CBT Nuggets – Linux Professional Institute Security Essentials (020-100)

دوره آموزشی CBT Nuggets – Linux Professional Institute Security Essentials (020-100) متخصصان امنیت سایبری را برای پیاده سازی بهترین شیوه ها در نگهداری امنیت، شناسایی آسیب پذیری ها و واکنش موثر به حوادث در زیرساخت های فناوری اطلاعات مبتنی بر لینوکس آماده می کند. اگر می خواهید شغلی در امنیت سایبری داشته باشید، باید در نهایت برای تسلط بر امنیت لینوکس برنامه ریزی کنید. سیستم عامل لینوکس در شبکه‌های سراسر جهان وجود دارد – گاهی اوقات کل شبکه‌ها را تغذیه می‌کند و گاهی اوقات دستگاه‌های جداگانه را اجرا می‌کند. این یک مهارت اساسی یک متخصص امنیت است که نکات امنیتی لینوکس را بداند و این دقیقاً چیزی است که این دوره به شما می دهد. شما اصول اولیه امنیت سایبری را که در هر محیطی اعمال می شود، و همچنین تکنیک ها و ابزارهایی را که مخصوص محیط های لینوکس هستند، یاد خواهید گرفت. LPI Security Essentials یک شروع عالی برای یک حرفه در امنیت سایبری است و این دوره شما را برای آن در سریع ترین روش ممکن آماده می کند. پس از تکمیل این آموزش لینوکس، می‌دانید که چگونه بهترین شیوه‌ها را در نگهداری امنیت پیاده‌سازی کنید، آسیب‌پذیری‌ها را شناسایی کنید و به حوادث در زیرساخت‌های فناوری اطلاعات مبتنی بر لینوکس پاسخ مؤثری دهید.

لینک دانلود دوره آموزشی CBT Nuggets – Linux Professional Institute Security Essentials (020-100)

حجم: 34 گیگابایت
دانلود – بخش اول
دانلود – بخش دوم
دانلود – بخش سوم
دانلود – بخش چهارم
دانلود – بخش پنجم
دانلود – بخش ششم
دانلود – بخش هفتم
دانلود – بخش هشتم
دانلود – بخش نهم
دانلود – بخش دهم
دانلود – بخش یازدهم
دانلود – بخش دوازدهم
دانلود – بخش سیزدهم
دانلود – بخش چهاردهم
دانلود – بخش پانزدهم
دانلود – بخش شانزدهم
دانلود – بخش هفدهم
دانلود – بخش هیجدهم
دانلود – بخش نوزدهم
دانلود – بخش  بیستم
دانلود – بخش بیست یکم
دانلود – بخش بیست دوم
دانلود – بخش بیست سوم
دانلود – بخش بیست چهارم
دانلود – بخش بیست پنجم
دانلود – بخش بیست ششم
دانلود – بخش بیست هفتم
دانلود – بخش بیست هشتم
دانلود – بخش بیست نهم
دانلود – بخش سی ام
دانلود – بخش سی و یکم
دانلود – بخش سی و دوم
دانلود – بخش سی و سوم
دانلود – بخش سی و چهارم

Date: 2024
Videos: 166
By: James Conrad
Duration: 21 HOURS
Publisher: CBT Nuggets
Format: Video MP4 + Subtitle

This entry-level Linux Professional Institute Security Essentials (020-100) training prepares cybersecurity professionals to implement best practices in security maintenance, identify vulnerabilities, and respond effectively to incidents in Linux-based IT infrastructures.

If you want a career in cybersecurity, you should plan on eventually mastering Linux security. The Linux operating system or permutations of it exist on networks all over the world — sometimes powering entire networks and other times running individual devices. It’s a fundamental skill of a security professional to know the ins and outs of Linux security, and that’s exactly what this course gives you.

You’ll learn the basics of cybersecurity that apply in any environment, as well as the techniques and tools that are particular to Linux environments. The LPI Security Essentials is an excellent start for a career in cybersecurity, and this course will prepare you for it in the fastest way possible.

After completing this Linux training you’ll know how to implement best practices in security maintenance, identify vulnerabilities, and respond effectively to incidents in Linux-based IT infrastructures.

For anyone who manages their Linux training, this Linux training can be used to onboard new cybersecurity professionals, curated into individual or team training plans, or as a Linux reference resource.

