{"id":4190,"date":"2023-02-20T10:54:18","date_gmt":"2023-02-20T15:54:18","guid":{"rendered":"https:\/\/www.lpi.org\/why-everyone-should-know-security-essentials\/"},"modified":"2023-11-15T02:28:48","modified_gmt":"2023-11-15T07:28:48","slug":"why-everyone-should-know-security-essentials","status":"publish","type":"post","link":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/","title":{"rendered":"Why Everyone Should Know Security Essentials"},"content":{"rendered":"<p>LPI has just released the <a href=\"https:\/\/www.lpi.org\/our-certifications\/security-essentials-overview\/\">Security Essentials certificate<\/a>. Our interest in this topic is not arbitrary: These days, IT security news is ubiquitous. Every day, someone\u2019s data is encrypted for ransom, personal information is copied, and new security vulnerabilities are discovered. \u00a0Even though this all sounds technical, cryptic, and somehow far away, many of these attacks may personally affect you and me.<\/p>\n<p>Some IT security attacks are very sophisticated, and far too professional for us as individuals to deal with. But not every attack is as elaborate as, for example, the <a href=\"https:\/\/en.wikipedia.org\/wiki\/2020_United_States_federal_government_data_breach\" target=\"_blank\" rel=\"noopener\">SolarWinds hack<\/a> (do some research, there is a lot to learn!). While some of the attacks seem trivial \u2013 \u00a0they still may be effective. That is because people do quickly confirm their personal data on a new online portal allegedly put by their bank. People do thoughtlessly open the attachment to the cancellation email from their employer. And people do share some vacation photos publicly in social media; even that innocent-seeming act gives potential attackers an opening to call your office, ask for information on behalf of the person on vacation, and cause havoc.<\/p>\n<p>These are everyday mistakes that can have severe consequences. Anyone using digital devices will be exposed to these kinds of threats sooner than later. Sometimes it just takes a single moment of distraction. I myself once had my credit card blocked the day before Christmas holidays, because I didn&#8217;t notice that I was using a compromised ATM. When I found out, I questioned myself how I possibly could not have noticed that the machine was unsafe, especially considering myself a security aware person. Luckily, I was covered by my bank. But certainly, no one wants to be the person who opens \u00a0an email attachment that \u00a0triggers encryption across \u00a0all servers in their company.<\/p>\n<p>With Security Essentials, we want not only to create awareness for these dangers, but also provide guidance for the right ways to deal with them. We want to enable everyone to understand the basics of IT security. Beyond learning the right way to deal with personal data, email attachments, and phishing attempts, a good security education also includes general knowledge. For example, what does it mean when a web browser indicates that a connection is not secure? What constitutes such a secure connection anyway? Two simple questions whose answers require the concepts of private keys, public keys, and certificates.<\/p>\n<p>These basic concepts are also part of the exam, but only as far as they are absolutely necessary to understand threats and countermeasures. Candidates will understand what&#8217;s behind news reports about companies losing access to all of their data, customer data being stolen from online shops, email servers all over the world becoming vulnerable, and botnets marauding against IT infrastructure of everykind. Candidates will recognize common security threats and know how to mitigate them.<\/p>\n<p>This knowledge can be the beginning on which a whole career in IT security is built. But this knowledge is first and foremost the foundation on which we can all protect ourselves and our environment. Sometimes, the people we don&#8217;t ususally associate with IT security are the ones who benefit the most from special expertise in it. Security attacks do not necessarily come through the networking infrastructure. In the form of emails, lost USB drives, phone calls, or alleged new colleagues asking for the WiFi password, attacks can show up at every company\u2019s reception desk.<\/p>\n<p>This knowledge is included in Security Essentials. We also delve under the surface to cover a broad list of topics beyond typical introductions to security. We offer theoretical basics where they are needed to really understand a topic.<\/p>\n<p>Security Essentials, even more than our other Essentials exams, addresses beginners with no prior knowledge of computing except the routine use of their devices. The required knowledge can be acquired with reasonable effort, and the exam objectives are transparent and of practical relevance. Learning Materials and translations are in the works.<\/p>\n<p>In addition, we try to keep the costs of the exam as low as possible. We explicitly address learners in an academic environment, such as schools and universities, but also companies and individuals who need a thorough introduction to a topic.<\/p>\n<p>Personally, I am excited about the new certificate. If the exam preparation helps some of our candidates to mitigate attacks against their devices, data, or accounts, the work has been worth it.<\/p>\n<p>However, we are not done yet. We are still looking for help with the Learning Materials for Security Essentials. If anyone feels called upon, please be sure to contact us. IT security is an exciting topic, whether you&#8217;re preparing for your exam, writing a lesson for the learning materials or, as your knowledge grows, advancing your career.