{"id":20423,"date":"2024-01-19T09:32:00","date_gmt":"2024-01-19T14:32:00","guid":{"rendered":"https:\/\/www.lpi.org\/it\/articles\/cybersecurity-dalla-a-alla-z\/"},"modified":"2024-01-19T09:32:00","modified_gmt":"2024-01-19T14:32:00","slug":"cybersecurity-top-and-bottom-of-it","status":"publish","type":"post","link":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/","title":{"rendered":"Cybersecurity: dalla A alla Z"},"content":{"rendered":"<p>La cybersecurity non \u00e8 semplicemente un concetto &#8220;di moda&#8221;; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana.<\/p>\n<h2>Sicurezza di Rete<\/h2>\n<p>La digitalizzazione ha reso necessario l&#8217;elevarsi delle pratiche di sicurezza in ambito IT a un livello critico sia per gli addetti ai lavori sia per gli utenti quotidiani della tecnologia. Tenendo presente questo, \u00e8&#8230; &#8220;Essential&#8221; &#8211; il gioco di parole \u00e8 voluto &#8211; essere ben preparati e avere una solida conoscenza dei rischi associati al lavoro in rete e delle precauzioni che si possono prendere.<\/p>\n<h2>LPI Security Essentials<\/h2>\n<p>Proprio per rispondere a questa esigenza, il Linux Professional Institute (LPI) ha recentemente rilasciato il Certificato <a href=\"https:\/\/www.lpi.org\/it\/our-certifications\/security-essentials-overview\">Security Essentials<\/a>.<\/p>\n<p>Come partecipante al programma <a href=\"https:\/\/www.lpi.org\/member\">LPI Membership<\/a>, ho potuto sostenere gratuitamente l&#8217;esame quando era ancora in Beta e fornire cos\u00ec un feedback sulle domande, dando un contributo alla comunit\u00e0 FOSS globale che si affida a LPI per esami di alta qualit\u00e0 e regolarmente aggiornati.<\/p>\n<p>Il certificato Security Essentials di LPI \u00e8 specificamente pensato per le persone che si avvicinano per la prima volta al settore della sicurezza informatica e che hanno bisogno di acquisire una solida conoscenza di base per affrontare la materia con sicurezza.<\/p>\n<p>Gli Obiettivi d&#8217;Esame iniziano con un&#8217;introduzione generale sull&#8217;importanza della sicurezza nel pi\u00f9 ampio contesto dell&#8217;IT. Poi si affrontano argomenti pi\u00f9 specifici come la gestione dei dati, la crittografia (compresa la <a href=\"https:\/\/en.wikipedia.org\/wiki\/Public_key_infrastructure\" target=\"_blank\" rel=\"noopener\">PKI<\/a> e gli elementi di crittografia sul web, nelle e-mail e nei dispositivi di archiviazione), la sicurezza delle applicazioni e delle reti e altro ancora.<\/p>\n<p>Per un elenco completo degli Obiettivi, compreso il &#8220;Peso&#8221; assegnato a ciascun argomento, si pu\u00f2 consultare la. <a href=\"https:\/\/www.lpi.org\/our-certifications\/exam-020-objectives\">pagina dedicata<\/a> e la <a href=\"https:\/\/wiki.lpi.org\/wiki\/Security_Essentials_Objectives_V1.0\" target=\"_blank\" rel=\"noopener\">wiki<\/a>.<\/p>\n<p>L&#8217;esame \u00e8 ben strutturato e aderisce alle stesse metriche canoniche degli altri esami LPI. Si tratta di domande a scelta multipla e a riempimento di spazi vuoti, per un totale di 40 domande da completare entro un tempo massimo di 60 minuti.<\/p>\n<h2>Una prospettiva diversa<\/h2>\n<p>Come professionista nel campo della sicurezza informatica (attualmente sto studiando per ottenere la certificazione <a href=\"https:\/\/www.lpi.org\/our-certifications\/lpic-3-303-overview\/\">LPIC-3 Security<\/a>), sostengo senza riserve la certificazione Security Essentials come valida introduzione all&#8217;intricato mondo della sicurezza informatica. Sebbene non possa trasformare immediatamente una persona in un esperto di sicurezza informatica (non \u00e8 questo il suo intento, dopotutto), pone una solida base per lo sviluppo di una strategia di formazione pi\u00f9 completa sulla cybersecurity. Ho cercato di delineare questo concetto in modo pi\u00f9 dettagliato in un altro <a href=\"https:\/\/www.lpi.org\/blog\/2022\/01\/27\/simone-simo-bertull-lpi-certifications-what-your-path\/\">articolo<\/a>.<\/p>\n<p>Inoltre, consiglio vivamente la certificazione Security Essentials a chi non ha un background strettamente tecnico ma \u00e8 interessato o deve avventurarsi nel mondo della tecnologia e, in ultima analisi, a chiunque lavori con un computer. Comprendere gli elementi fondamentali della cybersecurity \u00e8 fondamentale nell&#8217;attuale panorama digitale.