Explore connection security rules
This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.
Describe the purpose and functionality of IPsec., Describe how to configure IPsec., Describe connection security rules., Explain authentication options., Monitor connections.
Prerequisites
Students should have a basic understanding of computer networks and hardware concepts.
Students should have a basic understanding of OS and Application concepts.
Students should have experience with using Windows 10 or later.
There are no reviews yet.