Description
At the core of VPN connectivity, there are several protocols and algorithms to choose. In this course, VPN Fundamentals for CCNP® Security, you will learn these protocols and algorithms so that you can select the appropriate level of confidentiality, integrity, and origin authentication. First, you will discover the critical threats to data in transit, including masquerading attacks, spoofing attacks, and man-in-the-middle attacks. Second, you will learn about the benefits of a VPN, VPN components, and VPN options. Next, you will explore confidentiality, integrity, and origin authentication. Finally, you will cover PKI concepts involved in a VPN, as well as some general guidelines for deploying a VPN. By the end of this course, you will be able to explain the fundamental features and protocols involved in a VPN.
|