<\/p>\n<p>La certificazione Security Essentials \u00e8 un valido punto di partenza per chiunque voglia intraprendere un percorso di cybersecurity. Dal punto di vista aziendale, rappresenta una notevole opportunit\u00e0 per stabilire una consapevolezza solida e certificata della cybersecurity. Le aziende che investono nella certificazione dei propri dipendenti in Security Essentials dimostrano il proprio impegno a semplificare la vita del proprio Blue Team (lo ammetto, sono un po&#8217; di parte&#8230;). Riducendo al minimo i rischi derivanti da errori banali, un&#8217;azienda consapevole della sicurezza informatica pu\u00f2 operare in modo pi\u00f9 efficiente e sicuro, riducendo la probabilit\u00e0 di problemi critici come la perdita di dati, il ransomware e il phishing.<\/p>\n<p>In conclusione, poich\u00e9 la complessit\u00e0 delle sfide di cybersecurity continua a crescere nel nostro mondo digitale, avere una solida base di conoscenze \u00e8 essenziale per chiunque interagisca con un qualsiasi device o abbia uno smartphone in tasca. Anche se, fortunatamente, la pandemia \u00e8 ormai alle spalle, la &#8220;Cyber hygiene&#8221; \u00e8 necessaria per tutti noi, sia per la nostra vita personale sia per quella lavorativa.<\/p>\n<p>Il certificato Security Essentials di LPI \u00e8 un ottimo punto di partenza per chi si avvicina per la prima volta al campo della sicurezza informatica e lo consiglio vivamente a chi cerca di migliorare la propria comprensione delle best practice di cybersecurity. Sia che siate professionisti IT esperti o che stiate appena iniziando a esplorare il mondo della tecnologia, questa certificazione fornisce le conoscenze e le competenze necessarie per proteggere in modo proattivo le proprie risorse digitali.<\/p>\n<p>Sono entusiasta di condividere alcune delle mie conoscenze nel campo in occasione dell&#8217;introduzione di questo nuovo certificato orientato alla sicurezza con una serie di articoli. Gli Obiettivi d&#8217;Esame saranno spiegati in dettaglio, passo dopo passo, consentendo di cogliere l&#8217;importanza di alcuni argomenti delicati e di esplorare temi nuovi per il target di questo esame.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La cybersecurity non \u00e8 semplicemente un concetto &#8220;di moda&#8221;; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana. Sicurezza di Rete La digitalizzazione ha reso necessario l&#8217;elevarsi delle pratiche di sicurezza in ambito IT a &#8230; <a href=\"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/\" class=\"button-link\">Per saperne di pi\u00f9<\/a><\/p>\n","protected":false},"author":34,"featured_media":20211,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[410],"country":[447],"language":[431,431],"ppma_author":[515],"class_list":["post-20423","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-europa","country-italy-it","language-english-it"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity: dalla A alla Z - Linux Professional Institute (LPI)<\/title>\n<meta name=\"description\" content=\"La cybersecurity non \u00e8 semplicemente un concetto &quot;di moda&quot;; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity: dalla A alla Z\" \/>\n<meta property=\"og:description\" content=\"La cybersecurity non \u00e8 semplicemente un concetto &quot;di moda&quot;; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/\" \/>\n<meta property=\"og:site_name\" content=\"Linux Professional Institute (LPI)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LPIConnect\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-19T14:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/01\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"994\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Simone Bertulli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:site\" content=\"@lpiconnect\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"Simone Bertulli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/\"},\"author\":{\"name\":\"Simone Bertulli\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#\\\/schema\\\/person\\\/3a18cdc7284afcf4c46c2552e71e7241\"},\"headline\":\"Cybersecurity: dalla A alla Z\",\"datePublished\":\"2024-01-19T14:32:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/\"},\"wordCount\":747,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg\",\"articleSection\":[\"Europa\"],\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/\",\"name\":\"Cybersecurity: dalla A alla Z - Linux Professional Institute (LPI)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg\",\"datePublished\":\"2024-01-19T14:32:00+00:00\",\"description\":\"La