<\/p>\n<p>We will be reading more about Security Essentials in the LPI blog in the upcoming posts, with some folks from LPI partners sharing their insights. In the meantime, I wish all candidates an enjoyable preparation and much success in the exam.<\/p>\n<p class=\"rtecenter\"><a href=\"https:\/\/www.lpi.org\/blog\/2023\/02\/27\/sysadmin-takes-lpi-security-essentials-exam\">Read the next post of this series &gt;&gt;<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>LPI has just released the Security Essentials certificate. Our interest in this topic is not arbitrary: These days, IT security news is ubiquitous. Every day, someone\u2019s data is encrypted for ransom, personal information is copied, and new security vulnerabilities are &#8230; <a href=\"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/\" class=\"button-link\">Leer m\u00e1s<\/a><\/p>\n","protected":false},"author":66,"featured_media":3488,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[12],"country":[],"language":[465],"ppma_author":[540],"class_list":["post-4190","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sin-categorizar","language-ingles"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why Everyone Should Know Security Essentials - Linux Professional Institute (LPI)<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Everyone Should Know Security Essentials\" \/>\n<meta property=\"og:description\" content=\"LPI has just released the Security Essentials certificate. Our interest in this topic is not arbitrary: These days, IT security news is ubiquitous. Every day, someone\u2019s data is encrypted for ransom, personal information is copied, and new security vulnerabilities are ... Leer m\u00e1s\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/\" \/>\n<meta property=\"og:site_name\" content=\"Linux Professional Institute (LPI)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LPIConnect\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-20T15:54:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-15T07:28:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Security-Essentials-blog-03.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fabian Thorns\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:site\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabian Thorns\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/\"},\"author\":{\"name\":\"Fabian Thorns\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/person\\\/87a340eca845e18d801667fd11e6937c\"},\"headline\":\"Why Everyone Should Know Security Essentials\",\"datePublished\":\"2023-02-20T15:54:18+00:00\",\"dateModified\":\"2023-11-15T07:28:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/\"},\"wordCount\":846,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Security-Essentials-blog-03.jpg\",\"articleSection\":[\"Sin categorizar\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/\",\"name\":\"Why Everyone Should Know Security Essentials - Linux Professional Institute (LPI)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Security-Essentials-blog-03.jpg\",\"datePublished\":\"2023-02-20T15:54:18+00:00\",\"dateModified\":\"2023-11-15T07:28:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Security-Essentials-blog-03.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/article-Security-Essentials-blog-03.jpg\",\"width\":1440,\"height\":994},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/blog\\\/2023\\\/02\\\/20\\\/why-everyone-should-know-security-essentials\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Everyone Should Know Security Essentials\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#website\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\",\"name\":\"Linux Professional Institute (LPI)\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#organization\",\"name\":\"Linux Professional Institute (LPI)\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"width\":496,\"height\":175,\"caption\":\"Linux Professional Institute (LPI)\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/LPIConnect\",\"https:\\\/\\\/x.com\\\/lpiconnect\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35136\",\"https:\\\/\\\/www.instagram.com\\\/lpi_org\\\/\",\"https:\\\/\\\/fosstodon.org\\\/@LPI\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/es\\\/#\\\/schema\\\/person\\\/87a340eca845e18d801667fd11e6937c\",\"name\":\"Fabian Thorns\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/cropped-fabian-thorns-1920px-96x96.jpg583c90110e404d4e42f0be7307753074\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/cropped-fabian-thorns-1920px-96x96.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2026\\\/01\\\/cropped-fabian-thorns-1920px-96x96.jpg\",\"caption\":\"Fabian Thorns\"},\"description\":\"Fabian Thorns is the Director of Product Development at Linux Professional Institute, LPI. He is M.Sc. Business Information Systems, a regular speaker at open source events and the author of numerous articles and books. Fabian has been part of the exam development team since 2010. Connect with him on LinkedIn, XING\u00a0or via email (fthorns\u00a0at\u00a0www.lpi.org).