LPI Announces IT Security Essentials Certification


This certification covers preliminary knowledge of IT security topics.

The Linux Professional Institute (LPI) has announced the new LPI Security Essentials certification, covering preliminary knowledge in all important fields of IT security.

This certification is intended for those who have completed a first course in IT security, for professionals who want to improve their security skills, and “for anyone who wants to attain a basic competence in the secure use of email, websites, social media, and the devices they use every day,” the announcement says.

To obtain the LPI Security Essentials certificate, candidates must, for example:

  • Have a basic understanding of common security threats of using computers, networks, connected devices, and IT services on premises and in the cloud 
  • Understand common ways to prevent and mitigate attacks against their personal devices and data
  • Be able to use encryption to secure data transferred through a network and stored on storage devices and in the cloud

“The exam objectives cover a comprehensive range of topics, including typical IT security fields like encryption and data security, but also rather uncommon topics like aspects of privacy and the secure use of social media,” says Fabian Thorns, Director of Product Development at LPI.



Related content

  • News for Admins
    In the news: NIST Updates Cybersecurity Framework; Poor Cloud Security Practices Put Organizations at Risk; ORNL and NOAA Launch New Supercomputer for Climate Research; DOE Envisions New High Performance Data Facility; VMware Updates Tanzu with New Security Features; Microsoft Launches AI-Powered Security Copilot; IBM Deploys First Quantum Computer Dedicated to Healthcare Research; LPI Announces IT Security Essentials Certification
  • Public key infrastructure in the cloud
    A public key infrastructure in the cloud for secure digital communication maintains the security of an on-premises solution and reduces complexity.
  • Microsoft Offers New Cybersecurity Architect Expert Certification
  • Secure SSH connections the right way
    Admins use SSH, the proverbial Swiss army knife of system management, for many of their daily tasks, but no matter how powerful the tool might be, it typically does not offer adequate protection. We look at ways to tighten SSH security.
  • Windows security with public key infrastructures
    A rarely used feature for improving security in Windows environments relies on certificates issued for various applications, services, and procedures that is based on a public key infrastructure.
comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs

Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>


		<div class=