Architecting Cisco Secure Communications
Data has become a high value commodity and protecting it is essential, especially when your data is traversing the internet and this is where VPNs come in. Using any VPN is not enough however, as picking the right solution is highly important too.
The value of data has increased substantially over the past few years with attackers capturing data or downloading it from compromised databases and selling it on the black market. Firewalls do their best to keep attackers out but what about protecting data that’s being transmitted across an untrusted network such as the internet? This is exactly what VPNs were designed for. In this course, Architecting Cisco Secure Communications, you will not only learn about the different types of site-to-site and remote access VPNs available for organisations to use but you will also learn about the different components that come together to make up the different VPN solutions. First, you will explore site-to-site VPNs, starting with IPSec VPNs and moving onto GETVPNs and DMVPNs. Next, you will go through remote access VPNs including VPNs that can be accessed anywhere from any laptop or workstation without a client installed. Finally, you will learn how IPSec encryption keys are securely exchanged between VPN peers. When you are finished with this course, you will have the skills and knowledge of Cisco VPNs needed to determine the best VPN type of a given scenario.
Author Name: Martin Brown
Author Description:
Martin’s IT career goes back to 1993 and while he was involved with Apple Macintosh computers, and had the pleasure of using DEC VAX terminals. Back then, hand held literally meant picking the terminal up by it’s carry handle to move it to the other side of the desk and touch screen meant getting a static shock. Of course, the world has moved on a great deal since then and Martin is proud to be at the cutting edge of network and internetwork technology, working with devices from Cisco, F5, Chec… more
Table of Contents
- Course Overview
1min - Identifying Site-to-site VPNs
42mins - Understanding Remote Access VPNs
35mins - Designing Site-to-site and Remote Access VPN Solutions
40mins
There are no reviews yet.