\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why Everyone Should Know Security Essentials - Linux Professional Institute (LPI)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/","og_locale":"es_ES","og_type":"article","og_title":"Why Everyone Should Know Security Essentials","og_description":"LPI has just released the Security Essentials certificate. Our interest in this topic is not arbitrary: These days, IT security news is ubiquitous. Every day, someone\u2019s data is encrypted for ransom, personal information is copied, and new security vulnerabilities are ... Leer m\u00e1s","og_url":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/","og_site_name":"Linux Professional Institute (LPI)","article_publisher":"https:\/\/www.facebook.com\/LPIConnect","article_published_time":"2023-02-20T15:54:18+00:00","article_modified_time":"2023-11-15T07:28:48+00:00","og_image":[{"width":1440,"height":994,"url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Security-Essentials-blog-03.jpg","type":"image\/jpeg"}],"author":"Fabian Thorns","twitter_card":"summary_large_image","twitter_creator":"@lpiconnect","twitter_site":"@lpiconnect","twitter_misc":{"Escrito por":"Fabian Thorns","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#article","isPartOf":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/"},"author":{"name":"Fabian Thorns","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/person\/87a340eca845e18d801667fd11e6937c"},"headline":"Why Everyone Should Know Security Essentials","datePublished":"2023-02-20T15:54:18+00:00","dateModified":"2023-11-15T07:28:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/"},"wordCount":846,"commentCount":0,"publisher":{"@id":"https:\/\/www.lpi.org\/es\/#organization"},"image":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Security-Essentials-blog-03.jpg","articleSection":["Sin categorizar"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/","url":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/","name":"Why Everyone Should Know Security Essentials - Linux Professional Institute (LPI)","isPartOf":{"@id":"https:\/\/www.lpi.org\/es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#primaryimage"},"image":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Security-Essentials-blog-03.jpg","datePublished":"2023-02-20T15:54:18+00:00","dateModified":"2023-11-15T07:28:48+00:00","breadcrumb":{"@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#primaryimage","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Security-Essentials-blog-03.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/article-Security-Essentials-blog-03.jpg","width":1440,"height":994},{"@type":"BreadcrumbList","@id":"https:\/\/www.lpi.org\/es\/blog\/2023\/02\/20\/why-everyone-should-know-security-essentials\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lpi.org\/es\/"},{"@type":"ListItem","position":2,"name":"Why Everyone Should Know Security Essentials"}]},{"@type":"WebSite","@id":"https:\/\/www.lpi.org\/es\/#website","url":"https:\/\/www.lpi.org\/es\/","name":"Linux Professional Institute (LPI)","description":"","publisher":{"@id":"https:\/\/www.lpi.org\/es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lpi.org\/es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.lpi.org\/es\/#organization","name":"Linux Professional Institute (LPI)","url":"https:\/\/www.lpi.org\/es\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/logo\/image\/","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","width":496,"height":175,"caption":"Linux Professional Institute (LPI)"},"image":{"@id":"https:\/\/www.lpi.org\/es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LPIConnect","https:\/\/x.com\/lpiconnect","https:\/\/www.linkedin.com\/company\/35136","https:\/\/www.instagram.com\/lpi_org\/","https:\/\/fosstodon.org\/@LPI"]},{"@type":"Person","@id":"https:\/\/www.lpi.org\/es\/#\/schema\/person\/87a340eca845e18d801667fd11e6937c","name":"Fabian Thorns","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.lpi.org\/wp-content\/uploads\/2026\/01\/cropped-fabian-thorns-1920px-96x96.jpg583c90110e404d4e42f0be7307753074","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2026\/01\/cropped-fabian-thorns-1920px-96x96.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2026\/01\/cropped-fabian-thorns-1920px-96x96.jpg","caption":"Fabian Thorns"},"description":"Fabian Thorns is the Director of Product Development at Linux Professional Institute, LPI. He is M.Sc. Business Information Systems, a regular speaker at open source events and the author of numerous articles and books. Fabian has been part of the exam development team since 2010. Connect with him on LinkedIn, XING\u00a0or via email (fthorns\u00a0at\u00a0www.lpi.org)."}]}},"views":949,"authors":[{"term_id":540,"user_id":66,"is_guest":0,"slug":"fthornslpi-org","display_name":"Fabian Thorns","avatar_url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2026\/01\/cropped-fabian-thorns-1920px-96x96.jpg","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/4190","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/users\/66"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/comments?post=4190"}],"version-history":[{"count":3,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/4190\/revisions"}],"predecessor-version":[{"id":19689,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/posts\/4190\/revisions\/19689"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/media\/3488"}],"wp:attachment":[{"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/media?parent=4190"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/categories?post=4190"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/country?post=4190"},{"taxonomy":"language","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/language?post=4190"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lpi.org\/es\/wp-json\/wp\/v2\/ppma_author?post=4190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}