
Pluralsight – VPN Fundamentals for CCNP Security (Bitspyder)
English | Size: 164.88 MB
Category: Tutorial
VPNs are used every day in today’s secure data networks. This course, VPN Fundamentals for CCNP® Security, will teach you the fundamentals of VPN protocols and algorithms while covering topics of the CCNP® Security SIMOS exam.
Description
At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.
Course info
Level Intermediate
Updated February 12, 2018
Duration 1h 52m
Table of Contents
1-Course Overview
Course Overview
1m 52s
2-Understanding Key Threats to Data in Transit
19m
Course Introduction and Key Threats to Transit Data
3m 34s
Topology Review
5m 1s
Eavesdropping and Masquerading Attacks
4m 13s
Man-in-the-middle Attacks
4m 12s
Module Summary
1m 58s
3-Understanding VPN Benefits, Options, and Components
35m
VPN Benefits
5m 16s
VPN Types
2m 23s
VPN Types Topology Example
6m 4s
Components of a VPN and Integrity
4m 26s
Integrity Algorithms and Key Management
3m 26s
Non-repudiation
2m 41s
Application and Protocol Support
10m 41s
4-Understanding Confidentiality, Integrity, and Origin Authentication with a VPN
31m 35s
Crypto Algorithms and Encryption
4m 46s
Symmetric and Asymmetric Algorithms
10m 29s
Providing Data Integrity
5m 20s
Digital Signatures
3m 51s
Non-repudiation
7m 7s
5-Understanding PKI, NGE, and General Guidelines
24m 35s
Introduction to PKI
7m 5s
Certificate Authorities
10m 56s
Next-generation Encryption and General Guidelines
6m 32s
DOWNLOAD:
If any links die or problem unrar, send request to http://goo.gl/aUHSZc
Leave a Reply