Learn how to protect your data and reputation
Exam Name | LPI Security Essentials |
Exam Code | 020-100 |
Exam Price | $120 (USD) |
Duration | 60 mins |
Number of Questions | 40 |
Passing Score | 500 / 800 |
Sample Questions | LPI Security Essentials Sample Questions |
Practice Exam | LPI 020-100 Certification Practice Exam |
LPI 020-100 Exam Syllabus Topics:
Topic | Details |
Security Concepts | |
Goals, Roles and Actors |
Weight: 1 Description: The candidate should understand the importance of IT security. This includes understanding of essential security goals as well as understanding various actors and roles in the field of IT security. Key Knowledge Areas: ◉ Understanding of the importance of IT security Partial list of the used files, terms, and utilities: ◉ Confidentiality, integrity, availability, non-repudiation |
Risk Assessment and Management |
Weight: 2 Description: The candidate should understand how to find and interpret relevant security information. This includes understanding the risk of a security vulnerability and determining the need and urgency for a reaction. Key Knowledge Areas: ◉ Know common sources for security information Partial list of the used files, terms, and utilities: ◉ Common Vulnerabilities and Exposures (CVE) |
Ethical Behavior |
Weight: 2 Description: The candidate should understand the technical, financial, and legal implications of their behavior when using digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common concepts in copyright and privacy laws. Key Knowledge Areas: ◉ Understanding the implications for others of actions taken related to security Partial list of the used files, terms, and utilities: ◉ Responsible Disclosure and Full Disclosure |
Encryption | |
Cryptography and Public Key Infrastructure |
Weight: 3 Description: The candidate should understand the concepts of symmetric and asymmetric encryption as well as other types of commonly used cryptographic algorithms. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations. Key Knowledge Areas: ◉ Understanding of the concepts of symmetric, asymmetric, and hybrid cryptography Partial list of the used files, terms, and utilities: ◉ Public Key Infrastructures (PKI) |
Web Encryption |
Weight: 2 Description: The candidate should understand the concepts of HTTPS. This includes verifying the identity of web servers and understanding common browser error messages related to security. Key Knowledge Areas: ◉ Understanding of the major differences between plain text protocols and transport encryption Partial list of the used files, terms, and utilities: ◉ HTTPS, TLS, SSL |
Email Encryption |
Weight: 2 Description: The candidate should understand the concepts of OpenPGP and S/MIME for email encryption. This includes handling OpenPGP keys and S/MIME certificates as well as sending and receiving encrypted emails. Key Knowledge Areas: ◉ Understanding of email encryption and email signatures Partial list of the used files, terms, and utilities: ◉ GnuPGP, GPG keys, key servers |
Data Storage Encryption |
Weight: 2 Description: The candidate should understand the concepts of file encryption and storage device encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud. Key Knowledge Areas: ◉ Understanding of the concepts of data, file, and storage device encryption Partial list of used files, terms, and utilities: ◉ VeraCrypt |
Device and Storage Security | |
Hardware Security |
Weight: 2 Description: The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer as well as the security implications of physical access to a device. Key Knowledge Areas: ◉ Understanding of the major components of a computer Partial list of used files, terms, and utilities: ◉ Processors, memory, storage, network adapters |
Application Security |
Weight: 2 Description: The candidate should understand the security aspects of software. This includes securely installing software, managing software updates, and protecting software from unintended network connections. Key Knowledge Areas: ◉ Understanding of common types of software Partial list of used files, terms, and utilities: ◉ Firmware, operating systems, applications |
Malware |
Weight: 3 Description: The candidate should understand the various types of malware. This includes understanding of how they are installed on a device, what effects they cause, and how to protect against malware. Key Knowledge Areas: ◉ Understanding of common types of malware Partial list of used files, terms, and utilities: ◉ Viruses, ransomware, trojan malware, adware, cryptominers |
Data Availability |
Weight: 2 Description: The candidate should understand how to ensure the availability of their data. This includes storing data on appropriate devices and services as well as creating backups. Key Knowledge Areas: ◉ Understanding of the importance of backups Partial list of used files, terms, and utilities: ◉ Full, differential and incremental backups |
Network and Service Security | |
Networks, Network Services and the Internet |
Weight: 4 Description: The candidate should understand the concepts of computer networks and the Internet. This includes basic knowledge of various network media types, addressing, routing, and packet forwarding as well as understanding of the most important protocols used in the Internet. Key Knowledge Areas: ◉ Understanding of the various types of network media and network devices Partial list of used files, terms, and utilities: ◉ Wired networks, WiFi networks, cellular networks |
Network and Internet Security |
Weight: 3 Description: The candidate should understand common security aspects of using networks and the Internet. This includes understanding of common security threats against networks and networked computers, approaches for mitigation, as well as the ability to securely connect to a wired or wireless network. Key Knowledge Areas: ◉ Understanding of the implications of link layer access Partial list of the used files, terms, and utilities: ◉ Link layer |
Network Encryption and Anonymity |
Weight: 3 Description: The candidate should understand the concepts of virtual private networks (VPN). This includes using a VPN provider to encrypt transmitted data. Candidates should understand recognition and anonymity concepts when using the Internet as well as anonymization tools, such as TOR. Key Knowledge Areas: ◉ Understanding of virtual private networks (VPN) Partial list of used files, terms, and utilities: ◉ Virtual Private Network (VPN) |
Identity and Privacy | |
Identity and Authentication |
Weight: 3 Description: The candidate should understand common concepts on how to prove their identity when using online services. This includes using a password manager, multi-factor authentication, and single sign-on, as well as being aware of common security threats regarding individual identities. Key Knowledge Areas: ◉ Understanding of the concepts of digital identities. Partial list of used files, terms, and utilities: ◉ Online and offline password managers |
Information Confidentiality and Secure Communication |
Weight: 2 Description: The candidate should understand how to keep confidential information secret and ensure the confidentiality of digital communication. This includes recognizing attempts of phishing and social engineering, as well as using secure means of communication. Key Knowledge Areas: ◉ Understanding the implications and risks of data leaks and intercepted communication Partial list of the used files, terms, and utilities: ◉ Phishing and social engineering |
Privacy Protection |
Weight: 2 Description: The candidate should understand the importance of the confidentiality of personal information. This includes managing privacy settings in various online services and social media as well as being aware of common security threats regarding personal information. Key Knowledge Areas: ◉ Understanding of the importance of personal information Partial list of the used files, terms, and utilities: ◉ Stalking and cybermobbing |
0 comments:
Post a Comment