cybersecurity non \u00e8 semplicemente un concetto \\\"di moda\\\"; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2024\\\/01\\\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg\",\"width\":1440,\"height\":994,\"caption\":\"Simone \\\"Simo\\\" Bertulli: Cybersecurity - Top and Bottom of It\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/blog\\\/2024\\\/01\\\/19\\\/cybersecurity-top-and-bottom-of-it\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity: dalla A alla Z\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#website\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/\",\"name\":\"Linux Professional Institute (LPI)\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#organization\",\"name\":\"Linux Professional Institute (LPI)\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/04\\\/logo.png\",\"width\":496,\"height\":175,\"caption\":\"Linux Professional Institute (LPI)\"},\"image\":{\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/LPIConnect\",\"https:\\\/\\\/x.com\\\/lpiconnect\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/35136\",\"https:\\\/\\\/www.instagram.com\\\/lpi_org\\\/\",\"https:\\\/\\\/fosstodon.org\\\/@LPI\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/it\\\/#\\\/schema\\\/person\\\/3a18cdc7284afcf4c46c2552e71e7241\",\"name\":\"Simone Bertulli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/picture-1286-1612199480-96x96.pnga6b459de06d985945d89776ec3f0216c\",\"url\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/picture-1286-1612199480-96x96.png\",\"contentUrl\":\"https:\\\/\\\/www.lpi.org\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/picture-1286-1612199480-96x96.png\",\"caption\":\"Simone Bertulli\"},\"description\":\"Simone \\\"Simo\\\" Bertulli is a Cyber Security Expert and a Linux Enterprise Specialist; he started working on Linux systems since 2012, then extending his interest to the whole open source world, also creating a community in the Italian reality. Discovering the potential of open source software and the new opportunities they can create in the workplace is a stimulus for this passion, which brings with it the sustainability of technical solutions and professional skills. In the Cyber Security field he works in a SOC and has collaborated with the Packt publisher on the technical reviews of some video courses about blue team activities. In his spare time he takes technical certifications on various IT topics (\\\"never stop learning\\\" is his motto) and he likes to experiment with new technologies about security and virtualization for SOHO &amp; Enterprise environments.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity: dalla A alla Z - Linux Professional Institute (LPI)","description":"La cybersecurity non \u00e8 semplicemente un concetto \"di moda\"; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/","og_locale":"it_IT","og_type":"article","og_title":"Cybersecurity: dalla A alla Z","og_description":"La cybersecurity non \u00e8 semplicemente un concetto \"di moda\"; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana.","og_url":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/","og_site_name":"Linux Professional Institute (LPI)","article_publisher":"https:\/\/www.facebook.com\/LPIConnect","article_published_time":"2024-01-19T14:32:00+00:00","og_image":[{"width":1440,"height":994,"url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/01\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg","type":"image\/jpeg"}],"author":"Simone Bertulli","twitter_card":"summary_large_image","twitter_creator":"@lpiconnect","twitter_site":"@lpiconnect","twitter_misc":{"Scritto da":"Simone Bertulli","Tempo di lettura stimato":"4 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#article","isPartOf":{"@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/"},"author":{"name":"Simone Bertulli","@id":"https:\/\/www.lpi.org\/it\/#\/schema\/person\/3a18cdc7284afcf4c46c2552e71e7241"},"headline":"Cybersecurity: dalla A alla Z","datePublished":"2024-01-19T14:32:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/"},"wordCount":747,"commentCount":0,"publisher":{"@id":"https:\/\/www.lpi.org\/it\/#organization"},"image":{"@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/01\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg","articleSection":["Europa"],"inLanguage":"it-IT","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/","url":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/","name":"Cybersecurity: