addresses (OBJ 4.1)
  • 009 Data Transfer Over Networks (OBJ 4.1)
  • 010 Network Routing (OBJ 4.1)
  • 011 DNS (OBJ 4.1)
  • 012 IPv6 (OBJ 4.1)
  • 013 Internet Service Providers (OBJ 4.1)

  • 10 - Network Security
  • 001 Network Security (OBJ 4.2)
  • 002 Wired Network Security (OBJ 4.2)
  • 003 Network Access Control (NAC) (OBJ 4.2)
  • 004 Wireless Networks (OBJ 4.2)
  • 005 Wireless Encryption (OBJ 4.2)
  • 006 Wireless Security (OBJ 4.2)
  • 007 Traffic Interception (OBJ 4.2)
  • 008 DoS and DDoS (OBJ 4.2)
  • 009 Configuring SOHO Networks (OBJ 4.2)
  • 010 Configuring Wireless Networks (OBJ 4.2)

  • 11 - Cloud Computing
  • 001 Cloud Computing (OBJ 4.1 & 5.2)
  • 002 Cloud Characteristics (OBJ 4.1)
  • 003 SaaS (OBJ 4.1)
  • 004 IaaS (OBJ 4.1)
  • 005 PaaS (OBJ 4.1)
  • 006 Deployment Models (OBJ 4.1)
  • 007 Shared Responsibility Model (OBJ 4.1)
  • 008 Cloud Threats and Vulnerabilities (OBJ 4.1)
  • 009 Security in the Cloud (OBJ 4.1)

  • 12 - Cryptography
  • 001 Cryptography (OBJ 2.1)
  • 002 Symmetric vs Asymmetric (OBJ 2.1)
  • 003 Symmetric Algorithms (OBJ 2.1)
  • 004 Asymmetric Algorithms (OBJ 2.1)
  • 005 Public Key Infrastructure (OBJ 2.1)
  • 006 Digital Certificates (OBJ 2.1)
  • 007 Examining Digital Certificates (OBJ 2.1)
  • 008 Certificate Revocation (OBJ 2.1)
  • 009 Perfect Forward Secrecy (OBJ 2.1)
  • 010 Hashing (OBJ 2.1)
  • 011 Using Hashing (OBJ 2.1)
  • 012 Hashing Security and Attacks (OBJ 2.1)

  • 13 - Applied Cryptography
  • 001 Applied Cryptography (OBJ 2.2, 2.3, & 2.4)
  • 002 Web Encryption (OBJ 2.2, 2.3, & 2.4)
  • 003 X.509 Certificates (OBJ 2.2, 2.3, & 2.4)
  • 004 Email Encryption and Signatures (OBJ 2.2, 2.3, & 2.4)
  • 005 OpenPGP (OBJ 2.2, 2.3, & 2.4)
  • 006 SMIME (OBJ 2.2, 2.3, & 2.4)
  • 007 Send and Receive Encrypted Emails (OBJ 2.2, 2.3, & 2.4)
  • 008 Storage Encryption (OBJ 2.2, 2.3, & 2.4)
  • 009 BitLocker (OBJ 2.2, 2.3, & 2.4)
  • 010 VeraCrypt (OBJ 2.2, 2.3, & 2.4)

  • 14 - Data Availability
  • 001 Data Availability (OBJ 3.4)
  • 002 Cryptomator (OBJ 2.2, 2.3, & 2.4)
  • 003 Backup and Recovery (OBJ 3.4)
  • 004 Backup and Recovery Methods (OBJ 3.4)
  • 005 Backup Schemes (OBJ 3.4)
  • 006 Security for Backups (OBJ 3.4)
  • 007 Retention Requirements (OBJ 3.4)
  • 008 Cloud-based File Storage (OBJ 3.4)

  • 15 - Authentication and Authorization
  • 001 Authentication and Authorization (OBJ 5.1)
  • 002 Password Best Practices (OBJ 5.1)
  • 003 Password Cracking (OBJ 5.1)
  • 004 Password Managers (OBJ 5.1)
  • 005 Single Sign-On (SSO) (OBJ 5.1)
  • 006 Multifactor Authentication (MFA) (OBJ 5.1)
  • 007 Passwordless Authentication (OBJ 5.1)
  • 008 Online Password Storage (OBJ 5.1)
  • 009 Password Leaks (OBJ 5.1)

  • 16 - Anonymity
  • 001 Anonymity (OBJ 4.3)
  • 002 Virtual Private Networks (VPNs) (OBJ 4.3)
  • 003 End-to-End Encryption (OBJ 4.3)
  • 004 Transfer Encryption (OBJ 4.3)
  • 005 Anonymity and Recognition (OBJ 4.3)
  • 006 Proxy Servers (OBJ 4.3)
  • 007 TOR (OBJ 4.3)
  • 008 The Darknet (OBJ 4.3)
  • 009 Cryptocurrencies (OBJ 4.3)

  • 17 - Protecting Your Privacy
  • 001 Protecting Your Privacy (OBJ 5.3)
  • 002 Personally Identifiable Information (PII) (OBJ 5.3)
  • 003 Threats to Personal Information (OBJ 5.3)
  • 004 User Tracking (OBJ 5.3)
  • 005 Script Blockers and Ad Blockers (OBJ 5.3)
  • 006 Profile Privacy Settings (OBJ 5.3)
  • 007 Stalking and Cybermobbing (OBJ 5.3)

  • 18 - Conclusion
  • 001 Conclusion
  • 002 BONUS Where do I go from here
  • 139,000 تومان
    بیش از یک محصول به صورت دانلودی میخواهید؟ محصول را به سبد خرید اضافه کنید.
    افزودن به سبد خرید
    خرید دانلودی فوری

    در این روش نیاز به افزودن محصول به سبد خرید و تکمیل اطلاعات نیست و شما پس از وارد کردن ایمیل خود و طی کردن مراحل پرداخت لینک های دریافت محصولات را در ایمیل خود دریافت خواهید کرد.

    ایمیل شما:
    تولید کننده:
    شناسه: 14750
    حجم: 6457 مگابایت
    مدت زمان: 1050 دقیقه
    تاریخ انتشار: ۲۹ خرداد ۱۴۰۲
    طراحی سایت و خدمات سئو

    139,000 تومان
    افزودن به سبد خرید