Linux Professional Institute (LPI) Security Essentials certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the common security threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.
The Security Essentials training course help in gaining the knowledge and skills necessary to identify and respond to security threats. The course covers a wide range of topics related to cyber security, including security concepts, encryption, node, device and storage security, network and service security, identity and privacy.
021 Security Concepts
021.1 Goals, Roles and Actors
Description: The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
021.2 Risk Assessment and Management
Description: The candidate should understand how to find and interpret relevant security information. This includes understanding the risk of a security vulnerability and determining the need and urgency for a reaction.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
021.3 Ethical Behavior
Description: The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022 Encryption
022.1 Cryptography and Public Key Infrastructure
Description: The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022.2 Web Encryption
Description: The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022.3 Email Encryption
Description: The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022.4 Data Storage Encryption (weight: 2)
Description: The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023 Device and Storage Security
023.1 Hardware Security
Description: The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023.2 Application Security
Description: The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023.3 Malware
Description: The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023.4 Data Availability
Description: The candidate should understand how to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.
Key Knowledge Areas:
Partial list of used files, terms, and utilities
024 Network and Service Security
024.1 Networks, Network Services and the Internet (weight: 4)
Description: The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
024.2 Network and Internet Security
Description: The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common security threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
024.3 Network Encryption and Anonymity (weight: 3)
Description: The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
025 Identity and Privacy
025.1 Identity and Authentication
Description: The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
025.2 Information Confidentiality and Secure Communication
Description: The candidate should understand how to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
025.3 Privacy Protection
Description: The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common security threats regarding personal information.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
Linux Professional Institute (LPI) Security Essentials certificate covers a basic knowledge of IT security. The focus is the digital self-defense for an individual user. This includes a general understanding of the common security threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them.
The Security Essentials training course help in gaining the knowledge and skills necessary to identify and respond to security threats. The course covers a wide range of topics related to cyber security, including security concepts, encryption, node, device and storage security, network and service security, identity and privacy.
021 Security Concepts
021.1 Goals, Roles and Actors
Description: The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
021.2 Risk Assessment and Management
Description: The candidate should understand how to find and interpret relevant security information. This includes understanding the risk of a security vulnerability and determining the need and urgency for a reaction.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
021.3 Ethical Behavior
Description: The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022 Encryption
022.1 Cryptography and Public Key Infrastructure
Description: The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022.2 Web Encryption
Description: The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022.3 Email Encryption
Description: The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
022.4 Data Storage Encryption (weight: 2)
Description: The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023 Device and Storage Security
023.1 Hardware Security
Description: The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023.2 Application Security
Description: The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023.3 Malware
Description: The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
023.4 Data Availability
Description: The candidate should understand how to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups.
Key Knowledge Areas:
Partial list of used files, terms, and utilities
024 Network and Service Security
024.1 Networks, Network Services and the Internet (weight: 4)
Description: The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
024.2 Network and Internet Security
Description: The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common security threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
024.3 Network Encryption and Anonymity (weight: 3)
Description: The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
025 Identity and Privacy
025.1 Identity and Authentication
Description: The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities.
Key Knowledge Areas:
Partial list of used files, terms, and utilities:
025.2 Information Confidentiality and Secure Communication
Description: The candidate should understand how to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities:
025.3 Privacy Protection
Description: The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common security threats regarding personal information.
Key Knowledge Areas:
Partial list of the used files, terms, and utilities: