Linux Professional Institute (LPI) Training

Get training from experts. Get certified.

Contact Us

LPI Security Essentials Training

The Security Essentials training course is designed to provide end users and power users with the knowledge and skills necessary to identify and respond to security threats. The course covers a wide range of topics related to cyber security, including security concepts, encryption, node, device and storage security, network and service security, identity and privacy.

Cybersecurity Awareness Training for Compliance

The course is intended to be part of a comprehensive cyber security awareness program. It provides participants with a foundational understanding of key security concepts and techniques, which they can then apply to their daily use of digital infrastructure. By the end of the course, participants should be able to identify potential security risks, understand how to protect their data, and know how to respond to security threats.

The course covers a range of topics, from the basics of IT security to more advanced topics such as encryption and network security. It also provides participants with practical guidance on how to protect their personal information and use digital infrastructure safely and securely. Overall, the Security Essentials training course is an important component of any cyber security awareness program and can help organizations to better protect themselves against cyber threats.

Security Essentials Course Outline

  • Topic 021: Security Concepts
     
    • 021.1 Goals, Roles and Actors

      The candidate will learn the importance of IT security. This includes an understanding of essential security goals as well as understanding various actors and roles in the field of IT security.
       
    • 021.2 Risk Assessment and Management

      The candidate learn how to find and interpret relevant security information. This includes understanding the risk of a vulnerability and determining the need, urgency and appropriateness for a reaction.
       
    • 021.3 Ethical Behavior

      The candidate will understand the technical, financial and legal implications of their behaviour when using the digital infrastructure. This includes understanding the potential harm caused by using security tools. Furthermore, the candidate should understand common principles in copyright and privacy laws.
       
  • Topic 022: Encryption
     
    • 022.1 Cryptography Public Key Infrastructure

      The candidate should understand the principle of symmetric and asymmetric encryption. Furthermore, the candidate should understand how digital certificates are used to associate cryptographic keys with individual persons and organizations.
       
    • 022.2 Web Encryption

      The candidate should understand the principle of HTTPS. This includes verifying the identity of existing websites and understanding common browser error messages
       
    • 022.3 Email Encryption

      The candidate should understand the principle of OpenGPG and S/MIME for email encryption. This includes handling one’s own and foreign OpenGPG keys and S/MIME certificates as well as sending and receiving encrypted emails.
       
    • 022.4 Data Storage Encryption

      The candidate should understand the principles of file encryption, storage media encryption. Furthermore, the candidate should be able to encrypt data stored on local storage devices and in the cloud.
       
  • Topic 023: Node, Device and Storage Security
     
    • 023.1 Hardware Security

      The candidate should understand security aspects of hardware. This includes understanding the various types of computer devices as well as their major components. Furthermore, the candidate should understand the security implications of various devices that interact with a computer.
       
    • 023.2 Application Security

      The candidate should understand the security aspects of software. This includes managing software updates, protecting software from remote access and understanding how to security install software.
       
    • 023.3 Malware

      The candidate should understand the principle of various types of malware. This includes an understanding of how they are installed on a device, what effects they cause and how to protect against malware.
       
    • 023.4 Data Availability

      The candidate should be able to ensure the availability of their data. This includes storing data in appropriate devices and services and creating backups.
       
  • Topic 024: Network and Service Security
     
    • 024.1 Networks, Network Services and the Internet

      The candidate should understand how devices are connected to a local network and which threats result from physical media access. Furthermore, candidates should be able to connect to a wireless network securely.
       
    • 024.2 Network and Internet Security

      The candidate should understand how devices are connected to a local network and which threats result from physical media access. Furthermore, candidates should be able to connect securely to a wireless network.
       
    • 024.3 Network Encryption and Anonymity

      The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand the anonymity of the Internet and TOR.

  • Topic 025: Identity and Privacy
     
    • 025.1 Identity and Authentication

      The candidate should understand various concepts on how to prove their identity when using services on the internet. This includes using a password manager and multi-factor authentication as well as being aware of common threats against individual identities.
       
    • 025.2 Information Confidentiality and Secure Communication

      The candidate should be able to keep confidential information as well as communication contents secret. This includes recognizing attempts of Phishing and social engineering, as well as using secret and safe ways of communication.
       
    • 024.3 Network Encryption and Anonymity

      The candidate should understand the principle of virtual private networks. This includes using a VPN provider to encrypt transmitted data. Candidates should understand about the anonymity of the Internet and TOR.

Contact Us

Please contact us for any queries via phone or our contact form. We will be happy to answer your questions.

3 Appian Place,373 Kent Ave
Ferndale,
2194 South Africa
Tel: +2711-781 8014 (Johannesburg)
  +2721-020-0111 (Cape Town)
ZA

Contact Form

contactform.caption

Contact Form