dalla A alla Z - Linux Professional Institute (LPI)","isPartOf":{"@id":"https:\/\/www.lpi.org\/it\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#primaryimage"},"image":{"@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/01\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg","datePublished":"2024-01-19T14:32:00+00:00","description":"La cybersecurity non \u00e8 semplicemente un concetto \"di moda\"; \u00e8 diventata una preoccupazione dai molteplici aspetti che dobbiamo affrontare nella nostra vita quotidiana.","breadcrumb":{"@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#primaryimage","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/01\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2024\/01\/article-Simo-Bertulli_Security-Essentials-Series-EP1.jpg","width":1440,"height":994,"caption":"Simone \"Simo\" Bertulli: Cybersecurity - Top and Bottom of It"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lpi.org\/it\/blog\/2024\/01\/19\/cybersecurity-top-and-bottom-of-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lpi.org\/it\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity: dalla A alla Z"}]},{"@type":"WebSite","@id":"https:\/\/www.lpi.org\/it\/#website","url":"https:\/\/www.lpi.org\/it\/","name":"Linux Professional Institute (LPI)","description":"","publisher":{"@id":"https:\/\/www.lpi.org\/it\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lpi.org\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Organization","@id":"https:\/\/www.lpi.org\/it\/#organization","name":"Linux Professional Institute (LPI)","url":"https:\/\/www.lpi.org\/it\/","logo":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.lpi.org\/it\/#\/schema\/logo\/image\/","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/04\/logo.png","width":496,"height":175,"caption":"Linux Professional Institute (LPI)"},"image":{"@id":"https:\/\/www.lpi.org\/it\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LPIConnect","https:\/\/x.com\/lpiconnect","https:\/\/www.linkedin.com\/company\/35136","https:\/\/www.instagram.com\/lpi_org\/","https:\/\/fosstodon.org\/@LPI"]},{"@type":"Person","@id":"https:\/\/www.lpi.org\/it\/#\/schema\/person\/3a18cdc7284afcf4c46c2552e71e7241","name":"Simone Bertulli","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.pnga6b459de06d985945d89776ec3f0216c","url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.png","contentUrl":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.png","caption":"Simone Bertulli"},"description":"Simone \"Simo\" Bertulli is a Cyber Security Expert and a Linux Enterprise Specialist; he started working on Linux systems since 2012, then extending his interest to the whole open source world, also creating a community in the Italian reality. Discovering the potential of open source software and the new opportunities they can create in the workplace is a stimulus for this passion, which brings with it the sustainability of technical solutions and professional skills. In the Cyber Security field he works in a SOC and has collaborated with the Packt publisher on the technical reviews of some video courses about blue team activities. In his spare time he takes technical certifications on various IT topics (\"never stop learning\" is his motto) and he likes to experiment with new technologies about security and virtualization for SOHO &amp; Enterprise environments."}]}},"views":77,"authors":[{"term_id":515,"user_id":34,"is_guest":0,"slug":"sbertuilliexample-com","display_name":"Simone Bertulli","avatar_url":"https:\/\/www.lpi.org\/wp-content\/uploads\/2023\/05\/picture-1286-1612199480-96x96.png","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/posts\/20423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/comments?post=20423"}],"version-history":[{"count":0,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/posts\/20423\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/media\/20211"}],"wp:attachment":[{"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/media?parent=20423"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/categories?post=20423"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/country?post=20423"},{"taxonomy":"language","embeddable":true,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/language?post=20423"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.lpi.org\/it\/wp-json\/wp\/v2\/ppma_author?post=20423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}