Linux Professional Institute Security Essentials (020-100): What You Need to Know

This Linux Professional Institute Security Essentials (020-100) training has videos that cover topics such as:

  • Understanding the theoretical fundamentals of network security
  • Securing and configuring Linux systems and devices running Linux
  • Monitoring systems and networks for unusual or malicious activity
  • Responding to and reporting incidents
  • Managing secure network communications

Who Should Take Linux Professional Institute Security Essentials (020-100) Training?

This Linux Professional Institute Security Essentials (020-100) training is considered entry-level Linux training, which means it was designed for cybersecurity professionals. This basic security essentials skills course is valuable for new IT professionals with at least a year of experience with cybersecurity and experienced cybersecurity professionals looking to validate their Linux skills.

New or aspiring cybersecurity professionals. At the start of your cybersecurity career, you have to make some hard choices about where to invest your time and money while learning systems and technologies. This course is an obvious choice because it covers general and foundational knowledge without getting too in the weeds, and Linux is used on networks of all sizes all over the world.

Experienced cybersecurity professionals. If you plan on continuing your cybersecurity career, earning the LPI Security Essentials certification is an excellent way to demonstrate commitment to global standards and professionalism. Your previous experience will prepare you for most of what you’ll find on the 020-100, but this course will quickly round out any rough patches and prepare you for the cert.

Skill:
Goals, Roles, and Actors
1. Course Introduction
5 mins
2. IT Goal: Making Resources Available
6 mins
3. IT Goal: Making Resources Secure
11 mins
4. Four Pillars of Security
8 mins
5. Common Hacker Goals
6 mins
6. Types of Hackers
6 mins
Skill:
Risk Assessment and Management
1. Understanding How Vulnerabilities Execute
1 min
2. Privilege Escalation
10 mins
3. Privilege Escalation Demo
10 mins
4. Untargeted Attacks and Advanced Persistent Threats (APT)
1 min
5. Penetration Testing
5 mins
6. Penetration Testing
7. ISMS, IRPs, and CERT
10 mins
8. Untargeted Attacks and Advanced Persistent Threats (APT)
1 min
9. Use CVE and CERT to Research Risks
1 min
10. Penetration Testing
11. Untargeted Attacks and Advanced Persistent Threats (APT)
12 mins
12. Bonus: Drive-By Malware in Action
4 mins
Skill:
Ethical Behavior
1. Intro: IT Access and Responsibility
9 mins
2. Case Study: Edward Snowden
7 mins
3. Personal and Private Data
10 mins
4. Regulatory Compliance
8 mins
5. Example of Data Breach Disclosure
4 mins
6. Handling Potentially Illegal Information
5 mins
Skill:
Implement Encryption
1. Describe Encryption and its Use
7 mins
2. Encrypt Data at Rest
18 mins
3. Encrypt Data in Transit
13 mins
4. Data in Use
13 mins
Skill:
Encryption Types and Protocols
1. The Symmetric Encryption Concept
6 mins
2. The Case for Symmetric Encryption
9 mins
3. Symmetric Encryption Details
10 mins
4. Symmetric Encryption Algorithms
5 mins
5. Asymmetric Encryption
6 mins
6. Perfect Forward Secrecy
2 mins
7. RSA and ECC Encryption Algorithms
4 mins
Skill:
Public Key Infrastructure (PKI)
1. Understanding PKI Operation
11 mins
2. Identifying and Extracting a Web Cert
7 mins
3. Handling Untrusted Certificates
10 mins
4. Certificate Signing Requests
17 mins
Skill:
X.509, Web Certificates, and Hashing
1. Obtaining and Using Web Certificates
10 mins
2. How SSL/TLS Operate
9 mins
3. Hash Data
15 mins
4. Compare Hashing and Encryption
3 mins
Skill:
Email Encryption and Signatures
1. PGP and GPG Overview
5 mins
2. Configure Thunderbird for OpenPGP
16 mins
3. Encrypt and Sign Email with PGP
11 mins
4. Encrypt and Sign Email with S/MIME
9 mins
5. Encryption and Gmail
3 mins
Skill:
Intro to PC Hardware
1. Motherboard Overview
10 mins
2. Motherboard Diagram
3 mins
3. Motherboard Form Factors and BIOS
8 mins
4. Processors
13 mins
5. Memory (RAM)
8 mins
6. Hard Disk Drive Physical Characteristics
4 mins
7. Solid State Drive Characteristics
7 mins
8. Peripherals and Other Miscellaneous Devices
6 mins
Skill:
Application and OS Sources
1. Firmware and its Risks
11 mins
2. Mobile Software
7 mins
3. Jailbreaking, Rooting, and the Risks
10 mins
4. Securing Applications and Operating Systems
9 mins
5. Protection via Isolation
10 mins
6. Protection via Isolation
10 mins
Skill:
Updates, Common Vulnerabilities, and Firewalls
1. Update Mobile Devices
6 mins
2. Update Linux Devices
9 mins
3. Update Windows
6 mins
4. Buffer Overflow
5 mins
5. SQL Injection
5 mins
6. Implement Local Packet Filters
1 min
7. Implement Firewall Protection
17 mins
8. Implement Application Layer Firewalls
1 min
9. Implement Endpoint Firewalls
1 min
Skill:
Malware
1. Common Types of Malware Part 1
9 mins
2. Common Types of Malware Part 2
10 mins
3. Camera, Microphone Hijacking
4 mins
4. Symptoms of Malware
8 mins
5. Understanding Virus and Malware Scanners
19 mins
Skill:
Data Availability
1. Understand the Importance of Backups
9 mins
2. Recovery Point Objective and Recovery Time Objective
6 mins
3. Backup Location Strategy
6 mins
4. Backup Type: Full
3 mins
5. Backup Type: Differential
6 mins
6. Backup Type: Incremental
5 mins
7. Backup Media and Drives
8 mins
8. Backup Security
5 mins
9. Backup Solutions
11 mins
10. Understanding of data storage, access, and sharing in cloud services
9 mins
Skill:
Networks and the Internet
1. Network Equipment
12 mins
2. IP Basics
9 mins
3. Binary Subnet Masks
9 mins
4. Classful Subnet Masks and Private IP Addresses
4 mins
5. Routing Network Traffic
4 mins
6. Switch Traffic
5 mins
Skill:
Protocols and Vulnerabilities
1. TCP and UDP Vulnerabilities
22 mins
2. TCP and UDP Ports
6 mins
3. Other Common Protocol Vulnerabilities
12 mins
Skill:
DHCP, DNS, IPv6, and Cloud Computing
1. Introduction
1 min
2. Understanding DHCP
12 mins
3. Understanding DNS
8 mins
4. Forward and Reverse DNS
8 mins
5. IPv6 Addresses
6 mins
6. Understanding the Cloud
9 mins
7. A Quick Tour of Azure
9 mins
8. The Cloud – It’s Not Just in the Sky!
1 min
9. IaaS, PaaS, and SaaS
8 mins
Skill:
Wireless Networking
1. Configure WiFi Security
17 mins
2. Understand Implications of Link-Layer Access
3 mins
Skill:
Network Encryption and Anonymity
1. Common VPN Features
8 mins
2. Proxy Servers
6 mins
3. The Onion Router (TOR)
13 mins
Skill:
Principles of Digital Identity
1. Authentication
16 mins
2. Using a Security Key
7 mins
3. Security Questions and Account Recovery Tools
9 mins
4. Authorization and Accounting
1 min
Skill:
Passwords
1. Password Practices to Avoid
10 mins
2. Password Best Practices
9 mins
3. How Passwords are Stored
12 mins
4. Common Attacks Against Passwords
9 mins
5. Password Leaks
2 mins
6. Using a Password Manager
8 mins
Skill:
Confidentiality and Secure Communication
1. The Email & Marketing Landscape
8 mins
2. Spam and its Impact
7 mins
3. Spam Filters
10 mins
4. Handling Attachments and Links
9 mins
5. Advantages of Messaging Apps
4 mins
6. Social Media Messaging
4 mins
7. E2EE Messaging Apps
5 mins
Skill:
Social Engineering and Handling Information
1. Introduction to Social Engineering
6 mins
2. Social Engineering Psychology
12 mins
3. Social Engineering Attacks
14 mins
4. Social Engineering Improvements, and Protection
7 mins
5. Data Classification and NDAs
4 mins
Skill:
Privacy Protection

دیدگاه

آدرس ایمیل شما منتشر نخواهد شد.